|
[1] “IEEE 802.16 working group, part 16: Air interface for fixed and mobile broadband wireless access systems-multihop relay specification,” IEEE Draft Standard, 2007. [2] The Dharamsala Community Wireless Mesh Network. [Online]. Available: http://drupal.airjaldi.com/node/56 [3] Technology and infrastructure for emerging regions (TIER). [Online]. Available:http://tier.cs.berkeley.edu/wiki/ [4] D. Johnson, “Evaluation of a single radio rural mesh network in South Africa,”in ICTD, 2007. [5] K. Chebrolu and B. Raman, “Fractel: a fresh perspective on (rural) mesh networks,” in ACM SIGCOMM Workshop on Networked Systems for Developing Regions (NSDR), 2007. [6] P. Dutta, S. Jaiswal, and R. Rastogi, “Routing and channel allocation in rural wireless mesh networks,” in IEEE INFOCOM, 2007. [7] Community Wireless Solutions (CUWIN). [Online]. Available: http://www.cuwin.org/ [8] J. W. S. Liu, C. S. Shih, and E. T. H. Chu, “Cyber-physical elements of disaster prepared smart environment,” Institute of Information Science, Academia Sinica, Tech. Rep. TR-IIS-11-001. [9] G. L. Nemhauser, L. A.Wolsey, and M. L. Fisher, “An analysis of approximations for maximizing submodular set functions-I,” Mathematical Programming, vol. 14, pp. 265–294, 1978. [10] M. Sviridenko, “A note on maximizing a submodular set function subject to a knapsack constraint,” Operations Research Letters, vol. 32, pp. 41–43, 2004. [11] A. Krause and C. Guestrin, “A note on the budgeted maximization of submodular functions,” School of Computer Science, Carnegie Mellon University, Tech. Rep. CMU-CALD-05-103. [12] S. Khuller, A.Moss, and J. S. Naor, “The budgeted maximum coverage problem,”Information Processing Letters, vol. 70, pp. 39–45, 1999. [13] H. Gupta, Z. Zhou, S. Das, and Q. Gu, “Connected sensor cover: self-organization of sensor networks for efficient query execution,” IEEE/ACM Transactions on Networking, vol. 14, pp. 55–67, 2006. [14] S. Funke, A. Kesselman, F. Kuhn, Z. Lotker, and M. Segal, “Improved approximation algorithms for connected sensor cover,” Wireless Networks, vol. 13, pp. 153–164, 2007. [15] K. Kar and S. Banerjee, “Node placement for connected coverage in sensor networks,” in WiOpt, 2003. [16] G. Borradaile, B. Heeringa, and G. T. Wilfong, “Approximation algorithms for constrained knapsack problems,” CoRR, abs/0910.0777, 2009. [17] F. Vandin, E. Upfal, and B. J. Raphael, “Algorithms for detecting significantly mutated pathways in cancer,” Journal of Computational Biology, vol. 18, pp. 507–522, 2011. [18] A. Krause, C. Guestrin, A. Gupta, and J. Kleinberg, “Near-optimal sensor placements: maximizing information while minimizing communication cost,” in ACM/IEEE IPSN, 2006. [19] D. S. Johnson, M. Minkoff, and S. Phillips, “The prize collecting steiner tree problem: Theory and practice,” in ACM-SIAM SODA, 2000. [20] L. Lovasz, “Submodular functions and convexity,” Mathematical Programming: The State of the Art, pp. 235–257, 1983. [21] J. E. Knight, “Some remarks concerning finitely subadditive outer measures with applications,” International Journal of Mathematics and Mathematical Sciences, vol. 21, pp. 653–669, 1998. [22] B. N. Clark, C. J. Colbourn, and D. S. Johnson, “Unit disk graphs,” Discrete Mathematics, vol. 86, pp. 165–177, 1990. [23] S. Misra, S. D. Hong, G. Xue, and J. Tang, “Constrained relay node placement in wireless sensor networks to meet connectivity and survivability requirements,” in IEEE INFOCOM, 2008. [24] D. B. West, Introduction to Graph Theory. Upper Saddle River, NJ, USA: Prentice Hall, 2000. [25] R. V. Vohra and N. G. Hall, “A probabilistic analysis of the maximal covering location problem,” Discrete Applied Mathematics, vol. 43, pp. 175–183, 1993. [26] D. Agrawal and Q. Zeng, Introduction to Wireless and Mobile Systems. Toronto, Ontario, Canada: Thomson Nelson, 2006. [27] 802.11b PHY Simulink Model. [Online]. Available: http://www.mathworks.com/matlabcentral/fileexchange/2262 [28] [Online]. Available: http://www.czone2.tcg.gov.tw/ |