Power Optimization in Fault-Tolerant Topology Control Algorithms for Wireless Multi-hop Networks

In ad hoc wireless networks, it is crucial to minimize power consumption while maintaining key network properties. This work studies power assignments of wireless devices that minimize power while maintaining k-fault tolerance. Specifically, we require all links established by this power setting be...

Full description

Saved in:
Bibliographic Details
Published inIEEE/ACM transactions on networking Vol. 15; no. 6; pp. 1345 - 1358
Main Authors Hajiaghayi, M.T., Immorlica, N., Mirrokni, V.S.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.12.2007
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1063-6692
1558-2566
DOI10.1109/TNET.2007.902680

Cover

Abstract In ad hoc wireless networks, it is crucial to minimize power consumption while maintaining key network properties. This work studies power assignments of wireless devices that minimize power while maintaining k-fault tolerance. Specifically, we require all links established by this power setting be symmetric and form a k-vertex connected subgraph of the network graph. This problem is known to be NP-hard. We show current heuristic approaches can use arbitrarily more power than the optimal solution. Hence, we seek approximation algorithms for this problem. We present three approximation algorithms. The first algorithm gives an O(kalpha)-approximation where is the best approximation factor for the related problem in wired networks (the best alpha so far is O(log k)). With a more careful analysis, we show our second (slightly more complicated) algorithm is an O(k)-approximation. Our third algorithm assumes that the edge lengths of the network graph form a metric. In this case, we present simple and practical distributed algorithms for the cases of 2- and 3-connectivity with constant approximation factors. We generalize this algorithm to obtain an O(k 2c+2 )-approximation for general k-connectivity (2 les c les 4 is the power attenuation exponent). Finally, we show that these approximation algorithms compare favorably with existing heuristics. We note that all algorithms presented in this paper can be used to minimize power while maintaining -edge connectivity with guaranteed approximation factors. Recently, different set of authors used the notion of k-connectivity and the results of this paper to deal with the fault-tolerance issues for static wireless network settings.
AbstractList [...] we show that these approximation algorithms compare favorably with existing heuristics.
In ad hoc wireless networks, it is crucial to minimize power consumption while maintaining key network properties. This work studies power assignments of wireless devices that minimize power while maintaining k- fault tolerance. Specifically, we require all links established by this power setting be symmetric and form a k-vertex connected subgraph of the network graph. This problem is known to be NP-hard. We show current heuristic approaches can use arbitrarily more power than the optimal solution. Hence, we seek approximation algorithms for this problem. We present three approximation algorithms. The first algorithm gives an O(kalpha)-approximation where is the best approximation factor for the related problem in wired networks (the best alpha so far is O(log k)). With a more careful analysis, we show our second (slightly more complicated) algorithm is an O(k)-approximation. Our third algorithm assumes that the edge lengths of the network graph form a metric. In this case, we present simple and practical distributed algorithms for the cases of 2- and 3-connectivity with constant approximation factors. We generalize this algorithm to obtain an O(k@@u2c+2@)-approximation for general k-connectivity (2 les c les 4 is the power attenuation exponent). Finally, we show that these approximation algorithms compare favorably with existing heuristics. We note that all algorithms presented in this paper can be used to minimize power while maintaining -edge connectivity with guaranteed approximation factors. Recently, different set of authors used the notion of k- connectivity and the results of this paper to deal with the fault-tolerance issues for static wireless network settings.
In ad hoc wireless networks, it is crucial to minimize power consumption while maintaining key network properties. This work studies power assignments of wireless devices that minimize power while maintaining k-fault tolerance. Specifically, we require all links established by this power setting be symmetric and form a k-vertex connected subgraph of the network graph. This problem is known to be NP-hard. We show current heuristic approaches can use arbitrarily more power than the optimal solution. Hence, we seek approximation algorithms for this problem. We present three approximation algorithms. The first algorithm gives an O(kalpha)-approximation where is the best approximation factor for the related problem in wired networks (the best alpha so far is O(log k)). With a more careful analysis, we show our second (slightly more complicated) algorithm is an O(k)-approximation. Our third algorithm assumes that the edge lengths of the network graph form a metric. In this case, we present simple and practical distributed algorithms for the cases of 2- and 3-connectivity with constant approximation factors. We generalize this algorithm to obtain an O(k 2c+2 )-approximation for general k-connectivity (2 les c les 4 is the power attenuation exponent). Finally, we show that these approximation algorithms compare favorably with existing heuristics. We note that all algorithms presented in this paper can be used to minimize power while maintaining -edge connectivity with guaranteed approximation factors. Recently, different set of authors used the notion of k-connectivity and the results of this paper to deal with the fault-tolerance issues for static wireless network settings.
