메뉴 건너뛰기




Volumn 4, Issue 9, 2011, Pages 1003-1012

Local geometric algorithm for hole boundary detection in sensor networks

Author keywords

Geometric algorithm; Hole detection; Security; Sensor networks

Indexed keywords

GRAPH THEORY;

EID: 80052168860     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.271     Document Type: Article
Times cited : (12)

References (18)
  • 1
    • 16244366537 scopus 로고    scopus 로고
    • A study of energy consumption and reliability in a multi-hop sensor network
    • Reason JM, Rabaey JM. A study of energy consumption and reliability in a multi-hop sensor network. SIGMOBILE Mobile Computing and Communications Review 2004; 8(1): 84-97. DOI: http://doi.acm.org/10.1145/980159.980170.
    • (2004) SIGMOBILE Mobile Computing and Communications Review , vol.8 , Issue.1 , pp. 84-97
    • Reason, J.M.1    Rabaey, J.M.2
  • 2
    • 34249705693 scopus 로고    scopus 로고
    • Joint problem of power optimal connectivity and coverage in wireless sensor networks
    • Yener B, Magdon-Ismail M, Sivrikaya F. Joint problem of power optimal connectivity and coverage in wireless sensor networks. Wireless Networks 2007; 13(4): 537-550. DOI: http://dx.doi.org/10.1007/s11276-006-5875-0.
    • (2007) Wireless Networks , vol.13 , Issue.4 , pp. 537-550
    • Yener, B.1    Magdon-Ismail, M.2    Sivrikaya, F.3
  • 3
    • 0035505507 scopus 로고    scopus 로고
    • Routing with guaranteed delivery in ad hoc wireless networks
    • November
    • Bose P, Morin P, Stojmenovic I, Urrutia J. Routing with guaranteed delivery in ad hoc wireless networks. Wireless Networks November 2001; 7(6): 609-616.
    • (2001) Wireless Networks , vol.7 , Issue.6 , pp. 609-616
    • Bose, P.1    Morin, P.2    Stojmenovic, I.3    Urrutia, J.4
  • 4
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks. ACM/IEEE Symposium International Conference on Mobile Computing and Networking (Mobicom)
    • Karp B, Kung HT. GPSR: Greedy perimeter stateless routing for wireless networks. ACM/IEEE Symposium International Conference on Mobile Computing and Networking (Mobicom), 2000; 243-254.
    • (2000) , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 6
    • 80052160618 scopus 로고    scopus 로고
    • Geographic hash tables with QoS in non uniform sensor networks. ACM MobiHoc 2006 Poster Proceedings, Firenze, Italy
    • Albano M, Chessa S, Nidito F, Pelagatti S. Geographic hash tables with QoS in non uniform sensor networks. ACM MobiHoc 2006 Poster Proceedings, Firenze, Italy, 2006.
    • (2006)
    • Albano, M.1    Chessa, S.2    Nidito, F.3    Pelagatti, S.4
  • 7
    • 25844529484 scopus 로고    scopus 로고
    • Performance comparison of scalable location services for geographic ad hoc routing. Proceedings of IEEE INFOCOM
    • Das S, Pucha H, Hu YC. Performance comparison of scalable location services for geographic ad hoc routing. Proceedings of IEEE INFOCOM, 2005; 120-130.
    • (2005) , pp. 120-130
    • Das, S.1    Pucha, H.2    Hu, Y.C.3
  • 8
    • 0034548432 scopus 로고    scopus 로고
    • A scalable location service for geographic ad hoc routing. Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom) August
    • Li J, Jannotti J, Couto DD, Karger D, Morris R. A scalable location service for geographic ad hoc routing. Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom) August 2000; 120-130.
    • (2000) , pp. 120-130
    • Li, J.1    Jannotti, J.2    Couto, D.D.3    Karger, D.4    Morris, R.5
  • 9
    • 0003677229 scopus 로고    scopus 로고
    • Third edn. Springer-Verlag Heidelberg: Newyork
    • Diestel R. Graph Theory, Third edn. Springer-Verlag Heidelberg: Newyork, 2005.
    • (2005) Graph Theory
    • Diestel, R.1
  • 10
    • 1842434565 scopus 로고    scopus 로고
    • Hole and antihole detection in graphs. Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms. New Orleans: Louisiana
    • Nikolopoulos S, Palios L. Hole and antihole detection in graphs. Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms. New Orleans: Louisiana, 2004; 850-859.
    • (2004) , pp. 850-859
    • Nikolopoulos, S.1    Palios, L.2
  • 13
    • 8344224464 scopus 로고    scopus 로고
    • Locating and bypassing routing holes in sensor networks. The 23rd Annual Joint Conference of the IEEE Computers and Communications Society (Infocom), Hong Kong, PRC:
    • Fang Q, Gao J, Guibas L. Locating and bypassing routing holes in sensor networks. The 23rd Annual Joint Conference of the IEEE Computers and Communications Society (Infocom), vol. 4, Hong Kong, PRC: 2004; 2458-2468.
    • (2004) , vol.4 , pp. 2458-2468
    • Fang, Q.1    Gao, J.2    Guibas, L.3
  • 15
    • 33745818367 scopus 로고    scopus 로고
    • Topological hole detection in wireless sensor networks and its applications
    • ACM: New York, NY, USA, DOI:
    • Funke S. Topological hole detection in wireless sensor networks and its applications. DIALM-POMC '05: Proceedings of the 2005 joint workshop on Foundations of mobile computing. ACM: New York, NY, USA, 2005; 44-53. DOI: http://doi.acm.org/10.1145/1080810.1080819.
    • (2005) DIALM-POMC '05: Proceedings of the 2005 joint workshop on Foundations of mobile computing , pp. 44-53
    • Funke, S.1
  • 16
    • 33744946538 scopus 로고    scopus 로고
    • Coverage and hole-detection in sensor networks via homology. Fourth International Symposium on Information Processing in Sensor Networks (ISPN). Los Angeles: California, USA
    • Ghrist R, Muhammad A. Coverage and hole-detection in sensor networks via homology. Fourth International Symposium on Information Processing in Sensor Networks (ISPN). Los Angeles: California, USA, 2005; 254-260.
    • (2005) , pp. 254-260
    • Ghrist, R.1    Muhammad, A.2
  • 17
    • 80052161390 scopus 로고    scopus 로고
    • The JUNG project website
    • The JUNG project website 2006.
    • (2006)
  • 18
    • 84942426861 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications
    • Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications, 2002; 113-127.
    • (2002) , pp. 113-127
    • Karlof, C.1    Wagner, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.