<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Optimal Fault-Tolerant Placement of Relay Nodes in a Mission Critical Wireless Network</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Toni Mancini</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Enrico Tronci</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Agostino Scialanca</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Filiberto Lanciotti</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alberto Finzi</string-name>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Riccardo Guarneri</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Silvia Di Pompeo</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Science Department, Sapienza University of Rome</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Log.In s.r.l. Servizi e Sistemi Avanzati per l'Elettronica</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Ministero dell'Interno</institution>
          ,
          <addr-line>Dipartimento della Pubblica Sicurezza</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Roma Capitale</institution>
          ,
          <addr-line>Dipartimento dei Servizi Educativi e Scolastici</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>University of Naples Federico II, Department of Electrical Engineering and Information Technology</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>The operations of many critical infrastructures (e.g., airports) heavily depend on proper functioning of the radio communication network supporting operations. As a result, such a communication network is indeed a mission-critical communication network that needs adequate protection from external electromagnetic interferences. This is usually done through radiogoniometers. Basically, by using at least three suitably deployed radiogoniometers and a gateway gathering information from them, sources of electromagnetic emissions that are not supposed to be present in the monitored area can be localised. Typically, relay nodes are used to connect radiogoniometers to the gateway. As a result, some degree of fault-tolerance for the network of relay nodes is essential in order to offer a reliable monitoring. On the other hand, deployment of relay nodes is typically quite expensive. As a result, we have two conflicting requirements: minimise costs while guaranteeing a given fault-tolerance. In this paper address the problem of computing a deployment for relay nodes that minimises the relay node network cost while at the same time guaranteeing proper working of the network even when some of the relay nodes (up to a given maximum number) become faulty (fault-tolerance). We show that the above problem can be formulated as a Mixed Integer Linear Programming (MILP) as well as a Pseudo-Boolean Satisfiability (PB-SAT) optimisation problem and present experimental results comparing the two approaches on realistic scenarios.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>gate. In such a case, communication between the air traffic control tower,
vehicles and personnel moving in the airport area takes place through VHF/UHF
radio. In such a situation, an electromagnetic attack (e.g., through jamming )
preventing communication between the air traffic control tower and aircraft will
degrade the operations of the airport itself.</p>
      <p>Accordingly, the area where the mission-critical communication network is
deployed is typically monitored in order to detect spurious electromagnetic
emissions and localise the source of such emissions (transmitter ). This is usually
done using radiogoniometers. Basically, by using at least three suitably deployed
radiogoniometers and a gateway gathering information from them, sources of
electromagnetic emissions that are not supposed to be present in the monitored
area can be localised.
1.1</p>
    </sec>
    <sec id="sec-2">
      <title>Motivations</title>
      <p>Unfortunately, effective deployment of radiogoniometers is all but easy. In fact,
communication between the radiogoniometers and the gateway must use a
spectrum that does not interfere with that used within the infrastructure under
protection. For this purpose, often communication between radiogoniometers and
the gateway rests on an unlicensed spectrum such as WiFi.</p>
      <p>This has far-reaching implications. In fact, because of the limitations on
the transmission power for WiFi channels, for a large area like a big airport,
communication between the radiogoniometers and the gateway is typically not
possible with a single hop. Accordingly, relay nodes need to be deployed in the
area to ensure that radiogoniometers can always communicate with the gateway,
possibly through several hops.</p>
      <p>Of course in such a situation, reliability of the network of relay nodes becomes
essential. This means that relay nodes must be deployed by aiming at achieving
a given fault-tolerance for the relay network. Namely, we must ensure that even
if a maximum given number of relay nodes become faulty, all radiogoniometers
are still able to send their information to the gateway.</p>
      <p>Installing a relay node entails two kinds of costs. First, that of the devices
of which it consists (antennas, amplifiers, etc.) Second, and perhaps more
important, the installation cost. The latter may be quite relevant for a critical
infrastructure. For example, installing a relay node in an airport may entail
installing antennas in a ground movement area.</p>
      <p>The above considerations motivate research on effective methods to compute
placements for relay nodes that minimise cost while at the same time
guaranteeing a given fault tolerance for the network of relay nodes.
1.2</p>
    </sec>
    <sec id="sec-3">
      <title>Contributions</title>
      <p>In this paper we present Mixed Integer Linear Programming (MILP)–based and
Pseudo-Boolean Satisfiability (PB-SAT) optimisation algorithms for optimal and
fault-tolerant placement of relay nodes.</p>
      <p>The main obstacle to be overcome is the huge number of constraints needed
to model the problem. In fact, in order to maximise the transmission distance
(without exceeding WiFi transmission power limits) we use directional antennas
on relay nodes. As a result, to compute radio-visibility between two network
nodes, we need to represent terrain orography. Since the monitored area is of
several squared kilometres, we will have many cells to consider in the discrete
grid representing orography for the monitored area.</p>
      <p>Our algorithm takes as input: the technical (e.g., max transmission power,
antenna specifications, etc.) and economical (e.g., cost of devices and
installation) characteristics of the relay nodes; the orography of the area to be monitored
(e.g., hills, buildings, runways, etc.); constraints on where relay nodes may be
installed; desired fault-tolerance F .</p>
      <p>Our algorithm returns as output, for each relay node, a routing policy and a
placement that minimises the network cost and guarantees that radiogoniometers
are connected with the gateway even if F relay nodes become faulty.</p>
      <p>We present:
1. Formulations for our MILP as well as PB-SAT optimisation problems;
2. Implementation for our tools;
3. Experimental results comparing the two approaches on a real case study
from the geographic area of the Leonardo da Vinci Airport in Rome (Italy).</p>
      <p>Our experimental results show that covering an area of several squared
kilometres with hundreds of cells generates a MILP problem that can be solved
within hours of computation on a commodity PC.
2</p>
      <sec id="sec-3-1">
        <title>State of the art</title>
        <p>
          A survey on node placement in wireless sensor networks is in [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ]. None of the
methods discussed in [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ] focus on minimising network cost while at the same
time guaranteeing network connectivity notwithstanding loss (faults) of up to
a given number of relay nodes. We note that random deployment structurally
achieves some degree of fault tolerance, but on one side the network cost is far
from being minimal and on the other side no (deterministic) guarantee on the
number of faults that the network can withstand can be given a priori.
