-
1
-
-
0034539015
-
Directed diffusion: A scalable and robust communication paradigm, for sensor networks
-
Aug
-
C. Intanagonwiwat, R. Govindan, and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm, for sensor networks," in Proc. ACM MOBICOM, Aug. 2000, pp. 56-67.
-
(2000)
Proc. ACM MOBICOM
, pp. 56-67
-
-
Intanagonwiwat, C.1
Govindan, R.2
Estrin, D.3
-
2
-
-
0033877788
-
Energyefficient communication protocols for wireless microsensor networks
-
Jan
-
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, " Energyefficient communication protocols for wireless microsensor networks," in Proc. Hawaiians Int'l Conf Syst. Science, Jan. 2000, pp. 3005-3014.
-
(2000)
Proc. Hawaiians Int'l Conf Syst. Science
, pp. 3005-3014
-
-
Heinzelman, W.1
Chandrakasan, A.2
Balakrishnan, H.3
-
3
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Nov
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in Proc. 2nd ACM Conf. Embedded Networked Sensor Syst., Nov. 2004, pp. 162-175.
-
(2004)
Proc. 2nd ACM Conf. Embedded Networked Sensor Syst
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
4
-
-
33747142749
-
The capacity of wireless networks
-
Mar
-
P. Gupta and P. R. Kumar, "The capacity of wireless networks," IEEE Trans. Inform. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.R.2
-
5
-
-
0036286440
-
An ad hoc network with mobile backbones
-
Apr
-
K. Xu, X. Hong, and M. Gerla, "An ad hoc network with mobile backbones," in Proc. IEEE ICC, Apr. 2002, 3138-3143.
-
(2002)
Proc. IEEE ICC
, pp. 3138-3143
-
-
Xu, K.1
Hong, X.2
Gerla, M.3
-
6
-
-
27644468340
-
A system for simulation, emulation, and deployment of heterogeneous sensor networks
-
Nov
-
L. Girod, T. Stathopoulos, N. Ramanathan, et al., "A system for simulation, emulation, and deployment of heterogeneous sensor networks," in Proc. 2nd ACM Conf. Embedded Networked Sensor Systems, Nov. 2004, pp. 201-213.
-
(2004)
Proc. 2nd ACM Conf. Embedded Networked Sensor Systems
, pp. 201-213
-
-
Girod, L.1
Stathopoulos, T.2
Ramanathan, N.3
-
7
-
-
84858349164
-
-
Crossbow Technology Inc, Online, Available
-
Crossbow Technology Inc. [Online]. Available: www.xbow.com
-
-
-
-
8
-
-
12844249406
-
A minimum cost heterogeneous sensor network with a lifetime constraint
-
Jan
-
V. Mhatre, C. P. Rosenberg, D. Kofman, et al. "A minimum cost heterogeneous sensor network with a lifetime constraint," IEEE Trans. Mobile Computing, vol. 4, no. 1, pp. 4-15, Jan. 2005.
-
(2005)
IEEE Trans. Mobile Computing
, vol.4
, Issue.1
, pp. 4-15
-
-
Mhatre, V.1
Rosenberg, C.P.2
Kofman, D.3
-
9
-
-
0036969415
-
Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks
-
Nov
-
E. Duarte-Melo and M. Liu, "Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks," in Proc. IEEE Globecom, Nov. 2002, pp. 21-25.
-
(2002)
Proc. IEEE Globecom
, pp. 21-25
-
-
Duarte-Melo, E.1
Liu, M.2
-
10
-
-
35448987469
-
Energy efficient chessboard clustering and routing in heterogeneous sensor network
-
Jan
-
X. Du and Y. Xiao, "Energy efficient chessboard clustering and routing in heterogeneous sensor network," Int. J. Wireless Mobile Computing (IJWMC), vol. 1, no. 2, pp. 121-130, Jan. 2006.
-
(2006)
Int. J. Wireless Mobile Computing (IJWMC)
, vol.1
, Issue.2
, pp. 121-130
-
-
Du, X.1
Xiao, Y.2
-
11
-
-
28444481397
-
Maintaining differentiated coverage in heterogeneous sensor networks
-
Oct
-
X. Du and F. Lin, "Maintaining differentiated coverage in heterogeneous sensor networks," EURASIP J. Wireless Commun. Networking, no. 4, pp. 565-572, Oct. 2005.
-
(2005)
EURASIP J. Wireless Commun. Networking
, Issue.4
, pp. 565-572
-
-
Du, X.1
Lin, F.2
-
12
-
-
25844505160
-
Exploiting heterogeneity in sensor networks
-
Mar
-
M. Yarvis, N. Kushalnagar, H. Singh, et al., "Exploiting heterogeneity in sensor networks," in Proc. IEEE INFOCOM, Mar. 2005, pp. 878-890.
