-
1
-
-
46449122114
-
Wireless sensor network survey
-
J. Yick, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey, " Computer Networks, Elsevier, vol. 52, pp. 2292-2330, 2008.
-
(2008)
Computer Networks, Elsevier
, vol.52
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
3
-
-
51249096633
-
SensorScope: Out-of-the-Box Environmental Monitoring
-
G. Barrenetxea, F. Ingelrest, G. Schaefer, M. Vetterli, O. Couach, and M. Parlange, "SensorScope: Out-of-the-Box Environmental Monitoring, " in Proc. of IPSN, 2008.
-
(2008)
Proc. of IPSN
-
-
Barrenetxea, G.1
Ingelrest, F.2
Schaefer, G.3
Vetterli, M.4
Couach, O.5
Parlange, M.6
-
4
-
-
77958099314
-
Application of wireless sensor networks in critical infrastructure protection-challenges and design options
-
L. Buttyan, D. Gessner, A. Hessler, and P. Langendoerfer, "Application of wireless sensor networks in critical infrastructure protection-challenges and design options, " IEEE Wireless Communications, vol. 17, pp. 44-49, 2010.
-
(2010)
IEEE Wireless Communications
, vol.17
, pp. 44-49
-
-
Buttyan, L.1
Gessner, D.2
Hessler, A.3
Langendoerfer, P.4
-
5
-
-
34247573439
-
Sendrom: Sensor networks for disaster relief operations management
-
E. Cayirci and T. Coplu, "Sendrom: sensor networks for disaster relief operations management, " Wireless Networks, vol. 13, pp. 409-423, 2007.
-
(2007)
Wireless Networks
, vol.13
, pp. 409-423
-
-
Cayirci, E.1
Coplu, T.2
-
6
-
-
84883689334
-
Wireless wearable vibration sensor for touch-based life log system
-
M. Yasutoshi, K. Akiko, and M. Takashi, "Wireless wearable vibration sensor for touch-based life log system, " in Proc. of INSS, 2012.
-
(2012)
Proc. of INSS
-
-
Yasutoshi, M.1
Akiko, K.2
Takashi, M.3
-
7
-
-
33746764996
-
Wireless sensor networks for personal health monitoring: Issues and an implementation
-
A. Milenkovic, C. Otto, and E. Jovanov, "Wireless sensor networks for personal health monitoring: Issues and an implementation, " Computer Communications, vol. 29, pp. 2521-2533, 2006.
-
(2006)
Computer Communications
, vol.29
, pp. 2521-2533
-
-
Milenkovic, A.1
Otto, C.2
Jovanov, E.3
-
8
-
-
33646523960
-
Vigilnet: An integrated sensor network system for energyefficient surveillance
-
T. He, "Vigilnet: An integrated sensor network system for energyefficient surveillance, " ACM Transactions on Sensor Networks, vol. 2, pp. 1-38, 2006.
-
(2006)
ACM Transactions on Sensor Networks
, vol.2
, pp. 1-38
-
-
He, T.1
-
9
-
-
62949246144
-
Wireless sensor network deployment for water use efficiency in irrigation
-
J. McCulloch, P. McCarthy, S. Guru, W. Peng, D. Hugo, and A. Terhorst, "Wireless sensor network deployment for water use efficiency in irrigation, " in Proc. of REALWSN, 2008.
-
(2008)
Proc. of REALWSN
-
-
McCulloch, J.1
McCarthy, P.2
Guru, S.3
Peng, W.4
Hugo, D.5
Terhorst, A.6
-
11
-
-
69949113138
-
Structural damage detection and localization using netshm
-
K. Chintalapudi, J. Paek, O. Gnawali, T. Fu, K. Dantu, J. Caffrey, R. Covindan, and E. Johnson, "Structural Damage Detection and Localization Using NETSHM, " in Proc. of IPSN, 2006.
-
(2006)
Proc. of IPSN
-
-
Chintalapudi, K.1
Paek, J.2
Gnawali, O.3
Fu, T.4
Dantu, K.5
Caffrey, J.6
Covindan, R.7
Johnson, E.8
-
12
-
-
67650844989
-
Sensor network security: A survey
-
X. Chen, K. Makki, K. Yen, and N. Pissinou, "Sensor network security: A survey, " IEEE Communications Surveys and Tutorials, vol. 2, pp. 52-73, 2009.
