-
1
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. A survey on sensor networks. IEEE Communications Magazine 2002; 40(8):102-114.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: a comprehensive overview
-
Ozdemir S, Xiao Y. Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 2009; 53(12):2022-2037.
-
(2009)
Computer Networks
, vol.53
, Issue.12
, pp. 2022-2037
-
-
Ozdemir, S.1
Xiao, Y.2
-
4
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A, Szewczyk R, Tygar D, Wen V, Culler D. SPINS: security protocols for sensor networks. Wireless Networks Journal (WINE) 2002; 8(5):521-534.
-
(2002)
Wireless Networks Journal (WINE)
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, D.3
Wen, V.4
Culler, D.5
-
5
-
-
35048843415
-
Online mining in sensor networks
-
Ma X, Yang D, Tang S, Luo Q, Zhang D, Li S. Online mining in sensor networks. IFIP International Conference on Network and Parallel Computing 2004; 3222:544-550.
-
(2004)
IFIP International Conference on Network and Parallel Computing
, vol.3222
, pp. 544-550
-
-
Ma, X.1
Yang, D.2
Tang, S.3
Luo, Q.4
Zhang, D.5
Li, S.6
-
8
-
-
7544223741
-
A survey of outlier detection methodologies
-
Hodge VJ, Austin J. A survey of outlier detection methodologies. Artificial Intelligence Review 2004; 22(2):85-126.
-
(2004)
Artificial Intelligence Review
, vol.22
, Issue.2
, pp. 85-126
-
-
Hodge, V.J.1
Austin, J.2
-
9
-
-
0036040277
-
-
Similarity estimation techniques from rounding algorithms. Proc of STOC'02: The Thirty-Fourth Annual ACM Symposium on Theory of Computing
-
Charikar M. Similarity estimation techniques from rounding algorithms. Proc of STOC'02: The Thirty-Fourth Annual ACM Symposium on Theory of Computing, 2002; 380-388.
-
(2002)
, pp. 380-388
-
-
Charikar, M.1
-
11
-
-
18844457825
-
-
SIA: secure information aggregation in sensor networks. Proc. of SenSys'03
-
Przydatek B, Song D, Perrig A. SIA: secure information aggregation in sensor networks. Proc. of SenSys'03, 2003; 255-265.
-
(2003)
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
12
-
-
32644435647
-
Energy-efficient and secure pattern based data aggregation for wireless sensor networks
-
Çam H, Ozdemir S, Nair P, Muthuavinashiappan D, Sanli HO. Energy-efficient and secure pattern based data aggregation for wireless sensor networks. Computer Communications 2006; 29(4):446-455.
-
(2006)
Computer Communications
, vol.29
, Issue.4
, pp. 446-455
-
-
Çam, H.1
Ozdemir, S.2
Nair, P.3
Muthuavinashiappan, D.4
Sanli, H.O.5
-
13
-
-
0842332407
-
-
A witness-based approach for data fusion assurance in wireless sensor networks. Proc. GLOBECOM'03
-
Du W, Deng J, Han YS, Varshney PK. A witness-based approach for data fusion assurance in wireless sensor networks. Proc. GLOBECOM'03, 2003; 1435-1439.
-
(2003)
, pp. 1435-1439
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
14
-
-
33749986533
-
Secure data aggregation without persistent cryptographic operations in wireless sensor networks
-
Wu K, Dreef D, Sun B, Xiao Y. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks 2007; 5(1):100-111.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 100-111
-
-
Wu, K.1
Dreef, D.2
Sun, B.3
Xiao, Y.4
-
15
-
-
49449109253
-
SDAP: a secure hop-by-hop data aggregation protocol for sensor networks
-
Yang Y, Wang X, Zhu S, Cao G. SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. ACM Transactions on Information and System Security 2008; 11(4):1-43.
-
(2008)
ACM Transactions on Information and System Security
, vol.11
, Issue.4
, pp. 1-43
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
16
-
-
54949103489
-
Functional reputation based reliable data aggregation and transmission for wireless sensor networks
-
Ozdemir S. Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Computer Communications 2008; 31(17):3941-3953.
-
(2008)
Computer Communications
, vol.31
, Issue.17
, pp. 3941-3953
-
-
Ozdemir, S.1
-
20
-
-
56749088571
-
Declarative support for sensor data cleaning
-
Jeffery S, Alonso G, Franklin MJ, Hong W, Widom J. Declarative support for sensor data cleaning. Proc. of Pervasive Computing, 2006.
-
(2006)
Proc. of Pervasive Computing
-
-
Jeffery, S.1
Alonso, G.2
Franklin, M.J.3
Hong, W.4
Widom, J.5
-
21
-
-
19644385512
-
Fuzzy validation and fusion for wireless sensor networks
-
Wen Yj, Agogino AM, Goebel K. Fuzzy validation and fusion for wireless sensor networks. Proc. of ASME, 2004.
