Proceedings of the 2004 Joint Workshop on Foundations of Mobile Computing 2004
DOI: 10.1145/1022630.1022636
|View full text |Cite
|
Sign up to set email alerts
|

Batch conflict resolution algorithm with progressively accurate multiplicity estimation

Abstract: The wireless connectivity, essential for pervasive computing, has ephemeral character and can be used for creating ad hoc networks, sensor networks, connection with RFID tags etc. The communication tasks in such wireless networks often involve an inquiry over a shared channel, which can be invoked for: discovery of neighboring devices in ad hoc networks, counting the number of active sensors in sensor networks, estimating the mean value contained in a group of sensors etc. Such inquiry solicits replies from po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2006
2006
2012
2012

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(31 citation statements)
references
References 11 publications
0
31
0
Order By: Relevance
“…These schemes assume that each tag can understand and respond to complex commands from the reader, such as responding only if the ID is within an address range specified by the reader. Examples of such algorithms can be found in [21,26,27,37,38,39,40,43,44,29,30]. While these algorithms deterministically resolve conflicts, they often discount the amount of time that readers spend in probing and isolating different segments of the tag population in computing the total time taken to resolve all conflicts.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…These schemes assume that each tag can understand and respond to complex commands from the reader, such as responding only if the ID is within an address range specified by the reader. Examples of such algorithms can be found in [21,26,27,37,38,39,40,43,44,29,30]. While these algorithms deterministically resolve conflicts, they often discount the amount of time that readers spend in probing and isolating different segments of the tag population in computing the total time taken to resolve all conflicts.…”
Section: Related Workmentioning
confidence: 99%
“…These algorithms fall into the class of tree-based identification algorithms [21,26,27,37,38,39,40,43,44,29,30] with the tags classified on a binary tree based on their id, and the reader moving down the tree at each step to identify all nodes. Deterministic algorithms are typically faster than probabilistic schemes in terms of actual tag response slots used, however, they suffer from large reader overhead since the reader has to specify address ranges to isolate contending tag subsets using a probe at the beginning of each slot.…”
Section: Introductionmentioning
confidence: 99%
“…In our scheme, token j t can be regarded as the access probability of node j without considering the channel condition or routing metrics [10]. To increase the fairness of access and to balance the energy of the network, we tend to choose node with lesser token as the relay.…”
Section: Etc Modelmentioning
confidence: 99%
“…7 Note that N and E can be estimated at every node. Sender initiated algorithms for the estimation of N can be found in [30]. For E, one can low pass filter the minimum costs measured at every forwarding step.…”
Section: Node I Initiates the Contention By Sending Amentioning
confidence: 99%