Proceedings of the Nineteenth Annual ACM Symposium on Parallel Algorithms and Architectures 2007
DOI: 10.1145/1248377.1248420
|View full text |Cite
|
Sign up to set email alerts
|

Local strategies for maintaining a chain of relay stations between an explorer and a base station

Abstract: We discuss strategies for maintaining connectivity in a system consisting of a stationary base station and a mobile explorer. For this purpose we introduce the concept of mobile relay stations, which form a chain between the base station and the explorer and forward all communication.In order to cope with the mobility of the explorer, relay stations must adapt their positions. We investigate strategies which allow the relay stations to self-organize in order to maintain a chain of small length. For a plane wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Kutyłowski [13] gives a lower bound of Ω n 2 − εn . A seemingly better strategy, called CHASE-EX-PLORER, has been suggested by Dynia et al [9]. It considers a variant of the communication chain problem where one of the base stations (the explorer) is mobile.…”
Section: Known Results and Our Contributionmentioning
confidence: 99%
“…Kutyłowski [13] gives a lower bound of Ω n 2 − εn . A seemingly better strategy, called CHASE-EX-PLORER, has been suggested by Dynia et al [9]. It considers a variant of the communication chain problem where one of the base stations (the explorer) is mobile.…”
Section: Known Results and Our Contributionmentioning
confidence: 99%
“…In this context, disoriented robots (no agreement on the local coordinate systems) that are connected in a chain topology are assumed as well as a circular connectivity range and viewing range of 1. We prove that the GTM algorithm [6,13], in which each robot moves to the midpoint between its two direct neighbors in every round, converges to the optimal configuration in O(n 2 •log(n/ε)) epochs assuming the Ssync scheduler. For one-dimensional configurations (all robots are initially collinear) this is a significant improvement over the so far best known runtime bound of O(n 5 • log(n/ε)) epochs for this algorithm [6].…”
Section: Our Contributionmentioning
confidence: 99%
“…Later on, an almost matching lower bound (for the algorithm) of Ω(n 2 • log(1/ε)) has been derived [16]. Algorithms with stronger assumptions, e.g., the LUMI model, are able to achieve better runtimes [13,17].…”
Section: Related Workmentioning
confidence: 99%
“…Existing approaches to create AMRoNet are mostly based on mobile routers making a chain. In [4,13] the authors present different strategies such as Manhattan-Hopper, Hopper, Chase explorer and Go-to-The-Middle for maintaining the connectivity of an explorer with a base station. In [20], depending on whether the knowledge of the agent's trajectory is available or not, the trajectories for the routers are estimated.…”
Section: Related Workmentioning
confidence: 99%