        </p>
        <p>
          An artificial bee colony algorithm for optimal placement of relay nodes in
wireless sensor networks has been presented in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. The goal of [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] is that of
reducing the communication holes stemming from randomly-placed relay nodes.
The results in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] show that indeed a clever positioning of relay nodes decreases
the network energy consumption. Unfortunately, the methods in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] cannot be
directly used in our context since energy is not a concern for us, whereas our
goal is to minimise network cost while guaranteeing a given fault tolerance.
        </p>
        <p>
          The relationship between energy consumption of network relay nodes and
routing strategies is studied in [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] as a maximum flow problem. There, fault
tolerance is addressed from a statistical point of view: as relay nodes are
inexpensive, a sufficiently high number of them is deployed randomly to guarantee
high enough probability of the existence of multiple routes from each node to the
gateway. On the other hand, in our setting relay nodes are expensive, hence we
are required to guarantee fault tolerance under minimum overall placement cost.
Also, our nodes are connected to the electrical grid. This means they do not have
energy problems, although they must be deployed in areas where connection to
the grid is available.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] a 2D model for directional antennas is presented. Although we are
also using directional antennas, we need to take into proper account also ground
elevation and the presence of obstacles in the area of interest.
        </p>
        <p>
          Much research work has focused on routing through relay nodes with a known
given position (e.g., see [
          <xref ref-type="bibr" rid="ref1 ref31 ref32 ref4 ref8">1,32,4,31,8</xref>
          ]) or with a given network structure (e.g., see
[
          <xref ref-type="bibr" rid="ref11 ref17 ref34 ref36 ref5 ref7">11,5,34,7,17,36</xref>
          ]). Our scenario is quite different, since we have to compute at
the same time the position of the relay nodes as well as the routing strategy for
each relay node. Note that our solution also needs to define the orientation of
the unidirectional antennas hosted by each relay node.
        </p>
        <p>
          The transmission capacity of ad-hoc networks has been studied in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. In
our context, such results can be used to model transmission capacity between
sensor nodes (i.e., radiogoniometers ) and gateway nodes.
        </p>
        <p>
          Modelling of radio communication obstacles in a real environment has been
studied in [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Such results can be also be used in our context to model static
transmission obstacles such as walls, hills, etc.
        </p>
        <p>
          Network traffic, congestion and interference have been analysed in [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] using a
Mixed Integer Linear Programming (MILP)-based approach. Genetic algorithms
for optimal node placement with omnidirectional antennas have been studied in
[
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. Such results cannot be used in out context since we are using unidirectional
antennas.
        </p>
        <p>
          Optimal positioning of relay nodes in a WiFi network (our setting) has been
studied e.g., in [
          <xref ref-type="bibr" rid="ref2 ref3 ref32">32,3,2</xref>
          ]. We note however that [
          <xref ref-type="bibr" rid="ref32">32</xref>
          ] does not address fault-tolerant
positioning, and [
          <xref ref-type="bibr" rid="ref2 ref3">3,2</xref>
          ] focuses on energy saving fault tolerant routing of
hierarchical networks.
        </p>
        <p>
          The work in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ], gives up optimality and presents heuristic methods for
faulttolerant positioning of relay nodes. Although we also ask for optimality, we can
use some of the considerations in [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] to restrict our search space.
        </p>
        <p>
          The work in [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] presents methods for optimal and robust (wrt. throughput
degradation) positioning of relay nodes. Although in our setting robustness in
[
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] is not the same as fault-tolerance, clearly the work in [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] is aiming towards
the same direction as ours.
        </p>
        <p>Summing up, although the are papers addressing optimal positioning of relay
nodes as well as papers addressing fault-tolerant positioning of relay nodes, to the
best of our knowledge there is no previously published work addressing optimal
fault-tolerant positioning of relay nodes.
3</p>
      </sec>
      <sec id="sec-3-2">
        <title>Problem requirements</title>
        <p>Our problem is to enable reliable and high-throughput communication between
radiogoniometer sensors placed throughout the Monitored Area (MA) of an
airport to a gateway, typically located at the air traffic control tower.</p>
        <p>As the MA is large (with edges that could be several kilometres long) and
because of several logistic constraints, a wired communication network is not
viable neither technically nor economically, and wireless communication must
be used. Also, given the long distances involved, and the need, due to regulatory
constraints, to use standard WiFi frequencies, intermediate relay antennas need
to be placed to enable multi-hop communication.</p>
        <p>The aim of our decision support tool is to compute an optimal placement of
relay antennas in the MA, in order to create the necessary infrastructure and
allow proper routing of the required network traffic from the radiogoniometer
sensors (placed near the runways) to the gateway (the air traffic control tower).</p>
        <p>Relay antennas are directional antennas. Hence, they are deployed in arrays
mounted on poles, as shown in Figure 1. Antennas mounted on the same pole
are pointed to different directions. Each antenna array is positioned at a given
elevation L from the ground (the height of the poles).</p>
        <p>The problem amounts to decide where in the MA and in which direction to
deploy relay antennas in order to satisfy all given requirements and minimising
the overall cost due to the devices and their deployment.</p>
        <p>In the following sections we describe the high-level problem requirements.
3.1</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Monitored Area definition</title>
      <p>The MA area typically has an irregular shape and a size of several squared
kilometres, going from, e.g., the runways to the air traffic control of an airport.
Also the terrain orography is irregular: different regions of the MA might show
different ground elevations, and obstacles of various kinds (e.g., buildings like
terminals or hangars, etc.) might exist.</p>
      <p>Radio visibility between points in the MA cannot be determined by simply
considering their Euclidean distance, because obstacles (e.g., buildings) and the
terrain orography (i.e., different elevation) must be considered as well. To this
end, we need to wisely model the terrain orography for our scenario.</p>
      <p>Terrain orography information is stored in available databases. In
particular, in our database, the MA is partitioned into convex polygons and a terrain
elevation value is associated to each such polygon.
3.2</p>
    </sec>
    <sec id="sec-5">
      <title>Forbidden placement and link areas</title>
      <p>Forbidden placement areas define those portions of the MA in which no relay
node can be placed. Forbidden link areas define those portions of the MA that
should not be traversed by radio transmission links.</p>
      <p>Forbidden placement areas stem from the existence of runways, taxiways,
holding areas, etc. in the MA in which no antenna can be installed, as well as
other requirements that impose that some regions are kept clear, due to technical
or regulatory constraints. Forbidden link areas stem from, e.g., technical or safety
requirements (for example, to avoid interference with other radio networks in the
airport).</p>
      <p>Both forbidden placement and forbidden link areas are defined in our database
as a set of convex polygons lying within the MA.
3.3</p>
    </sec>
    <sec id="sec-6">
      <title>Deployment costs</title>
      <p>The cost of placing a pole to enable installation of an antenna array is not
constant throughout the MA, as it might depend on several parameters (e.g.,
the accessibility of the chosen point for maintenance).</p>
      <p>Our database defines such costs by associating pole placement costs to convex
polygons contained in the MA. On the other hand, once a support pole has been
deployed, installing a single directional antenna on it has a fixed cost.
3.4</p>
    </sec>
    <sec id="sec-7">
      <title>Radio visibility requirements</title>
      <p>Radio visibility requirements state the conditions that must be met by the
placement of pairs of directional relay antennas for their network links to work
satisfactorily.</p>
      <p>In particular, radio communication between two (properly-oriented) antennas
in points (x; y) and (x0; y0) of the MA (at elevation points h and h0 as stated
by the terrain orography and the height of the holding poles) is considered
impossible/unsatisfactory not only if the 3D Euclidean distance between them
is longer than a given threshold, but also if the relevant Fresnel Ellipsoid (FE)
computed for the two antennas intersects obstacles (due to, e.g., terrain elevation
changes, buildings, etc.).</p>
      <p>Given two antennas deployed in two points (possibly at different elevations),
the relevant FE associated to them is a 3D ellipsoid whose major radius is
the straight-line segment connecting the two points, and whose minor radius
is the greatest value such that, if a stray component of the transmitted signal
bounces off an object within the FE and then arrives at the receiving antenna, the
resulting phase shift will be considered to have an unacceptably negative impact
on the signal quality. Given the transmitting/receiving power of the employed
antennas, their maximum transmission distance and the band used, the value of
the minor radius of the relevant FE for the relay placement task at hand can be
computed with specialised algorithms.
3.5</p>
    </sec>
    <sec id="sec-8">
      <title>Fault tolerance requirements</title>
      <p>Fault tolerance requirements ask that the network to be designed guarantees
successful routing from each sensor to the gateway also in case of malfunctioning
of at most F 1 relay nodes.</p>
      <p>To guarantee that fault tolerance requirements are satisfied, the computed
relay node placement is required to be such that at least F + 1 distinct routes
from each sensor to the gateway exist, and that no two distinct routes from the
same sensor share a relay node.
3.6</p>
    </sec>
    <sec id="sec-9">
      <title>Performance requirements</title>
      <p>Performance requirements ask that the network to be designed ensures that
communication from each sensor to the gateway is not significantly impacted by
degradation effects, which arise when using too many relay nodes.</p>
      <p>To guarantee that performance requirements are met, it is requested that
each sensor-to-gateway route in the designed network consists of at most H 1
hops (i.e., traverses at most H 1 intermediate relay nodes).
3.7</p>
    </sec>
    <sec id="sec-10">
      <title>Capacity requirements</title>
      <p>Network capacity constraints ask that the network is able to convey the needed
traffic from all the sensors to the gateway. This means that there is an
upper bound to the number of messages (from sensor nodes) that can be routed
through a given radio link (i.e., a pair of antennas mounted on different poles
each one lying in the radio visibility cone of the other). This limits depend on the
transmission band available on radio links and on the band needed to transmit
a single message from a sensor.
4</p>
      <sec id="sec-10-1">
        <title>Computing optimal fault-tolerant relay placement</title>
        <p>The complex problem requirements outlined in Section 3 make it impossible to
immediately use standard off-the-shelf Artificial Intelligence (AI) reasoners. In
particular, requirements that ask to consider the terrain orography and the
presence of obstacles and radio-visibility conditions between pairs of relay antennas
demand for a complex preprocessing of the source data before giving it as input
to a standard AI reasoner to solve the problem.</p>
        <p>
          In this section we briefly describe how our algorithm, by querying the external
data sources defining the scenario at hand (i.e., the geometry and orography of
the Monitored Area, MA, and the forbidden placement and link areas), and by
taking all the other user parameters as input, processes such data by defining
multiple computational geometry problems similar to those addressed in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ],
which are solved using a Mixed Integer Linear Programming (MILP) solver.
After this preprocessing is completed, standard AI reasoners can be used to
solve our main problem. In this paper we experiment with off-the-shelf MILP
and Pseudo-Boolean Satisfiability (PB-SAT) solvers.
4.1
        </p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Input data</title>
      <p>From external sources, the following data are available for the scenario at hand:
1. The geometry and terrain orography of the MA, in terms of a set of convex
polygons, each one associated with an elevation value (in meters).
2. The set of areas in the MA where no relay node can be placed (forbidden
placement areas), in terms of a set of convex polygons.
3. The set of areas in the MA that cannot be traversed by radio links (forbidden
link areas), in terms of a set of convex polygons.
4. A map defining the placement cost of a relay node throughout the MA, again
in terms of a set of convex polygons, each one associated with a cost value
(in Euro).
5. The number and positions of the sensor nodes (radiogoniometers) in the MA.
6. The position of the gateway node in the MA.</p>
      <p>Moreover, our algorithm takes the following additional inputs:
7. The maximum transmission rate of relay antennas (all equal).
8. The transmission rate of each sensor.
9. The maximum distance D between two relay nodes for their direct radio link
to be reliable.
10. The value r of the minor radius of the Fresnel Ellipsoid (FE) to be considered
when performing quality assessments of the potential radio links.
11. The maximum number of allowed hops H for all sensors-to-gateway routes.
12. The maximum number of relay node faults F that the network must tolerate.
13. The maximum number of antennas that can be installed in a relay node.
14. The finite set of possible orientations O of antennas in a relay node, in terms
of a set of values in degrees from a fixed direction (e.g., North).
15. The fixed cost of installing a single antenna in a (already existing) relay
node.</p>
      <p>Finally, in order to make the set of candidate relay antenna placements finite,
our algorithm considers the MA partitioned in rectangular cells. Each relay node
will be placed in a distinct cell. The user is required to provide the desired number
of such cells, in terms of:
16. I and J (positive integers), the number of cells in which area A must be split
along the X and Y axes, respectively.
4.2</p>
    </sec>
    <sec id="sec-12">
      <title>Monitored Area discretisation</title>
      <p>
        The geometry of the MA is over-approximated by a rectangular bounding box
A. A suitable Cartesian orthogonal coordinate system is defined as to make the
edges of rectangle A parallel to the X and Y axes. As a result of this coordinate
system transformation, area A is defined by points having X and Y coordinates
ranging within [0; Xmax] and [0; Ymax] resp., for some Xmax; Ymax 2 R+. From
now on, we assume that whenever we need to use geographic coordinates, they
will be first transformed accordingly into coordinates of the above system. Any
region in A not belonging to the MA will be managed by defining forbidden
placement (akin to unadmissible scenarios in [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]) and link areas in A (see
Section 3.2).
      </p>
      <p>Area A is then partitioned in I J cells, each one being a rectangle having
size WX by WY (in metres), where WX = Xmax and WY = Ymax .
I J</p>
      <p>Cells are denoted by Ci;j , for i 2 [0; I 1] and j 2 [0; J 1]. Hence, for each
i; j, Ci;j defines the rectangle consisting of points:</p>
      <p>Ci;j = f(x; y) 2 A j iWX
x
(i + 1)WX ; jWY
y</p>
      <p>(j + 1)WY g :
4.3</p>
    </sec>
    <sec id="sec-13">
      <title>Relational database population</title>
      <p>
        The first step of our algorithm is to run helper feasibility and optimisation
MILP problems in order to populate a relational database, starting from the
input data about terrain orography and pole placement costs. This pre-processing
follows the same strategy used in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] to generate admissible (simulation)
scenarios through a pre-processing, basically computing all feasible solutions to a
constraint problem.
      </p>
      <p>We proceed as follows. For each cell Ci;j 2 A we first compute whether it
intersects a forbidden antenna placement area. This is done by solving a simple
feasibility MILP problem defined over the linear constraints stemming from the
cell definition and those stemming from each of the forbidden placement area
convex polygons. The MILP problem also defines one boolean decision variable
per such polygon. A feasible solution is enforced to set at least one of the boolean
variables to true, which in turn imposes that at least one forbidden placement
area polygon intersects the cell at hand.</p>
      <p>
        MILP problems as the one outlined above are very easy to solve and
define our general approach to check, using standard MILP technology, whether a
polygon (or, in some cases, a 3D polyhedron) intersects a union of polygons (3D
polyhedra). This is done using the same MILP based approach used in [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] to
generate control abstractions.
      </p>
      <p>For cells Ci;j not intersecting a forbidden placement area (hence, whose
associated MILP problem is infeasible), we also compute: (i) The minimum elevation
of a point in Ci;j ; (ii) The maximum pole placement cost within Ci;j . For such
computations, two additional (very simple) optimisation MILP problems are
generated and solved. Constraints of such problems are similar to those of the
feasibility MILP problem described earlier to detect intersection between a
convex polygon and the union of convex polygons. In this case, also an objective
function is defined, which searches for the intersection point having minimum
elevation or maximum cost respectively.</p>
      <p>
        At the end of this pre-processing stage, much as in [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], our relational database
is populated with relation Cell , whose tuples (i; j; e; c) define the cells Ci;j
covering A not intersecting a forbidden placement area together with their minimum
elevation value and maximum antenna placement cost (positive reals).
4.4
      </p>
    </sec>
    <sec id="sec-14">
      <title>Radio visibility graph computation</title>
      <p>
        The next step performed by our algorithm is to compute the radio visibility
graph G of A using an approach similar to that used in [
        <xref ref-type="bibr" rid="ref21 ref22 ref25">22,25,21</xref>
        ] to generate
sets of simulation scenarios. The radio visibility graph is an undirected graph
G = (V; E) where:
– The set of nodes V is the set of possible placements of poles within cells of A
(pole nodes ) and possible installations of directional antennas on such poles
(antenna nodes ).
– The set of edges E is the set of feasible and reliable communication links
that could be established between two antenna nodes installed on different
poles and the communication links between each pole and antennas installed
on it.
      </p>
      <p>
        In order to compute the radio visibility graph G, a set of helper
feasibility/optimisation MILP problems are solved using data from the input sources.
Computation of nodes The set of nodes V of G is computed, much as
admissible scenarios are computed in [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], starting from the set of cells Ci;j already
proved not to intersect a forbidden placement area (hence such that the pair
(i; j) occurs in relation Cell of our database, Section 4.3).
      </p>
      <p>For each such cell, jOj + 1 nodes of G are generated: one node (pole node)
representing the potential installation of a pole in that cell and jOj nodes
(antenna nodes) representing the potential installation of a single antenna mounted
on the pole installed in the cell and with each possible orientation.</p>
      <p>More in detail, for cell Ci;j , the following nodes are generated:
– jOj antenna nodes of the form (i; j; o), one for any possible antenna
orientation o 2 O. The cost of installing a single antenna on an already deployed
pole is constant and given as input (Section 4.1).
– A single pole node of the form (i; j), representing the installation of a pole in
that cell. For each pole node, the maximum cost for installing a pole within
its cell is available in relation Cell of our database (Section 4.3).
Computation of edges Each edge defined in the radio visibility graph G will
represent a possible communication link.</p>
      <p>First, an edge is generated connecting each pole node with any antenna node
in the same cell, thus defining the possibility of a (wired) direct connection
between each single antenna and the pole on which it is mounted (and hence,
indirectly, with all the other relay antennas mounted on the same pole).</p>
      <p>Second, for each pair of antenna nodes in different cells, an edge is generated
if there is good radio visibility between the two antennas (considering their
respective orientations). Algorithm 1 outlines the algorithm used to check if radio
visibility between antenna nodes (i; j; o) and (i0; j0; o0) is satisfactory or not. The
algorithm first computes the centre positions of the given cells and the
minimum heights of the antennas that could be placed on it and then returns true
if and only if: (i) the distance between the two positions is not greater than
the maximum transmission distance D; (ii) the two antennas (given their
orientations) are visible to each other; (iii) no interference is expected between the
two antennas and no forbidden link area is traversed by the prospective radio
link. Double visibility between the two (oriented) antennas is delegated to
function double_visibility () that uses standard trigonometry-based computations to
check if the second antenna is within the visibility cone of the first one and
viceversa. As antennas, although, directional, might have a non-negligible visibility
cone, parallel radio links can be established between distinct antennas belonging
to the same pair of poles.</p>
      <p>
        Computation of absence of interference is delegated to function
radio_no_interference() which also takes into account the height of the holding poles L.
Along the lines of the MILP based over-approximation approaches in [
        <xref ref-type="bibr" rid="ref13 ref26 ref27">26,27,13</xref>
        ],
function radio_no_interference() computes the 3D bounding box of the FE with
minor radius r in terms of linear constraints (hence a safe over-approximation
of it), and solves additional helper feasibility MILP problems (along the lines of
those outlined in Section 4.3) to check whether such a bounding box intersects
at least one polyhedron defined from the terrain orography data or whether its
XY projection overlaps a forbidden link area polygon.
      </p>
      <p>The pseudo-code of these functions is omitted for space reasons.
1 function radio_visibility( (i,j,o), (i’,j’,o’))
2 x WX (i + 12 );
3 y WY (i + 12 );
4 h min. elevation of cell Ci;j as stored in relation Cell ;
5 x’ WX (i0 + 12 );
6 y’ WY (i0 + 12 );
7 h’ min. elevation of cell Ci0;j0 as stored in relation Cell ;
8 return p(x0 x)2 + (y0 y)2 + (h0 h)2 D and
9 double_visibility((x; y; o), (x0; y0; o0)) and
10 radio_no_interference((x; y; h + L), (x0; y0; h0 + L))</p>
      <p>Algorithm 1: Checking feasibility of a radio link between to antennas.
4.5</p>
    </sec>
    <sec id="sec-15">
      <title>The main MILP and PB-SAT optimisation problems</title>
      <p>Thanks to the preprocessing outlined in the previous sections, our radio visibility
graph already provides a suitable representation of requirements about forbidden
placement and link areas (Section 3.2) and radio visibility (Section 3.4).</p>
      <p>Our main optimisation problem described next will decide where to deploy
antenna arrays (over holding poles placed in the centre of some of the cells defined
as pole nodes in the radio visibility graph) and the number and orientations of the
associated antennas, enforcing the remaining requirements (i.e., fault tolerance,
performance and capacity requirements, Sections 3.5 to 3.7), while minimising
overall deployment costs (as required by the requirement in Section 3.3).</p>
      <p>We decided to model our main optimisation problem both as a MILP and a
PB-SAT problem and compare the performance of off-the-shelf solvers of both
technologies on a set of real case studies. It turns out that the problem
specifications in the two paradigms is quite similar, as a natural choice for our MILP
problem is to define only 0-1 decision variables. Such 0-1 variables can be
immediately converted into Boolean variables in our PB-SAT specification. Also, thanks
to the preprocessing computation of the radio visibility graph, the requirements
not already handled can be quite conveniently defined as linear constraints.</p>
      <p>Below we outline our main modelling ideas, which are common to the two
solving technologies.</p>
      <p>Variables For each sensor s and for each of the F + 1 distinct routes r from s to
the gateway (as required by the fault tolerance constraints), the following set of
0-1 (as for MILP) or Boolean (as for PB-SAT) variables is defined: fxs;r;i;e j i 2
[1; H]; e 2 Eantg, where Eant is the subset of edges in the radio visibility graph
connecting two antenna nodes. In a solution, assignment 1 to each variable xs;r;i;e
denotes that the r-th route from sensor s to the gateway uses the radio link e
for its i-th hop.</p>
      <p>Additional (redundant) 0-1/Boolean variables are defined to ease the
specification of some of the constraints. Such additional variables proved convenient
both for the MILP and the PB-SAT specifications. For example, additional
variables are introduced to denote the set of poles and antennas that need to be
deployed (their values functionally depends on the assignment to the xs;r;i;e
variables defined above). Suitable channelling constraints are added in both
specifications to keep the values of such variables in sync with those of the variables
on which they depend.</p>
      <p>Constraints The MILP and the PB-SAT problems have several constraints,
generated starting from the radio visibility graph and the other inputs. Although
modelled differently, constraints in both specifications can be classified in the
following common high-level way:</p>
    </sec>
    <sec id="sec-16">
      <title>Routes’ connectedness constraints For each sensor s, its F + 1 required</title>
      <p>routes to the gateway are made of a sequence of adjacent edges of Eant.
Connectedness constraints also enforce the use of the proper antenna-to-pole
and pole-to-antenna edges for routes traversing two antennas installed on the
same pole (such explicit links are needed to enforce capacity constraints).
Fault tolerance constraints For each sensor s, its F + 1 required routes to
the gateway do not share any relay node.</p>
      <p>Number of antennas per relay node The number of antennas that need to
be deployed on each pole does not exceed the upper limit given as input.
Number of antennas at the gateway The number of antennas that need to
be deployed at the gateway does not exceed the upper limit given as input.</p>
    </sec>
    <sec id="sec-17">
      <title>Network flow and capacity constraints These constraints model a flow prob</title>
      <p>lem in the graph induced by the computed set of routes, ensure that each
relay node has sufficient transmission capacity to handle the overall network
traffic passing through it and that the necessary flow constraints are satisfied.
