-
1
-
-
0036983403
-
A coverage-preserved node scheduling scheme for large wireless sensor networks
-
Atlanta, GA, Sep
-
D. Tian and N. D. Georganas, "A coverage-preserved node scheduling scheme for large wireless sensor networks," in Proc. 1st Int. Workshop WSNA, Atlanta, GA, Sep. 2002, pp. 32-41.
-
(2002)
Proc. 1st Int. Workshop WSNA
, pp. 32-41
-
-
Tian, D.1
Georganas, N.D.2
-
2
-
-
85045636699
-
Maintaining sensing coverage and connectivity in large sensor networks
-
Oct
-
H. Zhang and J. C. Hou, "Maintaining sensing coverage and connectivity in large sensor networks," Wireless Ad Hoc Sensor Netw.: Int. J., vol. 1, no. 1/2, pp. 89-123, Oct. 2004.
-
(2004)
Wireless Ad Hoc Sensor Netw.: Int. J
, vol.1
, Issue.1-2
, pp. 89-123
-
-
Zhang, H.1
Hou, J.C.2
-
3
-
-
8344268530
-
Optimizing tree reconfiguration for mobile target tracking in sensor networks
-
W. Zhang and G. Cao, "Optimizing tree reconfiguration for mobile target tracking in sensor networks," in Proc. IEEE INFOCOM, 2004, pp. 2434-2445.
-
(2004)
Proc. IEEE INFOCOM
, pp. 2434-2445
-
-
Zhang, W.1
Cao, G.2
-
4
-
-
7544235797
-
DCTC: Dynamic convoy tree-based collaboration for target tracking in sensor network
-
Sep
-
W. Zhang and G. Cao, "DCTC: Dynamic convoy tree-based collaboration for target tracking in sensor network," IEEE Trans. Wireless Commun., vol. 3, no. 5, pp. 1689-1701, Sep. 2004.
-
(2004)
IEEE Trans. Wireless Commun
, vol.3
, Issue.5
, pp. 1689-1701
-
-
Zhang, W.1
Cao, G.2
-
5
-
-
0036375244
-
Impact of network density on data aggregation in wireless sensor networks
-
Vienna, Austria, Jul
-
C. Intanagonwiwat, D. Estrin, R. Govindan, and J. Heidemann, "Impact of network density on data aggregation in wireless sensor networks," in Proc. ICDCS, Vienna, Austria, Jul. 2002, p. 457.
-
(2002)
Proc. ICDCS
, pp. 457
-
-
Intanagonwiwat, C.1
Estrin, D.2
Govindan, R.3
Heidemann, J.4
-
6
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Feb
-
A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and secure source authentication for multicast," in Proc. NDSS, Feb. 2001, pp. 35-46.
-
(2001)
Proc. NDSS
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
7
-
-
84907682083
-
Simple, accurate time synchronization for wireless sensor networks
-
M. L. Sichitiu and C. Veerarittiphan, "Simple, accurate time synchronization for wireless sensor networks," in Proc. WCNC, 2003, pp. 1266-1273.
-
(2003)
Proc. WCNC
, pp. 1266-1273
-
-
Sichitiu, M.L.1
Veerarittiphan, C.2
-
8
-
-
11244272924
-
Timing-sync protocol for sensor networks
-
S. Ganeriwal, R. Kumar, and M. B. Srivastava, "Timing-sync protocol for sensor networks," in Proc. 1st Int. Conf. Embedded Netw. Sensor Syst., 2003, pp. 138-149.
-
(2003)
Proc. 1st Int. Conf. Embedded Netw. Sensor Syst
, pp. 138-149
-
-
Ganeriwal, S.1
Kumar, R.2
Srivastava, M.B.3
-
9
-
-
27644533289
-
The flooding time synchronization protocol
-
Baltimore, MD, Nov
-
M. Maroti, B. Kusy, G. Simon, and A. Ledeczi, "The flooding time synchronization protocol," in Proc. 2nd ACM SenSys, Baltimore, MD, Nov. 2004, pp. 39-49.
-
(2004)
Proc. 2nd ACM SenSys
, pp. 39-49
-
-
Maroti, M.1
Kusy, B.2
Simon, G.3
Ledeczi, A.4
-
10
-
-
33750337174
-
Attack-resilient time synchronization for wireless sensor networks
-
Washington, DC, Nov
-
H. Song, S. Zhu, and G. Cao, "Attack-resilient time synchronization for wireless sensor networks," in Proc. 2nd IEEE Int. Conf. MASS, Washington, DC, Nov. 2005, pp. 765-772.
