TY - GEN
T1 - Exploiting opportunistic overhearing to improve performance of mutual exclusion in wireless ad hoc networks
AU - Hosseinabadi, Ghazale
AU - Vaidya, Nitin H.
PY - 2012/6/5
Y1 - 2012/6/5
N2 - We design two mutual exclusion algorithms for wireless networks. Our mutual exclusion algorithms are distributed token based algorithms which exploit the opportunistic message overhearing in wireless networks. One of the algorithms is based on overhearing of token transmission. In the other algorithm, overhearing of both token and request messages is exploited. The design goal is to decrease the number of transmitted messages and delay per critical section entry using the information obtained from overheard messages.
AB - We design two mutual exclusion algorithms for wireless networks. Our mutual exclusion algorithms are distributed token based algorithms which exploit the opportunistic message overhearing in wireless networks. One of the algorithms is based on overhearing of token transmission. In the other algorithm, overhearing of both token and request messages is exploited. The design goal is to decrease the number of transmitted messages and delay per critical section entry using the information obtained from overheard messages.
KW - Wireless networks
KW - mutual exclusion
KW - opportunistic overhearing
UR - http://www.scopus.com/inward/record.url?scp=84861687208&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84861687208&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-30630-3_14
DO - 10.1007/978-3-642-30630-3_14
M3 - Conference contribution
AN - SCOPUS:84861687208
SN - 9783642306297
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 162
EP - 173
BT - Wired/Wireless Internet Communication - 10th International Conference, WWIC 2012, Proceedings
T2 - 10th International Conference on Wired / Wireless Internet Communications, WWIC 2012
Y2 - 6 June 2012 through 8 June 2012
ER -