Show simple item record

dc.contributor.authorKolios, Panayiotisen
dc.contributor.authorPitsillides, Andreasen
dc.contributor.authorMokryn, O.en
dc.contributor.authorPapadaki, Katerina P.en
dc.creatorKolios, Panayiotisen
dc.creatorPitsillides, Andreasen
dc.creatorMokryn, O.en
dc.creatorPapadaki, Katerina P.en
dc.date.accessioned2019-11-13T10:40:44Z
dc.date.available2019-11-13T10:40:44Z
dc.date.issued2014
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/54275
dc.description.abstractThe literature of wireless adhoc networks includes a plethora of alternative dissemination strategies that aim for efficient delivery of data traffic from source to destination. Hence, the majority of these strategies assume that the source-destination pair is known prior to any data forwarding. On the contrary, an adhoc network opportunistically formed by mobile devices in the aftermath of a disaster, lacks any actual knowledge with respect to the network topology and the response units' availability. As such, distress nodes need to first understand their topological status in order to then be able to make informed forwarding decisions for alert message dissemi-nation. The Explore and Exploit strategy, described hereafter, is purposefully envisioned to solve the latter issues and meet the stringent requirements for highly efficient data dissemination. © 2014 IEEE.en
dc.publisherIEEE Computer Societyen
dc.source2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014en
dc.source2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014en
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84901318895&doi=10.1109%2fPerComW.2014.6815222&partnerID=40&md5=05dfd321e53fec098cd849f280d914bf
dc.subjectCommunicationen
dc.subjectNetwork topologyen
dc.subjectElectric network topologyen
dc.subjectWireless ad hoc networksen
dc.subjectUbiquitous computingen
dc.subjectMobile devicesen
dc.subjectEmergency responseen
dc.subjectEmergency servicesen
dc.subjectEmergency Response Networkingen
dc.subjectAdhoc Com-municationsen
dc.subjectComplex Network Scienceen
dc.subjectData Disseminationen
dc.subjectData-forwardingen
dc.subjectEfficient data disseminationsen
dc.subjectSource-destination pairsen
dc.subjectStringent requirementen
dc.titleQualifying explore and exploit for efficient data dissemination in emergency adhoc networksen
dc.typeinfo:eu-repo/semantics/conferenceObject
dc.identifier.doi10.1109/PerComW.2014.6815222
dc.description.startingpage303
dc.description.endingpage307
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeConference Objecten
dc.description.notes<p>Sponsors:en
dc.description.notesConference code: 105241en
dc.description.notesCited By :3</p>en
dc.contributor.orcidPitsillides, Andreas [0000-0001-5072-2851]
dc.contributor.orcidKolios, Panayiotis [0000-0003-3981-993X]
dc.gnosis.orcid0000-0001-5072-2851
dc.gnosis.orcid0000-0003-3981-993X


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record