-
1
-
-
16244366537
-
A study of energy consumption and reliability in a multi-hop sensor network
-
Reason JM, Rabaey JM. A study of energy consumption and reliability in a multi-hop sensor network. SIGMOBILE Mobile Computing and Communications Review 2004; 8(1): 84-97. DOI: http://doi.acm.org/10.1145/980159.980170.
-
(2004)
SIGMOBILE Mobile Computing and Communications Review
, vol.8
, Issue.1
, pp. 84-97
-
-
Reason, J.M.1
Rabaey, J.M.2
-
2
-
-
34249705693
-
Joint problem of power optimal connectivity and coverage in wireless sensor networks
-
Yener B, Magdon-Ismail M, Sivrikaya F. Joint problem of power optimal connectivity and coverage in wireless sensor networks. Wireless Networks 2007; 13(4): 537-550. DOI: http://dx.doi.org/10.1007/s11276-006-5875-0.
-
(2007)
Wireless Networks
, vol.13
, Issue.4
, pp. 537-550
-
-
Yener, B.1
Magdon-Ismail, M.2
Sivrikaya, F.3
-
3
-
-
0035505507
-
Routing with guaranteed delivery in ad hoc wireless networks
-
November
-
Bose P, Morin P, Stojmenovic I, Urrutia J. Routing with guaranteed delivery in ad hoc wireless networks. Wireless Networks November 2001; 7(6): 609-616.
-
(2001)
Wireless Networks
, vol.7
, Issue.6
, pp. 609-616
-
-
Bose, P.1
Morin, P.2
Stojmenovic, I.3
Urrutia, J.4
-
4
-
-
0034547115
-
-
GPSR: Greedy perimeter stateless routing for wireless networks. ACM/IEEE Symposium International Conference on Mobile Computing and Networking (Mobicom)
-
Karp B, Kung HT. GPSR: Greedy perimeter stateless routing for wireless networks. ACM/IEEE Symposium International Conference on Mobile Computing and Networking (Mobicom), 2000; 243-254.
-
(2000)
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
6
-
-
80052160618
-
-
Geographic hash tables with QoS in non uniform sensor networks. ACM MobiHoc 2006 Poster Proceedings, Firenze, Italy
-
Albano M, Chessa S, Nidito F, Pelagatti S. Geographic hash tables with QoS in non uniform sensor networks. ACM MobiHoc 2006 Poster Proceedings, Firenze, Italy, 2006.
-
(2006)
-
-
Albano, M.1
Chessa, S.2
Nidito, F.3
Pelagatti, S.4
-
7
-
-
25844529484
-
-
Performance comparison of scalable location services for geographic ad hoc routing. Proceedings of IEEE INFOCOM
-
Das S, Pucha H, Hu YC. Performance comparison of scalable location services for geographic ad hoc routing. Proceedings of IEEE INFOCOM, 2005; 120-130.
-
(2005)
, pp. 120-130
-
-
Das, S.1
Pucha, H.2
Hu, Y.C.3
-
8
-
-
0034548432
-
-
A scalable location service for geographic ad hoc routing. Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom) August
-
Li J, Jannotti J, Couto DD, Karger D, Morris R. A scalable location service for geographic ad hoc routing. Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom) August 2000; 120-130.
-
(2000)
, pp. 120-130
-
-
Li, J.1
Jannotti, J.2
Couto, D.D.3
Karger, D.4
Morris, R.5
-
9
-
-
0003677229
-
-
Third edn. Springer-Verlag Heidelberg: Newyork
-
Diestel R. Graph Theory, Third edn. Springer-Verlag Heidelberg: Newyork, 2005.
-
(2005)
Graph Theory
-
-
Diestel, R.1
-
10
-
-
1842434565
-
-
Hole and antihole detection in graphs. Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms. New Orleans: Louisiana
-
Nikolopoulos S, Palios L. Hole and antihole detection in graphs. Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms. New Orleans: Louisiana, 2004; 850-859.
-
(2004)
, pp. 850-859
-
-
Nikolopoulos, S.1
Palios, L.2
-
12
-
-
0004116989
-
-
Second edn., MIT Press: Cambridge, MA
-
Cormen TH, Leiserson CE, Rivest RL, Stein C. Introduction to Algorithms. Second edn., MIT Press: Cambridge, MA, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
13
-
-
8344224464
-
-
Locating and bypassing routing holes in sensor networks. The 23rd Annual Joint Conference of the IEEE Computers and Communications Society (Infocom), Hong Kong, PRC:
-
Fang Q, Gao J, Guibas L. Locating and bypassing routing holes in sensor networks. The 23rd Annual Joint Conference of the IEEE Computers and Communications Society (Infocom), vol. 4, Hong Kong, PRC: 2004; 2458-2468.
-
(2004)
, vol.4
, pp. 2458-2468
-
-
Fang, Q.1
Gao, J.2
Guibas, L.3
-
14
-
-
0003772933
-
-
Springer-Verlag New York, Inc.: Secaucus, NJ, USA
-
de Berg M, van Kreveld M, Overmars M, Schwarzkopf O. Computational Geometry: Algorithms and Applications. Springer-Verlag New York, Inc.: Secaucus, NJ, USA, 1997.
-
(1997)
Computational Geometry: Algorithms and Applications
-
-
de Berg, M.1
van Kreveld, M.2
Overmars, M.3
Schwarzkopf, O.4
-
15
-
-
33745818367
-
Topological hole detection in wireless sensor networks and its applications
-
ACM: New York, NY, USA, DOI:
-
Funke S. Topological hole detection in wireless sensor networks and its applications. DIALM-POMC '05: Proceedings of the 2005 joint workshop on Foundations of mobile computing. ACM: New York, NY, USA, 2005; 44-53. DOI: http://doi.acm.org/10.1145/1080810.1080819.
-
(2005)
DIALM-POMC '05: Proceedings of the 2005 joint workshop on Foundations of mobile computing
, pp. 44-53
-
-
Funke, S.1
-
16
-
-
33744946538
-
-
Coverage and hole-detection in sensor networks via homology. Fourth International Symposium on Information Processing in Sensor Networks (ISPN). Los Angeles: California, USA
-
Ghrist R, Muhammad A. Coverage and hole-detection in sensor networks via homology. Fourth International Symposium on Information Processing in Sensor Networks (ISPN). Los Angeles: California, USA, 2005; 254-260.
-
(2005)
, pp. 254-260
-
-
Ghrist, R.1
Muhammad, A.2
-
17
-
-
80052161390
-
-
The JUNG project website
-
The JUNG project website 2006.
-
(2006)
-
-
-
18
-
-
84942426861
-
-
Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications
-
Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications, 2002; 113-127.
-
(2002)
, pp. 113-127
-
-
Karlof, C.1
Wagner, D.2
|