dc.contributor.author | Kolios, Panayiotis | en |
dc.contributor.author | Pitsillides, Andreas | en |
dc.contributor.author | Mokryn, O. | en |
dc.contributor.author | Papadaki, Katerina P. | en |
dc.creator | Kolios, Panayiotis | en |
dc.creator | Pitsillides, Andreas | en |
dc.creator | Mokryn, O. | en |
dc.creator | Papadaki, Katerina P. | en |
dc.date.accessioned | 2019-11-13T10:40:44Z | |
dc.date.available | 2019-11-13T10:40:44Z | |
dc.date.issued | 2014 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/54275 | |
dc.description.abstract | The literature of wireless adhoc networks includes a plethora of alternative dissemination strategies that aim for efficient delivery of data traffic from source to destination. Hence, the majority of these strategies assume that the source-destination pair is known prior to any data forwarding. On the contrary, an adhoc network opportunistically formed by mobile devices in the aftermath of a disaster, lacks any actual knowledge with respect to the network topology and the response units' availability. As such, distress nodes need to first understand their topological status in order to then be able to make informed forwarding decisions for alert message dissemi-nation. The Explore and Exploit strategy, described hereafter, is purposefully envisioned to solve the latter issues and meet the stringent requirements for highly efficient data dissemination. © 2014 IEEE. | en |
dc.publisher | IEEE Computer Society | en |
dc.source | 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014 | en |
dc.source | 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014 | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84901318895&doi=10.1109%2fPerComW.2014.6815222&partnerID=40&md5=05dfd321e53fec098cd849f280d914bf | |
dc.subject | Communication | en |
dc.subject | Network topology | en |
dc.subject | Electric network topology | en |
dc.subject | Wireless ad hoc networks | en |
dc.subject | Ubiquitous computing | en |
dc.subject | Mobile devices | en |
dc.subject | Emergency response | en |
dc.subject | Emergency services | en |
dc.subject | Emergency Response Networking | en |
dc.subject | Adhoc Com-munications | en |
dc.subject | Complex Network Science | en |
dc.subject | Data Dissemination | en |
dc.subject | Data-forwarding | en |
dc.subject | Efficient data disseminations | en |
dc.subject | Source-destination pairs | en |
dc.subject | Stringent requirement | en |
dc.title | Qualifying explore and exploit for efficient data dissemination in emergency adhoc networks | en |
dc.type | info:eu-repo/semantics/conferenceObject | |
dc.identifier.doi | 10.1109/PerComW.2014.6815222 | |
dc.description.startingpage | 303 | |
dc.description.endingpage | 307 | |
dc.author.faculty | 002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences | |
dc.author.department | Τμήμα Πληροφορικής / Department of Computer Science | |
dc.type.uhtype | Conference Object | en |
dc.description.notes | <p>Sponsors: | en |
dc.description.notes | Conference code: 105241 | en |
dc.description.notes | Cited By :3</p> | en |
dc.contributor.orcid | Pitsillides, Andreas [0000-0001-5072-2851] | |
dc.contributor.orcid | Kolios, Panayiotis [0000-0003-3981-993X] | |
dc.gnosis.orcid | 0000-0001-5072-2851 | |
dc.gnosis.orcid | 0000-0003-3981-993X | |