In ad hoc wireless networks, it is crucial to minimize power consumption while maintaining key network properties. This work studies power assignments of wireless devices that minimize power while maintaining k-fault tolerance. Specifically, we require all links established by this power setting be symmetric and form a k-vertex connected subgraph of the network graph. This problem is known to be NP-hard. We show current heuristic approaches can use arbitrarily more power than the optimal solution. Hence, we seek approximation algorithms for this problem. We present three approximation algorithms. The first algorithm gives an O(kalpha)-approximation where is the best approximation factor for the related problem in wired networks (the best alpha so far is O(log k)). With a more careful analysis, we show our second (slightly more complicated) algorithm is an O(k)-approximation. Our third algorithm assumes that the edge lengths of the network graph form a metric. In this case, we present simple and practical distributed algorithms for the cases of 2- and 3-connectivity with constant approximation factors. We generalize this algorithm to obtain an O(k super(2c+2))-approximation for general k-connectivity (2 les c les 4 is the power attenuation exponent). Finally, we show that these approximation algorithms compare favorably with existing heuristics. We note that all algorithms presented in this paper can be used to minimize power while maintaining -edge connectivity with guaranteed approximation factors. Recently, different set of authors used the notion of k-connectivity and the results of this paper to deal with the fault-tolerance issues for static wireless network settings.
Author Immorlica, N.
Mirrokni, V.S.
Hajiaghayi, M.T.
Author_xml – sequence: 1
  givenname: M.T.
  surname: Hajiaghayi
  fullname: Hajiaghayi, M.T.
  organization: Massachusetts Inst. of Technol., Cambridge
– sequence: 2
  givenname: N.
  surname: Immorlica
  fullname: Immorlica, N.
  organization: Massachusetts Inst. of Technol., Cambridge
– sequence: 3
  givenname: V.S.
  surname: Mirrokni
  fullname: Mirrokni, V.S.
  organization: Massachusetts Inst. of Technol., Cambridge
BookMark eNp9kTFvFDEQRi0UJJJAj0RjUUC1x9hee-0yOiWAFBKKRZTG65tNHHzrxfYpCr-ePQ5RpEg1U7w30nzfCTma0oSEvGawYgzMh_7qvF9xgG5lgCsNz8gxk1I3XCp1tOygRKOU4S_ISSl3AEws2DH58TXdY6bXcw3b8NvVkCYaJnrhdrE2fYqY3VRpn-YU080DXaep5hTpWbxJOdTbbaFjyvR7yBixFPpl0UJzm2Z6hfU-5Z_lJXk-uljw1b95Sr5dnPfrT83l9cfP67PLxgspaiP9RnbSOC4HbsSo_KD0CMK3G-nlxrUceNd56YdxcFoCeDdoVEwjAnAvhTgl7w9355x-7bBUuw3FY4xuwrQrVhvFjFoSWch3T5KilVxy3S7g20fgXdrlafnCatUa1km2h9QB8jmVknG0PtS_OdbsQrQM7L4fu-_H7vuxh34WER6Jcw5blx-eUt4clICI__FWSMMUF38AawyeAw
CODEN IEANEP
CitedBy_id crossref_primary_10_1155_2012_429719
crossref_primary_10_1109_TNET_2007_910631
crossref_primary_10_3390_s151024735
crossref_primary_10_1155_2014_973163
crossref_primary_10_1109_ACCESS_2021_3115026
crossref_primary_10_1109_TNET_2009_2024941
crossref_primary_10_1016_j_jpdc_2012_04_007
crossref_primary_10_1109_JSEN_2016_2549543
crossref_primary_10_1007_s12555_013_0195_5
crossref_primary_10_1007_s11432_010_4101_y
crossref_primary_10_1016_j_comnet_2011_04_014
crossref_primary_10_3390_s140304672
crossref_primary_10_1109_ACCESS_2018_2877404
crossref_primary_10_1007_s11276_008_0133_2
crossref_primary_10_1109_TNET_2007_900410
crossref_primary_10_1016_j_pmcj_2009_05_001
crossref_primary_10_1016_j_tcs_2019_07_010
crossref_primary_10_1016_j_pmcj_2014_03_004
crossref_primary_10_1109_JIOT_2019_2938486
crossref_primary_10_1007_s10732_012_9202_x
crossref_primary_10_1109_ACCESS_2024_3420869
