Please use this identifier to cite or link to this item:
http://hdl.handle.net/1893/15988
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Fayed, Marwan | en_UK |
dc.contributor.author | Mouftah, Hussein T | en_UK |
dc.date.accessioned | 2013-07-25T23:18:55Z | - |
dc.date.available | 2013-07-25T23:18:55Z | en_UK |
dc.date.issued | 2007 | en_UK |
dc.identifier.uri | http://hdl.handle.net/1893/15988 | - |
dc.description.abstract | Detection of nodes on the network boundary is necessary for correct operation in many wireless applications. Many virtual coordinate constructions rely on the furthest set of nodes as beacons, and sensing applications may find useful the knowledge of the network edge. In this paper we propose local convex view (lcv) as a means to identify nodes close to the network edge. It is based on the idea that -hulls can capture the shape of a set of points, and motivated by the hypothesis that some structural information relevant to the network is buried within view of many nodes. The lcv differs from most previous methods in that it is a localized algorithm. Nodes using lcv establish neighbourhood coordinates where no location information is available a priori. In those cases where needed information is missing, we adopt a simple probabilistic model to decide the boundary status of a node. We identify two metrics for evaluation, and compare via simulation the performance of lcv against two methods with similar properties. In our experiments we find lcv to be consistent in its performance, and resilient to the impediments facing other methods. | en_UK |
dc.language.iso | en | en_UK |
dc.publisher | School of Information Technology & Engineering, University of Ottawa | en_UK |
dc.relation | Fayed M & Mouftah HT (2007) Network Boundary Identification using Local Information. TR-2007-05. School of Information Technology & Engineering, University of Ottawa. | en_UK |
dc.relation.ispartofseries | TR-2007-05 | en_UK |
dc.rights | The publisher has not yet responded to our queries therefore this work cannot be made publicly available in this Repository. Please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study. | en_UK |
dc.rights.uri | http://www.rioxx.net/licenses/under-embargo-all-rights-reserved | en_UK |
dc.title | Network Boundary Identification using Local Information | en_UK |
dc.type | Technical Report | en_UK |
dc.rights.embargodate | 3000-12-01 | en_UK |
dc.rights.embargoreason | [Network Boundary Identification.pdf] The publisher has not yet responded to our queries. This work cannot be made publicly available in this Repository therefore there is an embargo on the full text of the work. | en_UK |
dc.citation.publicationstatus | Published | en_UK |
dc.type.status | VoR - Version of Record | en_UK |
dc.author.email | marwan.fayed@stir.ac.uk | en_UK |
dc.contributor.affiliation | Computing Science | en_UK |
dc.contributor.affiliation | University of Ottawa | en_UK |
dc.identifier.wtid | 690456 | en_UK |
dc.contributor.orcid | 0000-0002-0970-7972 | en_UK |
dcterms.dateAccepted | 2007-12-31 | en_UK |
dc.date.filedepositdate | 2013-07-25 | en_UK |
rioxxterms.type | Technical Report | en_UK |
rioxxterms.version | VoR | en_UK |
local.rioxx.author | Fayed, Marwan|0000-0002-0970-7972 | en_UK |
local.rioxx.author | Mouftah, Hussein T| | en_UK |
local.rioxx.project | Internal Project|University of Stirling|https://isni.org/isni/0000000122484331 | en_UK |
local.rioxx.freetoreaddate | 3000-12-01 | en_UK |
local.rioxx.licence | http://www.rioxx.net/licenses/under-embargo-all-rights-reserved|| | en_UK |
local.rioxx.filename | Network Boundary Identification.pdf | en_UK |
local.rioxx.filecount | 1 | en_UK |
Appears in Collections: | Computing Science and Mathematics Technical Reports |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Network Boundary Identification.pdf | Fulltext - Published Version | 437.72 kB | Adobe PDF | Under Embargo until 3000-12-01 Request a copy |
This item is protected by original copyright |
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/
If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.