Handbook of Optimization in Telecommunications
DOI: 10.1007/978-0-387-30165-5_30
|View full text |Cite
|
Sign up to set email alerts
|

Graph Domination, Coloring and Cliques in Telecommunications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(41 citation statements)
references
References 110 publications
0
41
0
Order By: Relevance
“…So to reduce f max it is necessary to schedule them according to their constraints with the last maximum stable that is {5, 6}. This leads to the scheduling (8,7). The resulting assignment is given in Table 3.…”
Section: Illustrationmentioning
confidence: 98%
See 2 more Smart Citations
“…So to reduce f max it is necessary to schedule them according to their constraints with the last maximum stable that is {5, 6}. This leads to the scheduling (8,7). The resulting assignment is given in Table 3.…”
Section: Illustrationmentioning
confidence: 98%
“…Indeed, let's consider for example the cells 6, 7 and 8. For the two scheduling (a) (6,7,8) and (b) (6,8,7), Table 2 shows the respective assignment tables, say x (a) and x (b) as denoted in Section 2: x if = 1(resp. 0 not mentioned) if the frequency f ∈ {1, 2, 3, 4, 5} is (resp.…”
Section: Illustrationmentioning
confidence: 99%
See 1 more Smart Citation
“…Occasionally a k-club happens to be a kclique as well, in which special case it is called a k-clan. 4 Recently k-clubs have found interest and applications in many network oriented disciplines, such as telecommunication (Balasundaram and Butenko 2006), biology (Balasundaram et al 2005), genetics (Pasupuleti 2008), forensic data mining (Memon and Larsen 2006), web search (Terveen et al 1999), graph mining (Cavique et al 2009), and language processing (Miao and Berleant 2004;Gutiérrez et al 2011). …”
Section: The 2-clubs Of a Graph Or Networkmentioning
confidence: 99%
“…To manage the externalities across interfering UE-SBS links, we propose the representation of the initial SBSs network as an interference graph [19]. In such an approach, the network topology shown in Figure 1.a is translated into the interference graph of Figure 1.b, in which the vertices are interfering SBSs and UEs and the weight of the corresponding edges (shown as red dashed lines) is the received interference signal strength ′ ) ≻m (i, η) and RSSI of other clique edges is non-increased then…”
Section: B Context-aware Ue-sbs Association Approachmentioning
confidence: 99%