-
1
-
-
84904043180
-
Wireless sensor networks: A survey on recent developments and potential synergies
-
P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, "Wireless sensor networks: a survey on recent developments and potential synergies," The Journal of supercomputing, vol. 68, no. 1, pp. 1-48, 2014.
-
(2014)
The Journal of Supercomputing
, vol.68
, Issue.1
, pp. 1-48
-
-
Rawat, P.1
Singh, K.D.2
Chaouchi, H.3
Bonnin, J.M.4
-
2
-
-
84874426122
-
Realistic applications for wireless sensor networks
-
Springer
-
J. A. Stankovic, A. D. Wood, and T. He, "Realistic applications for wireless sensor networks," in Theoretical Aspects of Distributed Computing in Sensor Networks. Springer, 2011, pp. 835-863.
-
(2011)
Theoretical Aspects of Distributed Computing in Sensor Networks
, pp. 835-863
-
-
Stankovic, J.A.1
Wood, A.D.2
He, T.3
-
3
-
-
84898778331
-
A survey of protocols for intermittently connected delay-tolerant wireless sensor networks
-
Y. Li and R. Bartos, "A survey of protocols for intermittently connected delay-tolerant wireless sensor networks," Journal of Network and Computer Applications, vol. 41, pp. 411-423, 2014.
-
(2014)
Journal of Network and Computer Applications
, vol.41
, pp. 411-423
-
-
Li, Y.1
Bartos, R.2
-
4
-
-
77958084079
-
Security and privacy in emerging wireless networks
-
M. DI and G. Tsudik, "Security and privacy in emerging wireless networks," IEEE Wireless Communications, pp. 13-21, 2010.
-
(2010)
IEEE Wireless Communications
, pp. 13-21
-
-
Di, M.1
Tsudik, G.2
-
5
-
-
3042785862
-
The sybil attack in sensor networks: Analysis &defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis &defenses," in Proceedings of the 3rd international symposium on Information processing in sensor networks. ACM, 2004, pp. 259-268.
-
(2004)
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks. ACM
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
6
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," Journal of Network and Computer Applications, vol. 35, no. 3, pp. 867-880, 2012.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.3
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
7
-
-
33144476837
-
Location-based compromisetolerant security mechanisms for wireless sensor networks
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromisetolerant security mechanisms for wireless sensor networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247-260, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
8
-
-
70449525340
-
Detecting sybil attacks in wireless sensor networks using neighboring information
-
K.-F. Ssu, W.-T. Wang, and W.-C. Chang, "Detecting sybil attacks in wireless sensor networks using neighboring information," Computer Networks, vol. 53, no. 18, pp. 3042-3056, 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.18
, pp. 3042-3056
-
-
Ssu, K.-F.1
Wang, W.-T.2
Chang, W.-C.3
-
11
-
-
84877583241
-
Energyefficient routing protocols in wireless sensor networks: A survey
-
N. A. Pantazis, S. A. Nikolidakis, and D. D. Vergados, "Energyefficient routing protocols in wireless sensor networks: A survey," Communications Surveys &Tutorials, IEEE, vol. 15, no. 2, pp. 551-591, 2013.
-
(2013)
Communications Surveys &Tutorials, IEEE
, vol.15
, Issue.2
, pp. 551-591
-
-
Pantazis, N.A.1
Nikolidakis, S.A.2
Vergados, D.D.3
-
12
-
-
84879612010
-
Energy-efficient clustering in lossy wireless sensor networks
-
D. Gong, Y. Yang, and Z. Pan, "Energy-efficient clustering in lossy wireless sensor networks," Journal of Parallel and Distributed Computing, vol. 73, no. 9, pp. 1323-1336, 2013.
-
(2013)
Journal of Parallel and Distributed Computing
, vol.73
, Issue.9
, pp. 1323-1336
-
-
Gong, D.1
Yang, Y.2
Pan, Z.3
-
13
-
-
0033877788
-
Energyefficient communication protocol for wireless microsensor networks
-
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energyefficient communication protocol for wireless microsensor networks," in Proceedings of the 33rd annual Hawaii international conference on System sciences. IEEE, 2000, pp. 1-10.
-
(2000)
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. IEEE
, pp. 1-10
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
14
-
-
84904015709
-
Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network
-
M. A. Jan, P. Nanda, X. He, and R. P. Liu, "Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network," in IEEE 10th International Conference on High Performance Computing and Communications &IEEE International Conference on Embedded and Ubiquitous Computing (HPCC EUC). IEEE, 2013, pp. 1400-1407.
-
(2013)
IEEE 10th International Conference on High Performance Computing and Communications &IEEE International Conference on Embedded and Ubiquitous Computing (HPCC EUC). IEEE
, pp. 1400-1407
-
-
Jan, M.A.1
Nanda, P.2
He, X.3
Liu, R.P.4
-
15
-
-
33646589837
-
An application-specific protocol architecture for wireless microsensor networks
-
W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Transactions on Wireless Communications,, vol. 1, no. 4, pp. 660-670, 2002.
-
(2002)
IEEE Transactions on Wireless Communications
, vol.1
, Issue.4
, pp. 660-670
-
-
Heinzelman, W.B.1
Chandrakasan, A.P.2
Balakrishnan, H.3
-
16
-
-
84883421701
-
Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN
-
Springer
-
M. A. Jan, P. Nanda, and X. He, "Energy evaluation model for an improved centralized clustering hierarchical algorithm in wsn," in Wired/Wireless Internet Communication. Springer, 2013, pp. 154-167.
-
(2013)
Wired/Wireless Internet Communication
, pp. 154-167
-
-
Jan, M.A.1
Nanda, P.2
He, X.3
-
17
-
-
77953789262
-
Detecting and localizing identity-based attacks in wireless and sensor networks
-
Y. Chen, J. Yang, W. Trappe, and R. P. Martin, "Detecting and localizing identity-based attacks in wireless and sensor networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2418-2434, 2010.
-
(2010)
IEEE Transactions on Vehicular Technology
, vol.59
, Issue.5
, pp. 2418-2434
-
-
Chen, Y.1
Yang, J.2
Trappe, W.3
Martin, R.P.4
-
18
-
-
84255192331
-
Efficient flooding in wireless sensor networks secured with neighborhood keys
-
A. Hassanzadeh, R. Stoleru, and J. Chen, "Efficient flooding in wireless sensor networks secured with neighborhood keys," in IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2011, pp. 119-126.
-
(2011)
IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE
, pp. 119-126
-
-
Hassanzadeh, A.1
Stoleru, R.2
Chen, J.3
-
19
-
-
84867576230
-
Minimum latency gossiping in wireless sensor networks
-
M. K. An, N. X. Lam, D. T. Huynh, and T. N. Nguyen, "Minimum latency gossiping in wireless sensor networks," in Proceedings of the 2012 International Conference on Wireless Networks (ICWN), 2012.
-
(2012)
Proceedings of the 2012 International Conference on Wireless Networks (ICWN)
-
-
An, M.K.1
Lam, N.X.2
Huynh, D.T.3
Nguyen, T.N.4
-
20
-
-
79959289243
-
Energy harvesting sensor nodes: Survey and implications
-
S. Sudevalayam and P. Kulkarni, "Energy harvesting sensor nodes: Survey and implications," IEEE Communications Surveys &Tutorials, vol. 13, no. 3, pp. 443-461, 2011.
-
(2011)
IEEE Communications Surveys &Tutorials
, vol.13
, Issue.3
, pp. 443-461
-
-
Sudevalayam, S.1
Kulkarni, P.2
-
21
-
-
84912525356
-
Pasccc: Priority-based application-specific congestion control clustering protocol
-
M. A. Jan, P. Nanda, X. He, and R. P. Liu, "Pasccc: Priority-based application-specific congestion control clustering protocol," Computer Networks, vol. 74, pp. 92-102, 2014.
-
(2014)
Computer Networks
, vol.74
, pp. 92-102
-
-
Jan, M.A.1
Nanda, P.2
He, X.3
Liu, R.P.4
-
22
-
-
33845917546
-
Privacy-preserving locationbased services for mobile users in wireless networks
-
S. Zhong, L. Li, Y. G. Liu, and Y. R. Yang, "Privacy-preserving locationbased services for mobile users in wireless networks," Department of Computer Science, Yale University, Technical Report ALEU/DCS/TR-1297, 2004.
-
(2004)
Department of Computer Science, Yale University, Technical Report ALEU/DCS/TR-1297
-
-
Zhong, S.1
Li, L.2
Liu, Y.G.3
Yang, Y.R.4
-
24
-
-
84885304744
-
Energy constraint clustering algorithms for wireless sensor networks
-
J. Albath, M. Thakur, and S. Madria, "Energy constraint clustering algorithms for wireless sensor networks," Ad Hoc Networks, vol. 11, no. 8, pp. 2512-2525, 2013.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
, pp. 2512-2525
-
-
Albath, J.1
Thakur, M.2
Madria, S.3
-
25
-
-
84884310704
-
Energy efficient routing in wireless sensor networks through balanced clustering
-
S. A. Nikolidakis, D. Kandris, D. D. Vergados, and C. Douligeris, "Energy efficient routing in wireless sensor networks through balanced clustering," Algorithms, vol. 6, no. 1, pp. 29-42, 2013.
-
(2013)
Algorithms
, vol.6
, Issue.1
, pp. 29-42
-
-
Nikolidakis, S.A.1
Kandris, D.2
Vergados, D.D.3
Douligeris, C.4
-
26
-
-
34247190129
-
-
Boston University Computer Science Department, Tech. Rep
-
G. Smaragdakis, I. Matta, and A. Bestavros, "Sep: A stable election protocol for clustered heterogeneous wireless sensor networks," Boston University Computer Science Department, Tech. Rep., 2004.
-
(2004)
Sep: A Stable Election Protocol for Clustered Heterogeneous Wireless Sensor Networks
-
-
Smaragdakis, G.1
Matta, I.2
Bestavros, A.3
-
27
-
-
84894084116
-
Modeling and analysis of frame-level forward error correction for mpeg video over burst-loss channels
-
C.-I. Kuo, C.-H. Shih, C.-K. Shieh, W.-S. Hwang, and C.-H. Ke, "Modeling and analysis of frame-level forward error correction for mpeg video over burst-loss channels," Appl. Math, vol. 8, no. 4, pp. 1845-1853, 2014.
-
(2014)
Appl. Math
, vol.8
, Issue.4
, pp. 1845-1853
-
-
Kuo, C.-I.1
Shih, C.-H.2
Shieh, C.-K.3
Hwang, W.-S.4
Ke, C.-H.5
|