-
1
-
-
0036688074
-
A survey on sensor networks
-
Aug
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks, " IEEE Commun. Mag., vol. 40, no. 8, pp. 102-114, Aug. 2002.
-
(2002)
IEEE Commun. Mag
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
67650304313
-
-
Online, Available
-
The MICA2 datasheet. [Online]. Available: http://www.xbow.com/Products/ Product-pdf-filesAVireless-pdf/MICA2-Datasheet.pdf
-
The MICA2 datasheet
-
-
-
5
-
-
0029535737
-
Particle swarm optimization,
-
Perth, Australia, Jan
-
J. Kennedy and R. Eberhart, "Particle swarm optimization, " in Proc. IEEE Int. Conf. Neural Networks, vol. IV, Perth, Australia, Jan. 1995, pp. 1942-1948.
-
(1995)
Proc. IEEE Int. Conf. Neural Networks
, vol.4
, pp. 1942-1948
-
-
Kennedy, J.1
Eberhart, R.2
-
6
-
-
11144340927
-
Designing secure sensor networks
-
E. Shi and A. Perrig, "Designing secure sensor networks, " IEEE Wireless Commun. Mag., vol. 11, no. 6, pp. 38-43, 2004.
-
(2004)
IEEE Wireless Commun. Mag
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
7
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
F. Hu and N. K. Sharma, "Security considerations in ad hoc sensor networks, " Ad Hoc Networks, vol. 3, no. 1, pp. 69-89, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.1
, pp. 69-89
-
-
Hu, F.1
Sharma, N.K.2
-
8
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures,
-
September
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures, " Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, no. 2-3, pp. 293-315, September 2003.
-
(2003)
Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
9
-
-
33750600523
-
Adaptive secure routing in ad hoc mobile network,
-
Master's thesis, Royal Institute of Technology KTH, Stockholm, Sweden, Nov
-
A. R. M. Kamal, "Adaptive secure routing in ad hoc mobile network, " Master's thesis, Royal Institute of Technology (KTH), Stockholm, Sweden, Nov. 2004.
-
(2004)
-
-
Kamal, A.R.M.1
-
10
-
-
34547610382
-
Secure routing for mobile ad hoc networks
-
P. Argyroudis and D. O'Mahony, "Secure routing for mobile ad hoc networks, " IEEE Communications Surveys and Tutorials, vol. 7, no. 3, pp. 2-21, 2005.
-
(2005)
IEEE Communications Surveys and Tutorials
, vol.7
, Issue.3
, pp. 2-21
-
-
Argyroudis, P.1
O'Mahony, D.2
-
11
-
-
51749101324
-
How to specify and how to prove correctness of secure routing protocols for MANET,
-
Z. Haas, Ed
-
rd Int. Conf. on Broadband Communications, Networks and Systems BROADNETS 2006, Z. Haas, Ed., 2006, pp. 1-10.
-
(2006)
rd Int. Conf. on Broadband Communications, Networks and Systems BROADNETS 2006
, pp. 1-10
-
-
Papadimitratos, P.1
Haas, Z.2
Hubaux, J.P.3
-
12
-
-
48749108657
-
Secure routing in sensor networks,
-
A. Saber Tehrani, Ed
-
S. M. Nikjoo, A. S. Tehrani, and P. Kumarawadu, "Secure routing in sensor networks, " in Proc. Canadian Conf. on Electrical and Computer Engineering CCECE 2007, A. Saber Tehrani, Ed., 2007, pp. 978-981.
-
(2007)
Proc. Canadian Conf. on Electrical and Computer Engineering CCECE 2007
, pp. 978-981
-
-
Nikjoo, S.M.1
Tehrani, A.S.2
Kumarawadu, P.3
-
13
-
-
33646552392
-
Secure routing and intrusion detection in ad hoc networks,
-
J. Parker, Ed
-
rd IEEE Int. Conf. on Pervasive Computing and Communications PerCom 2005, J. Parker, Ed., 2005, pp. 191-199.