Objective function The (linear) objective function for both our MILP and
PBSAT specifications asks to minimise the overall placement cost of the relay node,
which is given by the sum of the cost of placing each pole (these costs depend
on the cell where each pole if deployed and have been computed during
preprocessing), plus the cost of installing all the required antennas on the deployed
poles (the cost of installing each antenna is fixed). An additional part in the
objective function is defined in order to minimise also the overall number of radio
links used. A proper weighting of this last part of the objective function avoids
the risk that a solution is computed having non-minimal cost (but envisioning a
lower number of used radio links).</p>
      <sec id="sec-17-1">
        <title>Experimental Results</title>
        <p>In this section we present our experimental results. We considered 8 realistic relay
node placement scenarios in various areas of the “Leonardo da Vinci” Fiumicino
airport (Rome, Italy). Table 1 describes our scenarios in terms of:
1. the size of the Monitored Area (MA) in meters (columns Xmax and Ymax);
2. the size of the (always square) cells in meters (column WX = WY );
3. the resulting overall number of cells (column “#cells”);
4. the maximum number H of hops of each sensor-to-gateway route (column
“#hops”);
5. the maximum number of relay node faults F that the network must tolerate
(column “#toler. faults”);
6. the maximum transmission distance D between two pairs of antennas in
meters (column “max tx dist.”)
All scenarios have been defined with using following constant values for the
parameters not mentioned in Table 1:
7. minor radius r of the Fresnel Ellipsoid (FE): 4 meters;
8. maximum number of antennas per node (sensor, relay or gateway): 6;
9. possible antenna orientations: O = fN, NE, E, SE, S, SW, W, NWg;
10. cost for a directional antenna installation on an existing pole: Eur 50.00;</p>
        <p>The 8 scenarios above have been solved on a personal computer equipped
with an Intel Core 2duo Processor P8400@2.26 GHz and 3GB RAM, using both
the Glpk Mixed Integer Linear Programming (MILP) solver and the MiniSat+
Pseudo-Boolean Satisfiability (PB-SAT) solver. For each scenario, Table 1
reports the computation time of the main optimisation problem using both solvers
and the objective value of the optimal solution (minimum relay node placement
cost). Time for performing the preprocessing phase, dominated by the creation
of the radio visibility graph, is not reported, as this phase is identical for both
solving technologies. Although the preprocessing time can be substantial ( 1
hour in the worst case), this is not a critical issue, because:
1. Preprocessing is a one-time task and does not need to be repeated if relay
node placement costs or other problem parameters like the required fault
tolerance, network capacity and performance requirements change.
2. Preprocessing is amenable to massive (embarrassing ) parallelisation. In
particular, the helper MILP problems are independent of each other, and the
computation speed of the radio visibility graph can be increased linearly
with the number of available computation cores (hence, reduced to very low
values with a reasonably small number of processors).</p>
        <p>Table 1 shows that MiniSat+ (PB-SAT) is always outperformed by Glpk
(MILP). However, it is worth noting that, thanks to the wise preprocessing phase
outlined in Section 4, we were able to define our optimisation problem
specification in a natural way, using modelling patterns very well known in the MILP
solving community. The PB-SAT specification has been derived by
straightforward translating the MILP specification, with no specific optimisations explicitly
thought to boost the performance of the PB-SAT solver. Notwithstanding this,
MiniSat+ was actually able to solve 5 out of our 8 complex instance scenarios
in very reasonable time.
We addressed the problem of computing a deployment for relay nodes in a
wireless network that minimise the relay node network cost while at the same time
guaranteeing proper working of the network even when some of the relay nodes
(up to a given max number) become faulty (fault-tolerance).</p>
        <p>For such a problem we presented a Mixed Integer Linear Programming (MILP)
as well as a Pseudo-Boolean Satisfiability (PB-SAT) formulation along with
experimental results comparing the two approaches on realistic scenarios.</p>
        <p>Our experimental results show that with less than one day of computation
we can position with a precision of a few hundred meters relay nodes in areas
of about 5 squared kilometres. Furthermore, thanks to our pre-processing, even
though the problem formulation was designed for a MILP solver, the MiniSat+
PB-SAT solver was able to solve most of the problem instances we considered
within reasonable time.</p>
        <p>
          Scenarios involving areas partitioned in more than 300 cells seem to be
particularly challenging for both our approaches. In such cases, a possibility is to
relax the completeness/optimality constraints (along the lines of, e.g., [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ],
possibly keeping statistical guarantees of coverage as in, e.g., [
          <xref ref-type="bibr" rid="ref28 ref35">35,28</xref>
          ]) in order to
converge to a (possibly sub-optimal) solution in reasonable time.
Acknowledgements. This work was partially supported by the Italian
Ministry of University and Research (MIUR) under grant “Dipartimenti di eccellenza
2018–2022” of the Department of Computer Science of Sapienza University of
Rome and by the EC FP7 project SmartHG (Energy Demand Aware Open
Services for Smart Grid Intelligent Automation, 317761).
        </p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>A.D. Amis</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Prakash</surname>
            ,
            <given-names>T.H.P.</given-names>
          </string-name>
          <string-name>
            <surname>Vuong</surname>
            , and
            <given-names>D.T.</given-names>
          </string-name>
          <string-name>
            <surname>Huynh</surname>
          </string-name>
          .
          <article-title>Max-min d-cluster formation in wireless ad hoc networks</article-title>
          .
          <source>In Proc. IEEE INFOCOM</source>
          <year>2000</year>
          , volume
          <volume>1</volume>
          , pages
          <fpage>32</fpage>
          -
          <lpage>41</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>M.D. Azharuddin</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Kuila</surname>
            , and
            <given-names>P.K.</given-names>
          </string-name>
          <string-name>
            <surname>Jana</surname>
          </string-name>
          .
          <article-title>Energy efficient fault tolerant clustering and routing algorithms for wireless sensor networks</article-title>
          .
          <source>Computers &amp; Electrical Eng.</source>
          ,
          <volume>41</volume>
          :
          <fpage>177</fpage>
          -
          <lpage>190</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>A.</given-names>
            <surname>Bari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Jaekel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jiang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xu</surname>
          </string-name>
          .
          <article-title>Design of fault tolerant wireless sensor networks satisfying survivability and lifetime requirements</article-title>
          .
          <source>Computer Comm</source>
          .,
          <volume>35</volume>
          (
          <issue>3</issue>
          ):
          <fpage>320</fpage>
          -
          <lpage>333</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>E.S.</given-names>
            <surname>Biagioni</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Sasaki</surname>
          </string-name>
          .
          <article-title>Wireless sensor placement for reliable and efficient data collection</article-title>
          .
          <source>In Proc. HICSS</source>
          <year>2003</year>
          ,
          <article-title>page 127.2</article-title>
          .
