CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.
DOI: 10.1109/ccnc.2006.1593171
|View full text |Cite
|
Sign up to set email alerts
|

Cellular network as a multiplicatively weighted voronoi diagram

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…The weights were specified by the effective cell association bias β between the macrocell and small cells which can be controlled to expand or shrink the small-cells' range. Precisely, β is a weighted ratio of the received SNR from macrocell BS versus small-cell BS [24]. For simplifying our analysis, we place all small-cell users on their cell edges, as illustrated in Fig.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The weights were specified by the effective cell association bias β between the macrocell and small cells which can be controlled to expand or shrink the small-cells' range. Precisely, β is a weighted ratio of the received SNR from macrocell BS versus small-cell BS [24]. For simplifying our analysis, we place all small-cell users on their cell edges, as illustrated in Fig.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…We can identify (21), (24), (26), and (28) as the Karush-Kuhn-Tucker (KKT) optimality conditions [13] of (P x ) with x = ( w, θ). Since (P x ) is convex, these KKT conditions are sufficient to prove that p is also an optimal solution of (P x ) [13].…”
Section: A Parametric Convex Programmingmentioning
confidence: 99%
“…• denotes the geographic distance between the two location parameters; and, r j is the cellular radius of tower c j , i.e., the maximum distance between the actual tower position c j and the farthest corner of its Voronoi tessellation cell [28] as illustrated in Fig. 7.…”
Section: Homogeneous Quantization Of Locationsmentioning
confidence: 99%
“…Now we divide the wireless network into various smaller unit called as Voronoi cells (Voronoi diagram) . As we split the wireless network into smaller cells it is easy to find out the strength of similar attacks within the voronoi cells [15] . We focus our attention to find the gradient of the similar attacks with respect to each other in different frequency signals in a single voronoi cellular topology of wireless network .Assuming Q 1 , Q 2 , Q 3 respectively are the different signals and are infected by similar attacks R 1 , R 2 , R 3 respectively with in a single voronoi unit cell.…”
Section: (A) Attack Modelsmentioning
confidence: 99%