Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 465369, 10 pages
http://dx.doi.org/10.1155/2013/465369
Research Article

A Data Forwarding Scheme Based on Delaunay Triangulation for Cyber-Physical Systems

School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China

Received 18 November 2012; Accepted 17 March 2013

Academic Editor: Igor Andrianov

Copyright © 2013 Junhai Luo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Chen, R. Tan, G. Xing, X. Wang, and X. Fu, “Fidelity-aware utilization control for cyber-physical surveillance systems,” in Proceedings of the 31st IEEE Real-Time Systems Symposium (RTSS '10), pp. 117–126, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. W. He, X. Liu, L. Zheng, and H. Yang, “Reliability calculus: a theoretical framework to analyze communication reliability,” in Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS '10), pp. 159–168, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Parolini, N. Tolia, B. Sinopoli, and B. H. Krogh, “A cyber-physical systems approach to energy management in data centers,” in Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS '10), pp. 168–177, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. L. Sha and J. Meseguer, “Software-intensive systems and new computing paradigms,” in Design of Complex Cyber Physical Systems with Formalized Architectural Patterns, pp. 92–100, 2008. View at Google Scholar
  5. J. Luo, X. Liu, and M. Fan, “A trust model based on fuzzy recommendation for mobile ad-hoc networks,” Computer Networks, vol. 53, no. 14, pp. 2396–2407, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. M. Keally, G. Zhou, and G. Xing, “Sidewinder: a predictive data forwarding protocol for mobile wireless sensor networks,” in Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '09), pp. 538–546, June 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Feng, H. Gong, M. Fan, M. Liu, and X. Wang, “A distance-aware replica adaptive data gathering protocol for delay tolerant mobile sensor networks,” Sensors, vol. 11, no. 4, pp. 4104–4117, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. J. Zhu, M. Liu, J. Cao, G. Chen, H. Gong, and F. Xu, “CED: a community-based event delivery protocol in publish/subscribe systems for Delay Tolerant Sensor Network (DTSN),” in Proceedings of the 38th International Conference on Parallel Processing (ICPP '09), pp. 58–65, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. J. M. Soares and R. M. Rocha, “CHARON: routing in low-density opportunistic wireless sensor networks,” in Proceedings of the 2nd IFIP Wireless Days (WD '09), pp. 260–264, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Ahmadi, T. Abdelzaher, J. Han, N. Pham, and R. K. Ganti, “The sparse regression cube: a reliable modeling technique for open cyber-physical systems,” in Proceedings of the IEEE/ACM 2nd International Conference on Cyber-Physical Systems (ICCPS '11), pp. 87–96, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. J. M. Soares, M. Franceschinis, R. M. Rocha, W. Zhang, and M. A. Spirito, “Opportunistic data collection in sparse wireless sensor networks,” Eurasip Journal on Wireless Communications and Networking, vol. 2011, Article ID 401802, 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Wang and H. Wu, “Delay/fault-tolerant mobile sensor network (DFT-MSN): a new paradigm for pervasive information gathering,” IEEE Transactions on Mobile Computing, vol. 6, no. 9, pp. 1021–1034, 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: an efficient routing scheme for intermittently connected mobile networks,” in Proceedings of the ACM SIGCOMM Workshops: Conference on Computer Communications, pp. 252–259, August 2005. View at Scopus
  14. E. J. JebaJothi, V. Kavitha, and T. Kavitha, “Contention based routing in mobile ad hoc networks with multiple copies,” CoRR abs/1005.4009.
  15. D. Satyanarayana and S. V. Rao, “Constrained delaunay triangulation for ad hoc networks,” Journal of Computer Systems, Networks, and Communications, vol. 2008, Article ID 160453, 10 pages, 2008. View at Publisher · View at Google Scholar
  16. M. B. Haider and K. Sugihara, “Almost Delaunay triangulation routing in wireless sensor networks,” in Proceedings of the 10th International Conference on Computer and Information Technology (ICCIT '07), pp. 1–7, December 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. J. Zhu, J. Cao, M. Liu, Y. Zheng, H. Gong, and G. Chen, “A mobility prediction-based adaptive data gathering protocol for delay tolerant mobile sensor network,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08), pp. 730–734, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Abdulla and R. Simon, “The impact of the mobility model on delay tolerant networking performance analysis,” in Proceedings of the 40th Annual Simulation Symposium (ANSS '07), pp. 177–184, March 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Xu and M. Liu, “A motion tendency-based adaptive data delivery scheme for delay tolerant mobile sensor networks,” in Proceedings of the 28th IEEE Conference on Global telecommunications (GLOBECOM ’09), pp. 3978–3983, 2009.
  20. A. Deshpande, Z. Ives, and V. Raman, “Adaptive query processing,” Foundations and Trends in Databases, vol. 1, pp. 1–140, 2007. View at Google Scholar
  21. L. Wang and A. Deshpande, “Predictive modeling-based data collection in wireless sensor networks,” Lecture Notes in Computer Science, vol. 4913, pp. 34–51, 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. 2011, http://www.isi.edu/nsnam/ns/doc/node218.html.
  23. G. Xing, X. Chang, C. Lu et al., “Efficient coverage maintenance based on probabilistic distributed detection,” IEEE Transactions on Mobile Computing, vol. 9, no. 9, pp. 1346–1360, 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. D. P. Arvind, A. Arasu, B. Babcock et al., “Stream: the stanford stream data manager,” IEEE Data Engineering Bulletin, vol. 26, no. 2003, 2003. View at Google Scholar