          <source>IEEE Comp. Soc.</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>J.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.Z.</given-names>
            <surname>Bhuiyan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Wu</surname>
          </string-name>
          .
          <article-title>Deploying wireless sensor networks with fault-tolerance for structural health monitoring</article-title>
          .
          <source>IEEE Trans. on Computers</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>M.</given-names>
            <surname>Cardei</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.-Z.</given-names>
            <surname>Du</surname>
          </string-name>
          .
          <article-title>Improving wireless sensor network lifetime through power aware organization</article-title>
          .
          <source>ACM Wireless Netw., 11</source>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>A.</given-names>
            <surname>Chelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bagaa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Djenouri</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Balasingham</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Taleb</surname>
          </string-name>
          .
          <article-title>One-step approach for two-tiered constrained relay node placement in wireless sensor networks</article-title>
          .
          <source>IEEE Wireless Comm. Letters</source>
          ,
          <volume>5</volume>
          :
          <fpage>448</fpage>
          -
          <lpage>451</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>F.</given-names>
            <surname>Deniz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Bagci</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          <article-title>Korpeoglu, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Yazıcı</surname>
          </string-name>
          .
          <article-title>An adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks</article-title>
          .
          <source>Ad Hoc Networks</source>
          ,
          <volume>44</volume>
          :
          <fpage>104</fpage>
          -
          <lpage>117</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>D.</given-names>
            <surname>Ganesan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cristescu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Beferull-Lozano</surname>
          </string-name>
          .
          <article-title>Power-efficient sensor placement and transmission structure for data gathering under distortion constraints</article-title>
          .
          <source>In Proc. IPSN</source>
          <year>2004</year>
          , pages
          <fpage>142</fpage>
          -
          <lpage>150</lpage>
          . ACM Press,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <given-names>S.K.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kuila</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.K.</given-names>
            <surname>Jana</surname>
          </string-name>
          .
          <article-title>Genetic algorithm approach for k-coverage and m-connected node placement in target based wireless sensor networks</article-title>
          .
          <source>Computers &amp; Electrical Eng.</source>
          ,
          <volume>56</volume>
          :
          <fpage>544</fpage>
          -
          <lpage>556</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. X. Han,
          <string-name>
            <given-names>X.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.L.</given-names>
            <surname>Lloyd</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.-C.</given-names>
            <surname>Shen</surname>
          </string-name>
          .
          <article-title>Fault-tolerant relay node placement in heterogeneous wireless sensor networks</article-title>
          .
          <source>IEEE Trans. Mobile Computing</source>
          ,
          <volume>9</volume>
          (
          <issue>5</issue>
          ),
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>H.A.</given-names>
            <surname>Hashim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.O.</given-names>
            <surname>Ayinde</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Abido</surname>
          </string-name>
          .
          <article-title>Optimal placement of relay nodes in wireless sensor network using artificial bee colony algorithm</article-title>
          .
          <source>Journal Netw. Comp. Appl.</source>
          ,
          <volume>64</volume>
          :
          <fpage>239</fpage>
          -
          <lpage>248</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>B.P.</given-names>
            <surname>Hayes</surname>
          </string-name>
          , I. Melatti,
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Prodanovic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          .
          <article-title>Residential demand management using individualised demand aware price policies</article-title>
          .
          <source>IEEE Trans. Smart Grid</source>
          ,
          <volume>8</volume>
          (
          <issue>3</issue>
          ),
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>A.</given-names>
            <surname>Krause</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Guestrin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gupta</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.M.</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          .
          <article-title>Near-optimal sensor placements: Maximizing information while minimizing communication cost</article-title>
          .
          <source>In Proc. IPSN</source>
          <year>2006</year>
          , pages
          <fpage>2</fpage>
          -
          <lpage>10</lpage>
          . ACM,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kim</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Choi</surname>
          </string-name>
          .
          <article-title>Optimization of AP placement and channel assignment in wireless LANs</article-title>
          .
          <source>In Proc. IEEE LCN</source>
          <year>2002</year>
          . IEEE,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>J. Li</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Blake</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.S.J. De Couto</surname>
            ,
            <given-names>H.I.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
            , and
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Morris</surname>
          </string-name>
          .
          <article-title>Capacity of ad hoc wireless networks</article-title>
          .
          <source>In Proc. MobiCom</source>
          <year>2001</year>
          , pages
          <fpage>61</fpage>
          -
          <lpage>69</lpage>
          . ACM Press,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <given-names>R.</given-names>
            <surname>Magán-Carrión</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.A.</given-names>
            <surname>Rodríguez-Gómez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Camacho</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Garcìa-Teodoro</surname>
          </string-name>
          .
          <article-title>Optimal relay placement in multi-hop wireless networks</article-title>
          .
          <source>Ad Hoc Networks</source>
          ,
          <volume>46</volume>
          :
          <fpage>23</fpage>
          -
          <lpage>36</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          .
          <article-title>Now or Never: Negotiating efficiently with unknown or untrusted counterparts</article-title>
          .
          <source>Fundam</source>
          . Inform.,
          <volume>149</volume>
          (
          <issue>1-2</issue>
          ):
          <fpage>61</fpage>
          -
          <lpage>100</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. T. Mancini,
          <string-name>
            <given-names>P.</given-names>
            <surname>Flener</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Pearson</surname>
          </string-name>
          .
          <article-title>Combinatorial problem solving over relational databases: View synthesis through constraint-based local search</article-title>
          .
          <source>In Proc. SAC</source>
          <year>2012</year>
          , pages
          <fpage>80</fpage>
          -
          <lpage>87</lpage>
          . ACM,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Massini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Melatti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Merli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          .
          <article-title>System level formal verification via model checking driven simulation</article-title>
          .
          <source>In Proc. CAV</source>
          <year>2013</year>
          , volume
          <volume>8044</volume>
          <source>of LNCS</source>
          , pages
          <fpage>296</fpage>
          -
          <lpage>312</lpage>
          . Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Massini</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Salvo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          .
          <article-title>On minimising the maximum expected verification time</article-title>
          .
          <source>IPL</source>
          ,
          <volume>122</volume>
          :
          <fpage>8</fpage>
          -
          <lpage>16</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Massini</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          .