-
(2005)
Proc. 2nd IEEE Int. Conf. MASS
, pp. 765-772
-
-
Song, H.1
Zhu, S.2
Cao, G.3
-
11
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th ACM Mobicom, 2000, pp. 255-265.
-
(2000)
Proc. 6th ACM Mobicom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
12
-
-
27644548026
-
Fault-tolerant cluster-wise clock synchronization for wireless sensor networks
-
Jul.-Sep
-
K. Sun, P. Ning, and C.Wang, "Fault-tolerant cluster-wise clock synchronization for wireless sensor networks," IEEE Trans. Dependable Secure Comput., vol. 2, no. 3, pp. 177-189, Jul.-Sep. 2005.
-
(2005)
IEEE Trans. Dependable Secure Comput
, vol.2
, Issue.3
, pp. 177-189
-
-
Sun, K.1
Ning, P.2
Wang, C.3
-
13
-
-
27644468340
-
A system for simulation, emulation, and deployment of heterogeneous sensor networks
-
L. Girod et al., "A system for simulation, emulation, and deployment of heterogeneous sensor networks," in Proc. ACM SenSys 2004, pp. 201-213.
-
(2004)
Proc. ACM SenSys
, pp. 201-213
-
-
Girod, L.1
-
14
-
-
25844505160
-
Exploiting heterogeneity in sensor networks
-
Miami, FL. Mar
-
M. Yarvis, N. Kushalnagar, H. Singh et al., "Exploiting heterogeneity in sensor networks," in Proc. IEEE INFOCOM, Miami, FL. Mar. 2005, pp. 878-890.
-
(2005)
Proc. IEEE INFOCOM
, pp. 878-890
-
-
Yarvis, M.1
Kushalnagar, N.2
Singh, H.3
-
15
-
-
28444481397
-
Maintaining differentiated coverage in heterogeneous sensor networks
-
Sep
-
X. Du and F. Lin, "Maintaining differentiated coverage in heterogeneous sensor networks," EURASIP J. Wireless Commun. Netw., vol. 5, no. 4, pp. 565-572, Sep. 2005.
-
(2005)
EURASIP J. Wireless Commun. Netw
, vol.5
, Issue.4
, pp. 565-572
-
-
Du, X.1
Lin, F.2
-
16
-
-
11244264140
-
SeRLoc: Secure range-independent localization for wireless sensor networks
-
Philadelphia, PA
-
L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," in Proc. ACM WiSe, Philadelphia, PA, 2004, pp. 21-30.
-
(2004)
Proc. ACM WiSe
, pp. 21-30
-
-
Lazos, L.1
Poovendran, R.2
-
17
-
-
84968503742
-
Elliptic curve cryptosystems
-
Jan
-
N. Koblitz, "Elliptic curve cryptosystems," Math. Comput., vol. 48, no. 177, pp. 203-209, Jan. 1987.
-
(1987)
Math. Comput
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
18
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Boston, MA, Aug
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Proc. 6th Int. Workshop Cryptographic Hardware Embedded Syst., Boston, MA, Aug. 2004, pp. 119-132.
-
(2004)
Proc. 6th Int. Workshop Cryptographic Hardware Embedded Syst
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
19
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
Jan
-
X. Du, Y. Xiao, M. Guizani, and H. H. Chen, "An effective key management scheme for heterogeneous sensor networks," Ad Hoc Netw. vol. 5, no. 1, pp. 24-34, Jan. 2007.
-
(2007)
Ad Hoc Netw
, vol.5
, Issue.1
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.H.4
-
20
-
-
39349101341
-
-
Online, Available
-
Moteiv Sensor Nodes. [Online]. Available: http://www.moteiv.com
-
Moteiv Sensor Nodes
-
-
-
21
-
-
55349125312
-
Vertical and horizontal synchronization services with outlier detection in underwater acoustic networks
-
to be published
-
F. Hu, Y. Malkawi, S. Kumar, and Y. Xiao, "Vertical and horizontal synchronization services with outlier detection in underwater acoustic networks," Wireless Commun. Mobile Comput., to be published.
-
Wireless Commun. Mobile Comput
-
-
Hu, F.1
Malkawi, Y.2
Kumar, S.3
Xiao, Y.4
|