crossref_primary_10_1016_j_cor_2012_09_004
Cites_doi 10.1109/TMC.2006.139
10.1007/3-540-44436-X_20
10.1007/978-0-387-35608-2_7
10.1109/INFCOM.2000.832213
10.1145/513800.513816
10.1007/BF01304873
10.1145/509907.509955
10.1109/INFCOM.2003.1209241
10.1007/978-0-387-35608-2_11
10.1109/49.779917
10.1137/0405003
10.1007/s11276-005-6609-4
10.1145/129712.129786
10.1145/357195.357200
10.1109/TPDS.2006.51
10.1145/513800.513815
10.1145/383962.384043
10.1007/s004930170004
10.1006/jagm.1996.0052
10.1109/INFCOM.2001.916634
10.1109/WCNC.2003.1200675
10.1109/INFCOM.2001.916310
10.1016/0024-3795(89)90469-2
10.1145/1023720.1023747
10.1109/INFCOM.2005.1498495
10.1145/1062689.1062729
10.1007/BF01262051
10.1109/TPDS.2004.77
10.1016/S0304-3975(98)00223-0
10.1145/298151.298391
10.1109/ICCCN.2002.1043097
10.1007/11496915_26
10.1007/s10878-006-5980-0
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2007
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TNET.2007.902680
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database
Technology Research Database

Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2566
EndPage 1358
ExternalDocumentID 2338423281
10_1109_TNET_2007_902680
4359162
Genre orig-research
GroupedDBID -DZ
-~X
.DC
0R~
29I
4.4
5GY
5VS
6IK
85S
8US
97E
9M8
AAJGR
AAKMM
AALFJ
AARMG
AASAJ
AAWTH
AAWTV
ABAZT
ABPPZ
ABQJQ
ABVLG
ACGFS
ACGOD
ACIWK
ACM
ADBCU
ADL
AEBYY
AEFXT
AEJOY
AENSD
AETEA
AETIX
AFWIH
AFWXC
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AIKLT
AKJIK
AKQYR
AKRVB
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BDXCO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CCLIF
CS3
D0L
EBS
EJD
FEDTE
GUFHI
HF~
HGAVV
HZ~
H~9
I07
ICLAB
IEDLZ
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
LHSKQ
M43
MVM
O9-
OCL
P1C
P2P
PQQKQ
RIA
RIE
RNS
ROL
TN5
UPT
UQL
VH1
XOL
YR2
ZCA
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
RIG
F28
FR3
ID FETCH-LOGICAL-c353t-5cd5759a25b293f6cb68f03c4d5c5da420277c5cbfba8500cab8e618ee002c533
IEDL.DBID RIE
ISSN 1063-6692
IngestDate Thu Oct 02 11:00:14 EDT 2025
Sun Sep 28 13:33:02 EDT 2025
Mon Jun 30 02:56:54 EDT 2025
Thu Apr 24 22:52:56 EDT 2025
Wed Oct 01 02:31:50 EDT 2025
Tue Aug 26 16:47:22 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords Ad hoc networks
approximation algorithms
power conservation
topology control
graph properties
graph model
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c353t-5cd5759a25b293f6cb68f03c4d5c5da420277c5cbfba8500cab8e618ee002c533
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 864917514
PQPubID 23500
PageCount 14
ParticipantIDs proquest_miscellaneous_896196558
crossref_primary_10_1109_TNET_2007_902680
proquest_journals_864917514
proquest_miscellaneous_34525284
crossref_citationtrail_10_1109_TNET_2007_902680
ieee_primary_4359162
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2007-12-01
PublicationDateYYYYMMDD 2007-12-01
PublicationDate_xml – month: 12
  year: 2007
  text: 2007-12-01
  day: 01
PublicationDecade 2000
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE/ACM transactions on networking
PublicationTitleAbbrev TNET
PublicationYear 2007
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref34
ref37
ref15
ref36
ref14
ref31
ref30
ref33
ref32
clementi (ref12) 2002
ref2
ref1
ref38
ref16
ref19
kortsarz (ref23) 2000
clementi (ref10) 2001
ref24
ref26
clementi (ref13) 1999
hajiaghyi (ref17) 2005
ref20
zhang (ref39) 2005
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
kortsarz (ref18) 0
ref4
ref3
ref6
ref5
clementi (ref11) 2000
li (ref25) 2004
References_xml – ident: ref5
  doi: 10.1109/TMC.2006.139
– start-page: 194
