-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
March
-
AKYILDIZ, I., SU, W., SANKARASUBRAMANIAM, Y., AND CAYIRCI, E. 2002. Wireless sensor networks: A survey. Comput. Networks 38, 4 (March).
-
(2002)
Comput. Networks
, vol.38
, pp. 4
-
-
AKYILDIZ, I.1
SU, W.2
SANKARASUBRAMANIAM, Y.3
CAYIRCI, E.4
-
2
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
BLOOM, B. H. 1970. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7, 422-426.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
BLOOM, B.H.1
-
4
-
-
33845808851
-
SIA: Secure information aggregation in sensor networks
-
CHAN, H., PERRIG, A., PRZYDATEK, B., AND SONG, D. 2007. SIA: Secure information aggregation in sensor networks. J. Comput. Secur. Special Issue on Adhoc and Sensor Networks.
-
(2007)
J. Comput. Secur. Special Issue on Adhoc and Sensor Networks
-
-
CHAN, H.1
PERRIG, A.2
PRZYDATEK, B.3
SONG, D.4
-
7
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington DC
-
DU, W., DENG, J., HAN, Y. S., AND VARSHNEY, P. 2003a. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). Washington DC, 42-51.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 42-51
-
-
DU, W.1
DENG, J.2
HAN, Y.S.3
VARSHNEY, P.4
-
8
-
-
0842332407
-
A witness-based approach for data fusion assurance in wireless sensor networks
-
DU, W., DENG, J., HAN, Y. S., AND VARSHNEY, P. K. 2003b. A witness-based approach for data fusion assurance in wireless sensor networks. In Proceedings of the Global Telecommunications Conference (GLOBECOM'03).
-
(2003)
Proceedings of the Global Telecommunications Conference (GLOBECOM'03)
-
-
DU, W.1
DENG, J.2
HAN, Y.S.3
VARSHNEY, P.K.4
-
10
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
ACM, Seattle, Washington
-
ESTRIN, D., GOVINDAN, R., HEIDEMANN, J., AND KUMAR, S. 1999. Next century challenges: Scalable coordination in sensor networks. In Proceedings of ACM Mobicom (Mobicom'99). ACM, Seattle, Washington, 263-270.
-
(1999)
Proceedings of ACM Mobicom (Mobicom'99)
, pp. 263-270
-
-
ESTRIN, D.1
GOVINDAN, R.2
HEIDEMANN, J.3
KUMAR, S.4
-
11
-
-
84946031884
-
Procedures for detecting outlying observations in samples
-
February
-
FRANK, G. 1969. Procedures for detecting outlying observations in samples. Technometrics 11, 1 (February), 1-21.
-
(1969)
Technometrics
, vol.11
, Issue.1
, pp. 1-21
-
-
FRANK, G.1
-
12
-
-
34548301953
-
PDA: Privacy-preserving data aggregation in wireless sensor networks
-
HE, W., LIU, X., NGUYEN, H., NAHRSTEDT, K., AND ABDELZAHER, T. 2007. PDA: Privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'07).
-
(2007)
Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'07)
-
-
HE, W.1
LIU, X.2
NGUYEN, H.3
NAHRSTEDT, K.4
ABDELZAHER, T.5
-
13
-
-
0034445661
-
System architecture directions for networked sensors
-
HILL, J., SZEWCZYK, R., WOO, A., HOLLAR, S., CULLER, D., AND PISTER, K. 2000. System architecture directions for networked sensors. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'00).
-
(2000)
Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'00)
-
-
HILL, J.1
SZEWCZYK, R.2
WOO, A.3
HOLLAR, S.4
CULLER, D.5
PISTER, K.6
-
15
-
-
0036375244
-
Impact of network density on data aggregation in wireless sensor networks
-
INTANAGONWIWAT, C., ESTRIN, D., GOVINDAN, R., AND HEIDEMANN, J. 2002. Impact of network density on data aggregation in wireless sensor networks. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS'02). 457-458.
