Qualifying explore and exploit for efficient data dissemination in emergency adhoc networks
Date
2014Publisher
IEEE Computer SocietySource
2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 20142014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014
Pages
303-307Google Scholar check
Keyword(s):
Metadata
Show full item recordAbstract
The literature of wireless adhoc networks includes a plethora of alternative dissemination strategies that aim for efficient delivery of data traffic from source to destination. Hence, the majority of these strategies assume that the source-destination pair is known prior to any data forwarding. On the contrary, an adhoc network opportunistically formed by mobile devices in the aftermath of a disaster, lacks any actual knowledge with respect to the network topology and the response units' availability. As such, distress nodes need to first understand their topological status in order to then be able to make informed forwarding decisions for alert message dissemi-nation. The Explore and Exploit strategy, described hereafter, is purposefully envisioned to solve the latter issues and meet the stringent requirements for highly efficient data dissemination. © 2014 IEEE.
Collections
Cite as
Related items
Showing items related by title, author, creator and subject.
-
Article
A network-aware framework for energy-efficient data acquisition in wireless sensor networks
Andreou, Panayiotis G.; Zeinalipour-Yazdi, Constantinos D.; Samaras, George S.; Chrysanthis, Panos K. (2014)Wireless sensor networks enable users to monitor the physical world at an extremely high fidelity. In order to collect the data generated by these tiny-scale devices, the data management community has proposed the utilization ...
-
Conference Object
Survivable and Secure Elastic Optical Networks using Network Coding
Savva, Giannis; Manousakis, Konstantinos; Ellinas, Georgios (2019)In this work, the concept of network coding (NC) is used in conjunction with the routing and spectrum allocation (RSA) problem to jointly provide security and protection in elastic optical networks (EONs). Specifically, ...
-
Article
A Network Intervention to Locate Newly HIV Infected Persons Within MSM Networks in Chicago
Morgan, Ethan; Skaathun, Britt; Nikolopoulos, Georgios K.; Paraskevis, Dimitrios; Williams, Leslie D.; Smyrnov, Pavlo; Friedman, Samuel R.; Schneider, John A. (2019)Individuals with recent/acute HIV-infection have an increased likelihood of disease transmission. To evaluate effectiveness of identifying recent infections, we compared networks of recently and long-term HIV-infected ...