  year: 2000
  ident: ref23
  article-title: approximating node connectivity problems via set covers
  publication-title: Proc 3rd Int Workshop on Approximation Algorithms for Combinatorial Optimization (APPROX)
  doi: 10.1007/3-540-44436-X_20
– start-page: 143
  year: 2000
  ident: ref11
  article-title: the minimum range assignment problem on linear radio networks
  publication-title: Proc 8th Annu European Symp Algorithms (ESA)
– start-page: 23
  year: 2002
  ident: ref12
  article-title: some recent theoretical advances and open questions on energy consumption in ad-hoc wireless networks
  publication-title: Proc 3rd Workshop on Approximation and Randomization Algorithms in Communication Networks (ARACNE)
– ident: ref4
  doi: 10.1007/978-0-387-35608-2_7
– ident: ref33
  doi: 10.1109/INFCOM.2000.832213
– ident: ref28
  doi: 10.1145/513800.513816
– ident: ref35
  doi: 10.1007/BF01304873
– ident: ref9
  doi: 10.1145/509907.509955
– ident: ref8
  doi: 10.1109/INFCOM.2003.1209241
– start-page: 121
  year: 2001
  ident: ref10
  article-title: a worst-case analysis of an mst based herustic on construct energy-efficient broadcast trees in wireless networks
  publication-title: Proc 18th Annual Symp Theoretical Aspects of Computer Science (STACS)
– ident: ref7
  doi: 10.1007/978-0-387-35608-2_11
– ident: ref34
  doi: 10.1109/49.779917
– ident: ref14
  doi: 10.1137/0405003
– ident: ref29
  doi: 10.1007/s11276-005-6609-4
– ident: ref24
  doi: 10.1145/129712.129786
– ident: ref16
  doi: 10.1145/357195.357200
– ident: ref31
  doi: 10.1109/TPDS.2006.51
– ident: ref27
  doi: 10.1145/513800.513815
– ident: ref26
  doi: 10.1145/383962.384043
– ident: ref19
  doi: 10.1007/s004930170004
– ident: ref21
  doi: 10.1006/jagm.1996.0052
– ident: ref38
  doi: 10.1109/INFCOM.2001.916634
– ident: ref1
  doi: 10.1109/WCNC.2003.1200675
– ident: ref36
  doi: 10.1109/INFCOM.2001.916310
– ident: ref15
  doi: 10.1016/0024-3795(89)90469-2
– start-page: 197
  year: 1999
  ident: ref13
  article-title: hardness results for the power range assignment problem in packet radio networks
  publication-title: Proc 2nd Int Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX)
– start-page: 275
  year: 2004
  ident: ref25
  article-title: flss: a fault-tolerant topology control algorithm for wireless networks
  publication-title: Proc 10th Annu Int Conf Mobile Computing and Networking (MOBICOM)
  doi: 10.1145/1023720.1023747
– ident: ref20
  doi: 10.1109/INFCOM.2005.1498495
– ident: ref6
  doi: 10.1145/1062689.1062729
– ident: ref32
  doi: 10.1007/BF01262051
– year: 2005
  ident: ref39
  article-title: on the critical total power for asymptotic k-connectivity in wireless networks
  publication-title: Proc IEEE InfoCom
– ident: ref30
  doi: 10.1109/TPDS.2004.77
– ident: ref22
  doi: 10.1016/S0304-3975(98)00223-0
– ident: ref3
  doi: 10.1145/298151.298391
– year: 0
  ident: ref18
  publication-title: Power optimization for network design problems
– ident: ref2
  doi: 10.1109/ICCCN.2002.1043097
– start-page: 349
  year: 2005
  ident: ref17
  article-title: power optimization for connectivity problems
  publication-title: Proc 11th Int Integer Programming and Combinatorial Optimization Conf (IPCO)
  doi: 10.1007/11496915_26
– ident: ref37
  doi: 10.1007/s10878-006-5980-0
SSID ssj0013026
Score 2.1052778
Snippet In ad hoc wireless networks, it is crucial to minimize power consumption while maintaining key network properties. This work studies power assignments of...
[...] we show that these approximation algorithms compare favorably with existing heuristics.
