Approximation Algorithms for Maximum Weight Independent Set of Links Under the SINR Model

March 2013
Adhoc & Sensor Wireless Networks;2013, Vol. 17 Issue 3/4, p293
Academic Journal
We study the following optimization problem in a plane multihop wireless network under the physical interference model. Given a multi-hop wireless network and a positive link weight (or demand) function, select a set of independent links whose total weight is maximized. This problem is known to be NP-hard. The best known approximation algorithms for this problem achieved logarithmic-factor approximation bounds with either the uniform power assignment or the power control setting. In this paper, we present two approximation algorithms for the problem with pre-specified power assignments. The first algorithm uses the oblivious power assignment and achieves constant approximation bound under certain mild assumptions. The second algorithm achieves constant approximation bound when the link weight-to-length ratio is bounded. Moreover, our constant approximation bounds are valid regardless of the value of the noise power.


Related Articles

  • Connectivity and Coverage Preserving Schemes for Surveillance Applications in WSN. Sharma, Lokesh; Singh, Jaspreet; Agnihotri, Swati // International Journal of Computer Applications;7/15/2012, Vol. 50, p33 

    In applications such as surveillance and target monitoring, high degree of coverage and connectivity are required. This paper investigates the problem of energy efficient coverage and connectivity for random placement of nodes such that active sensor nodes are minimized. We introduce an...

  • Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks. Fiaz, Mahzeb; Yousaf, Roomana; Hanfi, Maryam; Asif, Waqar; Qureshi, Hassaan; Rajarajan, Muttukrishnan // Wireless Personal Communications;Jan2014, Vol. 74 Issue 2, p989 

    Topology control is a technique used in wireless sensor networks to maximize energy efficiency and network lifetime. In previous literature, many tree based techniques have been proposed to save energy and increase the network lifetime. In tree based algorithms, the most promising solution is...

  • E-commerce gets SET. Radcliff, Deborah // Software Magazine;Jun97, Vol. 17 Issue 6, p86 

    Focuses on the transaction encryption standard called Secure Electronic Transactions (SET) for electronic commerce. Amount of sales transactions which occurred on the Internet in 1996; Reason for the drafting of SET; SET compared to Secure Sockets Layer (SSL). INSETS: Online banking...

  • How it works. Whiting, Rick // Software Magazine;Aug97, Vol. 17 Issue 9, p94 

    Focuses on Secure Electronic Transaction (SET), an industry-wide protocol designed to safely transmit sensitive personal and financial information over public network including Internet. Information about the glossary of SET; Keys used by SET to encrypt payment information; Main entities...

  • IQ news. Taylor, Catharine P. // Adweek Midwest Edition;12/01/97, Vol. 38 Issue 48, p47 

    Reports on obstacles facing the Secure Electronic Transaction computer network protocol which aims to streamline Internet commerce.

  • Criticism (or is it heresy?) dogs the SET protocol.  // American Banker;2/18/1997, Vol. 162 Issue 32, p2A 

    Focuses on criticisms against the Secure Electronic Transactions (SET) specification for Internet credit card payments. Cybercash Inc. chief executive officer William Melton's complaint about SET's slow-paced, standards-like consensus and acceptance process; Optimism of MasterCard and Visa about...

  • New security protocol spurs Internet tool kits. Moeller, Michael; Kerstetter, Jim // PC Week;4/15/96, Vol. 13 Issue 15, p1 

    Features the upgraded version of the computer network called the Secure Electronic Transaction (SET) designed to spark Internet commerce application development. Joint venture by Microsoft Corp., RSA Data Security Inc. and Terisa Systems Inc.; Creation of client and server applications;...

  • IQ news. Taylor, Catharine P. // MediaWeek;12/01/97, Vol. 7 Issue 45, p47 

    Reports that there are more obstacles facing the Secure Electronic Transaction (SET) protocol. Concern on the cost and time involved in using SET; Reflection of the move beyond the security of Internet commerce.

  • Vendors back SET protocol with product announcements. Jones, Chris // InfoWorld;02/03/97, Vol. 19 Issue 5, p14 

    Focuses on the number of computer vendors that demonstrated their support for the Secure Electronic Transactions (SET) protocol. Release of the SET reference implementation called the SETREF; Plans for SET projects in Asia and Europe.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics