-
1
-
-
74549201690
-
Canopy closure estimates with greenorbs: Sustainable sensing in the forest
-
L. Mo, Y. He, Y. Liu, J. Zhao, S. Tang, X. Li and G. Dai, "Canopy Closure Estimates with GreenOrbs: Sustainable Sensing in the Forest," in Proceedings of ACM SenSys, pp. 99-112, 2009.
-
(2009)
Proceedings of ACM SenSys
, pp. 99-112
-
-
Mo, L.1
He, Y.2
Liu, Y.3
Zhao, J.4
Tang, S.5
Li, X.6
Dai, G.7
-
2
-
-
35348912495
-
Underground structure monitoring with wireless sensor networks
-
M. Li and Y. H. Liu, "Underground Structure Monitoring with Wireless Sensor Networks," in Proceedings of ACM IPSN, pp. 69-78, 2007.
-
(2007)
Proceedings of ACM IPSN
, pp. 69-78
-
-
Li, M.1
Liu, Y.H.2
-
3
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proceedings of ACM MobiHoc, pp. 46-57, 2005.
-
(2005)
Proceedings of ACM MobiHoc
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
4
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
5
-
-
78650681547
-
Designing an industrial realtime measurement and monitoring system based on embedded system and zigbee
-
W. T. Sung and Y. C. Hsu, "Designing an industrial realtime measurement and monitoring system based on embedded system and zigbee," Expert Systems with Applications, vol. 38, no. 4, pp. 4522-4529, 2011.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.4
, pp. 4522-4529
-
-
Sung, W.T.1
Hsu, Y.C.2
-
6
-
-
33744944530
-
Towards optimal sleep scheduling in sensor networks for rare event detection
-
Q. Cao, T. Abdelzaher, T. He, and J. Stankovic, "Towards optimal sleep scheduling in sensor networks for rare event detection," in Proceedings of ACM IPSN, pp. 20-27, 2005.
-
(2005)
Proceedings of ACM IPSN
, pp. 20-27
-
-
Cao, Q.1
Abdelzaher, T.2
He, T.3
Stankovic, J.4
-
7
-
-
84883083273
-
PSR: Practical synchronous rendezvous in low-duty-cycle wireless networks
-
H. Huang, J. Yun, Z. Zhong, S. Kim, and Tian He, "PSR: Practical Synchronous Rendezvous in Low-duty-cycle Wireless Networks," in Proceedings of IEEE INFOCOM, 2013.
-
(2013)
Proceedings of IEEE INFOCOM
-
-
Huang, H.1
Yun, J.2
Zhong, Z.3
Kim, S.4
He, T.5
-
8
-
-
17744369960
-
CSMA-MPS: A minimum preamble sampling MAC protocol for low power wireless sensor networks
-
S. Mahlknecht and M. Boeck. "CSMA-MPS: A Minimum Preamble Sampling MAC Protocol for Low Power Wireless Sensor Networks". in Proceedings of IEEE WFCS, pp. 73-80, 2004.
-
(2004)
Proceedings of IEEE WFCS
, pp. 73-80
-
-
Mahlknecht, S.1
Boeck, M.2
-
9
-
-
11244284030
-
Clock drift reduction for relative time slot TDMA-based sensor networks
-
R. Tjoa, K.L Chee, P. K. Sivaprasad, S.V. Rao and J.G. Lim, "Clock Drift Reduction for Relative Time Slot TDMA-based Sensor Networks," in Proceedings of IEEE PIMRC, vol. 2, pp. 1042-1047, 2004.
-
(2004)
Proceedings of IEEE PIMRC
, vol.2
, pp. 1042-1047
-
-
Tjoa, R.1
Chee, K.L.2
Sivaprasad, P.K.3
Rao, S.V.4
Lim, J.G.5
-
10
-
-
27644533289
-
The flooding time synchronization protocol
-
M. Maroti, B. Kusy, G. Simon, and A. Ledeczi, "The flooding time synchronization protocol," in Proceedings of ACM SenSys, pp. 39-49, 2004.
-
(2004)
Proceedings of ACM SenSys
, pp. 39-49
-
-
Maroti, M.1
Kusy, B.2
Simon, G.3
Ledeczi, A.4
-
11
-
-
84855736529
-
DCS: Distributed asynchronous clock synchronization in delay tolerant networks
-
B. Choi, H. Liang, X. Shen and W. Zhuang, "DCS: Distributed Asynchronous Clock Synchronization in Delay Tolerant Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 3, pp. 491-504, 2012.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.3
, pp. 491-504
-
-
Choi, B.1
Liang, H.2
Shen, X.3
Zhuang, W.4
-
13
-
-
33745949686
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
Y. Law, L. Hoesel, J. Doumen, P. Hartel, and P. Havinga, "Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols," in Proceedings of ACM SASN, pp. 76-88, 2005.
-
(2005)
Proceedings of ACM SASN
, pp. 76-88
-
-
Law, Y.1
Hoesel, L.2
Doumen, J.3
Hartel, P.4
Havinga, P.5
-
14
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," in Proceedings of IEEE INFOCOM, pp. 1307-1315, 2007.
-
(2007)
Proceedings of IEEE INFOCOM
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
15
-
-
80051886930
-
Reactive jamming in wireless networks: How realistic is the threat?
-
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, "Reactive jamming in wireless networks: how realistic is the threat?" in Proceedings of ACM WiSec, pp. 47-52, 2011.
-
(2011)
Proceedings of ACM WiSec
, pp. 47-52
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.B.3
Lenders, V.4
-
16
-
-
80052164345
-
EDJam: Effective dynamic jamming against IEEE 802.15.4-compliant wireless personal area networks
-
G. Liu, J. Luo, Q. Xiao, and B. Xiao, "EDJam: Effective Dynamic Jamming Against IEEE 802.15.4-Compliant Wireless Personal Area Networks," in Proceedings of IEEE ICC, pp. 1-5, 2011.
-
(2011)
Proceedings of IEEE ICC
, pp. 1-5
-
-
Liu, G.1
Luo, J.2
Xiao, Q.3
Xiao, B.4
-
18
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
20
-
-
71049166293
-
Anti-jamming for embedded wireless networks
-
M. Pajic and R. Mangharam, "Anti-jamming for Embedded Wireless Networks," in Proceedings of IEEE IPSN, pp. 301-312, 2009.
-
(2009)
Proceedings of IEEE IPSN
, pp. 301-312
-
-
Pajic, M.1
Mangharam, R.2
-
21
-
-
10944266504
-
HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks
-
O. Younis and S. Fahmy, "HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366-379, 2004.
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, Issue.4
, pp. 366-379
-
-
Younis, O.1
Fahmy, S.2
-
22
-
-
84893289329
-
Droplet: A new denial-of-service attack on low power wireless sensor networks
-
Z. He and T. Voigt, "Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks," in Proceedings of IEEE MASS, pp. 542-550, 2013.
-
(2013)
Proceedings of IEEE MASS
, pp. 542-550
-
-
He, Z.1
Voigt, T.2
|