-
(2004)
Proc. of ASME
-
-
Wen, Y.1
Agogino, A.M.2
Goebel, K.3
-
22
-
-
34848890319
-
A weighted moving average-based approach for cleaning sensor data
-
Zhuang Y, Chen L, Wang S, Lian J. A weighted moving average-based approach for cleaning sensor data. Proc. of ICDCS, 2007.
-
(2007)
Proc. of ICDCS
-
-
Zhuang, Y.1
Chen, L.2
Wang, S.3
Lian, J.4
-
23
-
-
34247378242
-
Distributed fault detection of wireless sensor networks
-
Chen J, Kher S, Somani A. Distributed fault detection of wireless sensor networks. Proc. of DIWANS, 2006.
-
(2006)
Proc. of DIWANS
-
-
Chen, J.1
Kher, S.2
Somani, A.3
-
24
-
-
84856993958
-
Using sensor ranks for in-network detection of faulty readings in wireless sensor networks
-
Xiao X, Peng W, Hung C, Lee W. Using sensor ranks for in-network detection of faulty readings in wireless sensor networks. Proc. of MobiDE, 2007.
-
(2007)
Proc. of MobiDE
-
-
Xiao, X.1
Peng, W.2
Hung, C.3
Lee, W.4
-
25
-
-
67649637306
-
Another outlier bites the dust: computing meaningful aggregates in sensor networks
-
Deligiannakis A, Kotidis Y, Vassalos V, Stoumpos V, Delis A. Another outlier bites the dust: computing meaningful aggregates in sensor networks. Proc. of ICDE, 2009.
-
(2009)
Proc. of ICDE
-
-
Deligiannakis, A.1
Kotidis, Y.2
Vassalos, V.3
Stoumpos, V.4
Delis, A.5
-
27
-
-
84864698431
-
Statistics-based outlier detection for wireless sensor networks
-
doi:10.1080/13658816.2012.654493.
-
Zhang Y, Hamm NAS, Meratnia N, Stein A, Voort M, Havinga PJM. Statistics-based outlier detection for wireless sensor networks. International Journal of Geographical Information Science 2012. doi:10.1080/13658816.2012.654493.
-
(2012)
International Journal of Geographical Information Science
-
-
Zhang, Y.1
Hamm, N.A.S.2
Meratnia, N.3
Stein, A.4
Voort, M.5
Havinga, P.J.M.6
-
28
-
-
84861029086
-
Outlier-detection-based indoor localization system for wireless sensor networks
-
doi:10.1155/2012/961785.
-
Chen Y, Juang J. Outlier-detection-based indoor localization system for wireless sensor networks. International Journal of Navigation and Observation 2012. doi:10.1155/2012/961785.
-
(2012)
International Journal of Navigation and Observation
-
-
Chen, Y.1
Juang, J.2
-
29
-
-
62249146158
-
Directional controlled fusion in wireless sensor networks
-
Chen M, Leung VC, Mao S. Directional controlled fusion in wireless sensor networks. MONET 2009; 14(2):220-229.
-
(2009)
MONET
, vol.14
, Issue.2
, pp. 220-229
-
-
Chen, M.1
Leung, V.C.2
Mao, S.3
-
30
-
-
84947618651
-
Outlier detection techniques and cleaning of data for wireless sensor networks: a survey
-
Jha V, Yadav OS. Outlier detection techniques and cleaning of data for wireless sensor networks: a survey. International Journal on Computer Science and Technology 2012; 3(1):45-49.
-
(2012)
International Journal on Computer Science and Technology
, vol.3
, Issue.1
, pp. 45-49
-
-
Jha, V.1
Yadav, O.S.2
-
31
-
-
84893574327
-
Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming
-
Goemans M, Williamson D. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. Journal of the ACM 1995; 42(6):1115-1145.
-
(1995)
Journal of the ACM
, vol.42
, Issue.6
, pp. 1115-1145
-
-
Goemans, M.1
Williamson, D.2
-
33
-
-
37549058056
-
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
-
Andoni A, Indyk P. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Communications of the ACM 2008; 51(1):117-122.
-
(2008)
Communications of the ACM
, vol.51
, Issue.1
, pp. 117-122
-
-
Andoni, A.1
Indyk, P.2
-
34
-
-
34548095955
-
-
A topology-aware hierarchical structured overlay network based on locality sensitive hashing scheme. Proc. of UPGRADE
-
Xue G, Jiang Y, You Y, Li M. A topology-aware hierarchical structured overlay network based on locality sensitive hashing scheme. Proc. of UPGRADE, 2007; 3-8.
-
(2007)
, pp. 3-8
-
-
Xue, G.1
Jiang, Y.2
You, Y.3
Li, M.4
-
35
-
-
84855919200
-
-
TinyOS Simulator. 2011. http://www.tinyos.net
-
(2011)
TinyOS Simulator
-
-
|