Qualifying explore and exploit for efficient data dissemination in emergency adhoc networks

Panayiotis Kolios, Andreas Pitsillides, Osnat Mokryn, Katerina Papadaki

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The literature of wireless adhoc networks includes a plethora of alternative dissemination strategies that aim for efficient delivery of data traffic from source to destination. Hence, the majority of these strategies assume that the source-destination pair is known prior to any data forwarding. On the contrary, an adhoc network opportunistically formed by mobile devices in the aftermath of a disaster, lacks any actual knowledge with respect to the network topology and the response units' availability. As such, distress nodes need to first understand their topological status in order to then be able to make informed forwarding decisions for alert message dissemi-nation. The Explore and Exploit strategy, described hereafter, is purposefully envisioned to solve the latter issues and meet the stringent requirements for highly efficient data dissemination.

Original languageEnglish
Title of host publicationIEEE International Conference on Pervasive Computing and Communications (PERCOM Workshop)
Pages303-307
Number of pages5
DOIs
StatePublished - 2014
Event2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014 - Budapest, Hungary
Duration: 24 Mar 201428 Mar 2014

Conference

Conference2014 IEEE International Conference on Pervasive Computing and Communication Workshops, PERCOM WORKSHOPS 2014
Country/TerritoryHungary
CityBudapest
Period24/03/1428/03/14

Keywords

  • Adhoc Com-munications
  • Complex Network Science
  • Data Dissemination
  • Emergency Response Networking

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Qualifying explore and exploit for efficient data dissemination in emergency adhoc networks'. Together they form a unique fingerprint.

Cite this