-
(2005)
rd IEEE Int. Conf. on Pervasive Computing and Communications PerCom 2005
, pp. 191-199
-
-
Patwardhan, A.1
Parker, J.2
Joshi, A.3
Iorga, M.4
Karygiannis, T.5
-
15
-
-
39049126162
-
Challenges of secure routing in MANETs: A simulative approach using AODV-SEC,
-
C. Roman, Ed
-
S. Eichler and C. Roman, "Challenges of secure routing in MANETs: A simulative approach using AODV-SEC, " in Proc. IEEE Int. Conf. on Mobile Adhoc and Sensor Systems (MASS), C. Roman, Ed., 2006, pp. 481-484.
-
(2006)
Proc. IEEE Int. Conf. on Mobile Adhoc and Sensor Systems (MASS)
, pp. 481-484
-
-
Eichler, S.1
Roman, C.2
-
17
-
-
35148838653
-
Secure routing protocol based trust for ad hoc networks,
-
July 30 -Aug. 1
-
th ACIS Int. Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing SNPD 2007, vol. 1, July 30 2007-Aug. 1 2007, pp. 279-283.
-
(2007)
th ACIS Int. Conf. on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing SNPD 2007
, vol.1
, pp. 279-283
-
-
Liu, Z.1
Lu, S.2
Yan, J.3
-
18
-
-
11244266362
-
Secure media access control (MAC) in wireless sensor networks: Intrusion detections and countermeasures,
-
5-8 Sept
-
th IEEE Int. Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2004, vol. 4, 5-8 Sept. 2004, pp. 3025-3029.
-
(2004)
th IEEE Int. Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2004
, vol.4
, pp. 3025-3029
-
-
Ren, Q.1
Liang, Q.2
-
20
-
-
84879330554
-
Simulation-based optimization of communication protocols for large-scale wireless sensor networks,
-
P. Volgyesi, Ed
-
G. Simon, P. Volgyesi, M. Maroti, and A. Ledeczi, "Simulation-based optimization of communication protocols for large-scale wireless sensor networks, " in Proc. IEEE Aerospace Conf., P. Volgyesi, Ed., vol. 3, 2003, pp. 1339-1346.
-
(2003)
Proc. IEEE Aerospace Conf
, vol.3
, pp. 1339-1346
-
-
Simon, G.1
Volgyesi, P.2
Maroti, M.3
Ledeczi, A.4
-
21
-
-
0024880831
-
Multilayer feedforward networks are universal approximators
-
K. Hornik, M. Stinchombe, and H. White, "Multilayer feedforward networks are universal approximators, " Neural Networks, vol. 2, pp. 359-366, 1989.
-
(1989)
Neural Networks
, vol.2
, pp. 359-366
-
-
Hornik, K.1
Stinchombe, M.2
White, H.3
-
22
-
-
84942134374
-
Comparison of particle swarm optimization and backpropagation as training algorithms for neural networks,
-
V Gudise and G. Venayagamoorthy, "Comparison of particle swarm optimization and backpropagation as training algorithms for neural networks, " in Proc. IEEE Swarm Intelligence Symposium SIS '03, 2003, pp. 110-117.
-
(2003)
Proc. IEEE Swarm Intelligence Symposium SIS '03
, pp. 110-117
-
-
Gudise, V.1
Venayagamoorthy, G.2
-
23
-
-
0032069284
-
Reducing the computational demands of continually online-trained artificial neural networks for system identification and control of fast processes
-
May-June
-
B. Burton and R. Harley, "Reducing the computational demands of continually online-trained artificial neural networks for system identification and control of fast processes, " IEEE Trans. Ind. Applicat., vol. 34, no. 3, pp. 589-596, May-June 1998.
-
(1998)
IEEE Trans. Ind. Applicat
, vol.34
, Issue.3
, pp. 589-596
-
-
Burton, B.1
Harley, R.2
-
24
-
-
42249086989
-
Particle swarm optimization: Basic concepts, variants and applications in power systems
-
Apr
-
Y. del Valle, G. K. Venayagamoorthy, S. Mohagheghi, J. C. Hernandez, and R. G. Harley, "Particle swarm optimization: Basic concepts, variants and applications in power systems, " IEEE Trans. Evol. Comput., vol. 12, no. 2, pp. 171-195, Apr. 2008.
-
(2008)
IEEE Trans. Evol. Comput
, vol.12
, Issue.2
, pp. 171-195
-
-
del Valle, Y.1
Venayagamoorthy, G.K.2
Mohagheghi, S.3
Hernandez, J.C.4
Harley, R.G.5
|