-
(2009)
IEEE Communications Surveys and Tutorials
, vol.2
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
13
-
-
84883707860
-
Traffic analysis attacks and countermeasures in wireless body area sensor networks
-
L. Buttyan and T. Holczerr, "Traffic Analysis Attacks and Countermeasures in Wireless Body Area Sensor Networks, " in Proc. of WoWMom, 2012.
-
(2012)
Proc. of WoWMom
-
-
Buttyan, L.1
Holczerr, T.2
-
14
-
-
0036980251
-
Using signal processing to analyze wireless data traffic
-
C. Partridge, D. Cousins, R. K. A. Jackson, T. Saxena, and W. Strayer, "Using Signal Processing to Analyze Wireless Data Traffic, " in Proc. of ACM workshop on Wireless Security, 2002.
-
(2002)
Proc. of ACM Workshop on Wireless Security
-
-
Partridge, C.1
Cousins, D.2
Jackson, R.K.A.3
Saxena, T.4
Strayer, W.5
-
15
-
-
79952992733
-
Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
-
Y. Fan, Y. Jiang, H. Zhu, J. Chen, and X. Shen, "Network coding based privacy preservation against traffic analysis in multi-hop wireless networks, " IEEE Transactions on Wireless Communications, vol. 10, pp. 834-843, 2011.
-
(2011)
IEEE Transactions on Wireless Communications
, vol.10
, pp. 834-843
-
-
Fan, Y.1
Jiang, Y.2
Zhu, H.3
Chen, J.4
Shen, X.5
-
16
-
-
33847297141
-
Countermeasures against traffic analysis attacks in wireless sensor networks
-
J. Deng, R. Han, and S. Mishra, "Countermeasures against traffic analysis attacks in wireless sensor networks, " in Proc. of SECURECOMM, 2005, pp. 113-126.
-
Proc. of SECURECOMM, 2005
, pp. 113-126
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
17
-
-
84908144695
-
The use of fast fourier transform for estimation of power spectra: A method based on time averaging over short, modified periodograms
-
P. Welch, "The use of fast fourier transform for estimation of power spectra: A method based on time averaging over short, modified periodograms, " IEEE Transactions on Audio Electroacoustics, vol. 15, pp. 17-20, 1967.
-
(1967)
IEEE Transactions on Audio Electroacoustics
, vol.15
, pp. 17-20
-
-
Welch, P.1
-
18
-
-
85032750937
-
An introduction to compressive sampling
-
E. Candes and M. Wakin, "An introduction to compressive sampling, " IEEE Signal Processing Magazine, vol. 25, no. 2, pp. 21-30, 2008.
-
(2008)
IEEE Signal Processing Magazine
, vol.25
, Issue.2
, pp. 21-30
-
-
Candes, E.1
Wakin, M.2
-
19
-
-
64649083745
-
Signal recovery from random measurements via orthogonal matching pursuit
-
J. Tropp and A. Gilbert, "Signal recovery from random measurements via orthogonal matching pursuit, " IEEE Transactions on Information Theory, vol. 53, pp. 4655-4666, 2007.
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, pp. 4655-4666
-
-
Tropp, J.1
Gilbert, A.2
-
22
-
-
84883660266
-
Physical-layer intrusion detection for wireless networks using compressed sensing
-
A. Fragkiadakis, S. Nikitaki, and P. Tsakalides, "Physical-layer Intrusion Detection for Wireless Networks using Compressed Sensing, " in Proc. of WiMob, 2012.
-
(2012)
Proc. of WiMob
-
-
Fragkiadakis, A.1
Nikitaki, S.2
Tsakalides, P.3
-
23
-
-
41949102240
-
Toeplitzstructured compressed sensing matrices
-
W. Bajwa, J. Haupt, G. Raz, S. Wright, and R. Nowak, " Toeplitzstructured compressed sensing matrices, " in Proc. of SSP, 2007, pp. 295-298.
-
(2007)
Proc. of SSP
, pp. 295-298
-
-
Bajwa, W.1
Haupt, J.2
Raz, G.3
Wright, S.4
Nowak, R.5
-
24
-
-
83355168853
-
Powertrace: Networklevel power profiling for low power wireless networks
-
A. Dunkels, J. Eriksson, N. Finne, and N. Tsiftes, "Powertrace: Networklevel power profiling for low power wireless networks, " Tech. Rep.
-
Tech. Rep
-
-
Dunkels, A.1
Eriksson, J.2
Finne, N.3
Tsiftes, N.4
|