          <article-title>Anytime system level verification via random exhaustive hardware in the loop simulation</article-title>
          .
          <source>In Proc. DSD</source>
          <year>2014</year>
          , pages
          <fpage>236</fpage>
          -
          <lpage>245</lpage>
          . IEEE,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Massini</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          .
          <article-title>System level formal verification via distributed multi-core hardware in the loop simulation</article-title>
          .
          <source>In Proc. PDP</source>
          <year>2014</year>
          , pages
          <fpage>734</fpage>
          -
          <lpage>742</lpage>
          . IEEE,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Massini</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          , and
          <string-name>
            <surname>E. Tronci.</surname>
          </string-name>
          <article-title>SyLVaaS: System level formal verification as a service</article-title>
          .
          <source>In Proc. PDP</source>
          <year>2015</year>
          , pages
          <fpage>476</fpage>
          -
          <lpage>483</lpage>
          . IEEE,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Massini</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          .
          <article-title>Anytime system level verification via parallel random exhaustive hardware in the loop simulation</article-title>
          .
          <source>Microprocessors and Microsystems</source>
          ,
          <volume>41</volume>
          :
          <fpage>12</fpage>
          -
          <lpage>28</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Salvo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gruber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Hayes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Prodanovic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Elmegaard</surname>
          </string-name>
          .
          <article-title>Demand-aware price policy synthesis and verification services for smart grids</article-title>
          .
          <source>In Proc. SmartGridComm</source>
          <year>2014</year>
          , pages
          <fpage>794</fpage>
          -
          <lpage>799</lpage>
          . IEEE,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Salvo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.K.</given-names>
            <surname>Gruber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Hayes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Prodanovic</surname>
          </string-name>
          , and
          <string-name>
            <surname>L. Elmegaard.</surname>
          </string-name>
          <article-title>User flexibility aware price policy synthesis for smart grids</article-title>
          .
          <source>In Proc. DSD</source>
          <year>2015</year>
          , pages
          <fpage>478</fpage>
          -
          <lpage>485</lpage>
          . IEEE,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Salvo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Massini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I.</given-names>
            <surname>Melatti</surname>
          </string-name>
          .
          <article-title>Computing biological model parameters by parallel statistical model checking</article-title>
          .
          <source>In Proc. IWBBIO</source>
          <year>2015</year>
          , volume
          <volume>9044</volume>
          <source>of LNCS</source>
          , pages
          <fpage>542</fpage>
          -
          <lpage>554</lpage>
          . Springer,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Salvo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          .
          <article-title>Synthesis of quantized feedback control software for discrete time linear hybrid systems</article-title>
          .
          <source>In Proc. CAV</source>
          <year>2010</year>
          , pages
          <fpage>180</fpage>
          -
          <lpage>195</lpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Salvo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Tronci</surname>
          </string-name>
          .
          <article-title>Model-based synthesis of control software from system-level formal specifications</article-title>
          .
          <source>ACM Trans. Softw</source>
          . Eng. Meth.,
          <volume>23</volume>
          (
          <issue>1</issue>
          ):6:
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          :
          <fpage>42</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <given-names>S.</given-names>
            <surname>Meguerdichian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Koushanfar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potkonjak</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.B.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          .
          <article-title>Coverage problems in wireless ad-hoc sensor networks</article-title>
          .
          <source>In Proc. IEEE INFOCOM</source>
          <year>2001</year>
          , pages
          <fpage>1380</fpage>
          -
          <lpage>1387</lpage>
          vol.
          <volume>3</volume>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <given-names>R.</given-names>
            <surname>Prasad</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Wu</surname>
          </string-name>
          .
          <article-title>Gateway deployment optimization in cellular wi-fi mesh networks</article-title>
          .
          <source>Journal of Netw</source>
          .,
          <volume>1</volume>
          (
          <issue>3</issue>
          ):
          <fpage>31</fpage>
          -
          <lpage>39</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33. L.
          <string-name>
            <surname>Qiu</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Chandra</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Jain</surname>
            , and
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Mahdian</surname>
          </string-name>
          .
          <article-title>Optimizing the placement of integration points in multi-hop wireless networks</article-title>
          .
          <source>In Proc. IEEE ICNP</source>
          <year>2001</year>
          . IEEE,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34. L.
          <string-name>
            <surname>Sitanayah</surname>
            ,
            <given-names>K.N.</given-names>
          </string-name>
          <string-name>
            <surname>Brown</surname>
            , and
            <given-names>C.J.</given-names>
          </string-name>
          <string-name>
            <surname>Sreenan</surname>
          </string-name>
          .
          <article-title>A fault-tolerant relay placement algorithm for ensuring k vertex-disjoint shortest paths in wireless sensor networks</article-title>
          .
          <source>Ad Hoc Networks</source>
          ,
          <volume>23</volume>
          :
          <fpage>145</fpage>
          -
          <lpage>162</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35. E. Tronci,
          <string-name>
            <given-names>T.</given-names>
            <surname>Mancini</surname>
          </string-name>
          , I. Salvo,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sinisi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mari</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Melatti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Massini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Davì</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Dierkes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ehrig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Röblitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Leeners</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. H. C.</given-names>
            <surname>Krüger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Egli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Ille</surname>
          </string-name>
          .
          <article-title>Patient-specific models from inter-patient biological models and clinical records</article-title>
          .
          <source>In Proc. FMCAD</source>
          <year>2014</year>
          , pages
          <fpage>207</fpage>
          -
          <lpage>214</lpage>
          . IEEE,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>C.M. Wei Liang</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Zheng</surname>
            , and
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Sharif</surname>
          </string-name>
          .
          <article-title>A connectivity-aware approximation algorithm for relay node placement in wireless sensor networks</article-title>
          .
          <source>IEEE Sensors Journal</source>
          ,
          <volume>16</volume>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <given-names>M.</given-names>
            <surname>Younis</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Akkaya</surname>
          </string-name>
          .
          <article-title>Strategies and techniques for node placement in wireless sensor networks: A survey</article-title>
          .
          <source>Ad Hoc Networks</source>
          ,
          <volume>6</volume>
          (
          <issue>4</issue>
          ):
          <fpage>621</fpage>
          -
          <lpage>655</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>