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1345
SubjectTerms Ad hoc networks
Algorithm design and analysis
Algorithms
Approximation
Approximation algorithms
Attenuation
Connectivity
Control algorithms
Costs
Distributed algorithms
Energy consumption
Fault tolerance
graph model
graph properties
Graphs
Heuristic
Mathematical analysis
Network topology
Networks
Optimization
power conservation
Spread spectrum communication
Studies
topology control
Wireless communication
Wireless networks
Title Power Optimization in Fault-Tolerant Topology Control Algorithms for Wireless Multi-hop Networks
URI https://ieeexplore.ieee.org/document/4359162
https://www.proquest.com/docview/864917514
https://www.proquest.com/docview/34525284
https://www.proquest.com/docview/896196558
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-2566
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0013026
  issn: 1063-6692
  databaseCode: RIE
  dateStart: 19930101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5RTvTQB1A1pQ8feqlU7wYcO84RIVaoEguHIHELfqUgQoLY5AC_vmM7u0VtqbhFykSJMvY8PDPfB_DVg85hWJ1TrWpNsyJLqc6ZoirHlEUXjuXOJ4rHc3F0lv045-dr8H01C-OcC81nbuIvQy3fdmbwR2VTdO0YzaDBfZFLEWe1flcM0kCthhkOo0IUe8uSZFpMy_lhGcEKCxTyAJCPXFDgVPnLEAfvMnsNx8vvik0l15Oh1xPz8Adk43M__A28GsNMsh_XxVtYc-0mvHwEPrgFF6eeII2coM24GYcxyVVLZmpoelp2jUMv1pMykijck4PY0072m5_d3VV_ebMgGO8S3z3boLUkYZKXXna3ZB47yxfbcDY7LA-O6Mi3QA3jrKfcWE_Xqfa4xiCgFkYLWafMZJYbblXmz0lyw42utZI8TY3S0old6RyaVYNx4ztYb7vWvQfC3a5MmbVa5JiCSKFsUTtrGWO6VlrLBKZLFVRmBCP3nBhNFZKStKi80jxHZl5FpSXwbfXEbQTi-I_sltfBSm78_QnsLLVcjTt1UUmRYcaKYWMCX1Z3cYv5uolqXTcsKuZrv-jGEyBPSMhCeGRGLj_8-807sBHOhEMbzEdY7-8G9wmDmV5_Dqv4Fx3l8oA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB5V5QAceBVEKFAfuCDh3bR-xDlWVVcLdBcOqdRb8CttRZpU3eQAv56xk10qXuIWKRMlytjz8Mx8H8CbADqHYXVGja4M5TlPqcmYpjrDlMXknmU-JIqLpZyf8g9n4mwL3m1mYbz3sfnMT8JlrOW71vbhqGyKrh2jGTS4dwTnXAzTWj9rBmkkV8Mch1Ep84N1UTLNp8XyuBjgCnMUChCQt5xQZFX5zRRH_zJ7CIv1lw1tJV8nfWcm9vsvoI3_--mP4MEYaJLDYWU8hi3fPIH7t-AHd-DL50CRRj6h1bgaxzHJZUNmuq87WrS1Rz_WkWKgUfhGjoaudnJYn7c3l93F1YpgxEtC_2yN9pLEWV560V6T5dBbvnoKp7Pj4mhOR8YFaplgHRXWBcJOfSAMhgGVtEaqKmWWO2GF0zyclGRWWFMZrUSaWm2Ul_vKezSsFiPHZ7DdtI1_DkT4fZUy54zMMAlRUru88s4xxkyljVEJTNcqKO0IRx5YMeoypiVpXgalBZbMrByUlsDbzRPXAxTHP2R3gg42cuPvT2B3reVy3KurUkmOOSsGjgnsbe7iJguVE934tl-VLFR_0ZEnQP4ioXIZsBmFevHnN-_B3XmxOClP3i8_7sK9eEIcm2JewnZ30_tXGNp05nVc0T8A8DD1zQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Power+Optimization+in+Fault-Tolerant+Topology+Control+Algorithms+for+Wireless+Multi-hop+Networks&rft.jtitle=IEEE%2FACM+transactions+on+networking&rft.au=Hajiaghayi%2C+M.T.&rft.au=Immorlica%2C+N.&rft.au=Mirrokni%2C+V.S.&rft.date=2007-12-01&rft.issn=1063-6692&rft.eissn=1558-2566&rft.volume=15&rft.issue=6&rft.spage=1345&rft.epage=1358&rft_id=info:doi/10.1109%2FTNET.2007.902680&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TNET_2007_902680
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6692&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6692&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6692&client=summon