-
(2005)
Proc. IEEE INFOCOM
, pp. 878-890
-
-
Yarvis, M.1
Kushalnagar, N.2
Singh, H.3
-
14
-
-
0036793924
-
Denial of service in sensor networks
-
Oct
-
A. D. Wood, and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
16
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
Jan
-
X. Du, Y. Xiao, M. Guizani, and H. H. Chen, "An effective key management scheme for heterogeneous sensor networks," Ad Hoc Networks (Elsevier), vol. 5, no. 1, pp. 24-34, Jan. 2007.
-
(2007)
Ad Hoc Networks (Elsevier)
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.H.4
-
17
-
-
11244264140
-
SeRLoc: Secure range-independent localization for wireless sensor networks
-
Oct
-
L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," in Proc. ACM Workshop Wireless Security, Oct. 2004, pp. 21-30.
-
(2004)
Proc. ACM Workshop Wireless Security
, pp. 21-30
-
-
Lazos, L.1
Poovendran, R.2
-
18
-
-
33745147863
-
Lossy network correlated data gathering with high-resolution coding
-
June
-
R. Cristescu and B. Beferull-Lozano, "Lossy network correlated data gathering with high-resolution coding," IEEE/ACM Trans. Networking, vol. 14, pp. 2817-2824, June 2006.
-
(2006)
IEEE/ACM Trans. Networking
, vol.14
, pp. 2817-2824
-
-
Cristescu, R.1
Beferull-Lozano, B.2
-
19
-
-
0034547115
-
Gpsr: Greedy perimeter stateless routing for wireless networks
-
Aug
-
B. Karp and H. T. Kung, "Gpsr: Greedy perimeter stateless routing for wireless networks," in Proc. 6th ACM MOBICOM, Aug. 2000, pp. 243-254.
-
(2000)
Proc. 6th ACM MOBICOM
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
20
-
-
84858365506
-
-
Online, Available
-
"Kruskal's Algorithm" [Online]. Available: http://www.cs. rutgers.edu/chvatal/notes/mst.html
-
Kruskal's Algorithm
-
-
-
22
-
-
84947273682
-
The Sybil attack
-
Mar
-
J. R. Douceur, "The Sybil attack," in Proc. IPTPS, Mar. 2002, pp. 251-260.
-
(2002)
Proc. IPTPS
, pp. 251-260
-
-
Douceur, J.R.1
-
23
-
-
0003597249
-
Wormhole detection in wireless hoc networks,
-
Technical Report TR01-384, Department of Computer Science, Rice University, June
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Wormhole detection in wireless hoc networks," Technical Report TR01-384, Department of Computer Science, Rice University, June 2002.
-
(2002)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
24
-
-
33646845626
-
Secure cell relay routing protocol for sensor networks
-
May
-
X. Du, Y. Xiao, H. H. Chen, and Q. Wu, "Secure cell relay routing protocol for sensor networks," Wireless Commun. Mobile Computing (Wiley), vol. 6, no. 3, pp. 375-391, May 2006.
-
(2006)
Wireless Commun. Mobile Computing (Wiley)
, vol.6
, Issue.3
, pp. 375-391
-
-
Du, X.1
Xiao, Y.2
Chen, H.H.3
Wu, Q.4
-
26
-
-
7744220918
-
QoS routing based on multi-class nodes for mobile ad hoc networks
-
July
-
X. Du, "QoS routing based on multi-class nodes for mobile ad hoc networks," Ad Hoc Networks (Elsevier), vol. 2/3, pp. 241-254, July 2004.
-
(2004)
Ad Hoc Networks (Elsevier)
, vol.2-3
, pp. 241-254
-
-
Du, X.1
-
27
-
-
4143054544
-
Runtime security composition for sensor networks
-
Oct
-
Q. Xue and A. Ganz, "Runtime security composition for sensor networks," in Proc. IEEE Veh. Technol. Conf., Oct. 2003, pp. 105-111.
-
(2003)
Proc. IEEE Veh. Technol. Conf
, pp. 105-111
-
-
Xue, Q.1
Ganz, A.2
-
28
-
-
84963049054
-
Vapnik-Chervonenkis classes of definable sets
-
M. C. Laskowski, "Vapnik-Chervonenkis classes of definable sets," J. London Mathematical Society, vol. 45, no. 2, pp 377-384, 1992.
-
(1992)
J. London Mathematical Society
, vol.45
, Issue.2
, pp. 377-384
-
-
Laskowski, M.C.1
|