-
(2002)
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS'02)
, pp. 457-458
-
-
INTANAGONWIWAT, C.1
ESTRIN, D.2
GOVINDAN, R.3
HEIDEMANN, J.4
-
18
-
-
1542295442
-
The impact of data aggregation in wireless sensor networks
-
Vienna, Austria
-
KRISHNAMACHARI, B., ESTRIN, D., AND WICKER, S. 2002. The impact of data aggregation in wireless sensor networks. In Proceedings of the International Workshop on Distributed Event-Based Systems, (DEBS'02). Vienna, Austria.
-
(2002)
Proceedings of the International Workshop on Distributed Event-Based Systems, (DEBS'02)
-
-
KRISHNAMACHARI, B.1
ESTRIN, D.2
WICKER, S.3
-
20
-
-
84978428047
-
TAG: A tiny aggregation service for ad-hoc sensor networks
-
MADDEN, S., FRANKLIN, M. J., HELLERSTEIN, J. M., AND HONG, W. 2002. TAG: A tiny aggregation service for ad-hoc sensor networks. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'02).
-
(2002)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'02)
-
-
MADDEN, S.1
FRANKLIN, M.J.2
HELLERSTEIN, J.M.3
HONG, W.4
-
21
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
MCCUNE, J., SHI, E., PERRIG, A., AND REITER, M. 2005. Detection of denial-of-message attacks on sensor network broadcasts. In IEEE Symposium on Security and Privacy (SP'05). 64-78.
-
(2005)
IEEE Symposium on Security and Privacy (SP'05)
, pp. 64-78
-
-
MCCUNE, J.1
SHI, E.2
PERRIG, A.3
REITER, M.4
-
23
-
-
27644449262
-
Synopsis diffusion for robust aggregation in sensor networks
-
NATH, S., GIBBONS, P., SESHAN, S., AND ANDERSON, Z. 2004. Synopsis diffusion for robust aggregation in sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04). 250-262.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04)
, pp. 250-262
-
-
NATH, S.1
GIBBONS, P.2
SESHAN, S.3
ANDERSON, Z.4
-
24
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
PERRIG, A., Szewczyk, R., WEN, V., CULLER, D., AND TYGAR, J. D. 2001. SPINS: Security protocols for sensor networks. In International Conference on Mobile Computing and Networking (MobiCom'01).
-
(2001)
International Conference on Mobile Computing and Networking (MobiCom'01)
-
-
PERRIG, A.1
Szewczyk, R.2
WEN, V.3
CULLER, D.4
TYGAR, J.D.5
-
28
-
-
49449113408
-
-
TinyKeyMan. http://discovery.csc.ncsu.edu/.
-
TinyKeyMan
-
-
-
29
-
-
49449104606
-
-
TinyOS. http://www.tinyos.net/.
-
-
-
-
31
-
-
1442296009
-
The Cougar approach to in-network query processing in sensor networks
-
YAO, Y. AND GEHRKE, J. 2002. The Cougar approach to in-network query processing in sensor networks. SIGMOD Record 31, 3, 9-18.
-
(2002)
SIGMOD Record
, vol.31
, Issue.3
, pp. 9-18
-
-
YAO, Y.1
GEHRKE, J.2
-
32
-
-
3543100577
-
Statistical en-route filtering of injected false data in sensor networks
-
YE, F., LUO, H., LU, S., AND ZHANG, L. 2004. Statistical en-route filtering of injected false data in sensor networks. In Proceedings of the Annual Joint Conference of IEEE Computer and Communications Societies (INFOCOM'04).
-
(2004)
Proceedings of the Annual Joint Conference of IEEE Computer and Communications Societies (INFOCOM'04)
-
-
YE, F.1
LUO, H.2
LU, S.3
ZHANG, L.4
-
34
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
ZHANG, W., SONG, H., ZHU, S., AND CAO, G. 2005. Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05).
-
(2005)
Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05)
-
-
ZHANG, W.1
SONG, H.2
ZHU, S.3
CAO, G.4
-
36
-
-
3543056512
-
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
-
ZHU, S., SETIA, S., JAJODIA, S., AND NING, P. 2004. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy (SP'04). 259-271.
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy (SP'04)
, pp. 259-271
-
-
ZHU, S.1
SETIA, S.2
JAJODIA, S.3
NING, P.4
|