2004
DOI: 10.1007/978-3-540-30179-0_16
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation of Indoor Location Detection Systems Based on Identifying Codes

Abstract: Abstract. We present the design, implementation and evaluation of a location detection system built over a Radio Frequency network based on the IEEE 802.11 standard. Our system employs beacons to broadcast identifying packets from strategic positions within a building infrastructure in such a way that each resolvable position is covered by a unique collection of beacons; a user of such a system can thus determine his location by means of the beacon packets received. The locations from which beacons broadcast i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(25 citation statements)
references
References 15 publications
0
25
0
Order By: Relevance
“…In the LocatingDominating Set problem, we ask for a dominating set S such that the vertices outside of S are distinguished by their neighbourhood within S. In Metric Dimension, we wish to select a set S of vertices of a graph G such that every vertex of G is uniquely identied by its distances to the vertices of S. These problems have been extensively studied since their introduction in the 1970s and 1980s. They have been applied to various areas such as network verication [2], fault-detection in networks [36], graph isomorphism testing [1] or the logical denability of graphs [26].…”
Section: Introductionmentioning
confidence: 99%
“…In the LocatingDominating Set problem, we ask for a dominating set S such that the vertices outside of S are distinguished by their neighbourhood within S. In Metric Dimension, we wish to select a set S of vertices of a graph G such that every vertex of G is uniquely identied by its distances to the vertices of S. These problems have been extensively studied since their introduction in the 1970s and 1980s. They have been applied to various areas such as network verication [2], fault-detection in networks [36], graph isomorphism testing [1] or the logical denability of graphs [26].…”
Section: Introductionmentioning
confidence: 99%
“…One of the interests of these notions lies in their applications to the location of threats in facilities [54,58] and error detection in computer networks [40]. One can also mention applications to routing [44], to bioinformatics [37] (where identifying codes are called differentiating dominating sets) and to measuring the first-order logical complexity of graphs [41] (where locating-dominating sets are calledsieves).…”
Section: Definitions and Problemsmentioning
confidence: 99%
“…Locating-dominating sets [22,23] and open locating dominating sets [21] are defined in a similar way. These concepts are studied by various authors since the 1970s and 1980s, and have been applied to various regions such as fault-detection in networks [12,25] or graph isomorphism testing [2].…”
Section: Introductionmentioning
confidence: 99%