Edge Self-Monitoring for Wireless Sensor Networks
暂无分享,去创建一个
[1] Qian Zhang,et al. The self-protection problem in wireless sensor networks , 2007, TOSN.
[2] Issa M. Khalil,et al. DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[3] Yunhao Liu,et al. Self-monitoring for sensor networks , 2008, MobiHoc '08.
[4] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[5] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[6] Roger Wattenhofer,et al. Local approximation schemes for ad hoc and sensor networks , 2005, DIALM-POMC '05.
[7] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[8] Alexander Schrijver,et al. Combinatorial optimization. Polyhedra and efficiency. , 2003 .
[9] Issa M. Khalil,et al. SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[10] Dorit S. Hochbaum,et al. Approximation Algorithms for NP-Hard Problems , 1996 .
[11] Xiang-Yang Li,et al. Efficient Algorithms for p-Self-Protection Problem in Static Wireless Sensor Networks , 2008, IEEE Transactions on Parallel and Distributed Systems.
[12] Wolfgang Maass,et al. Approximation schemes for covering and packing problems in image processing and VLSI , 1985, JACM.
[13] Peng-Jun Wan,et al. Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[14] Yunhao Liu,et al. Passive diagnosis for wireless sensor networks , 2010, TNET.
[15] Randeep Bhatia,et al. Book review: Approximation Algorithms for NP-hard Problems. Edited by Dorit S. Hochbaum (PWS, 1997) , 1998, SIGA.
[16] Mingyan Liu,et al. Self-monitoring of wireless sensor networks , 2006, Comput. Commun..
[17] Yoon-Hwa Choi,et al. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks , 2006, SASN '06.
[18] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[19] Wolfgang Maass,et al. Approximation Schemes for Covering and Packing Problems in Robotics and VLSI , 1984, STACS.
[20] Zygmunt J. Haas,et al. Virtual backbone generation and maintenance in ad hoc network mobility management , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[21] Jie Wu,et al. Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication , 2006, IEEE Transactions on Parallel and Distributed Systems.
[22] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[23] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[24] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[25] Xiang-Yang Li,et al. Efficient distributed low-cost backbone formation for wireless networks , 2006, IEEE Transactions on Parallel and Distributed Systems.
[26] Ioannis G. Tollis,et al. Planar grid embedding in linear time , 1989 .
[27] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[28] Dorit S. Hochba,et al. Approximation Algorithms for NP-Hard Problems , 1997, SIGA.
[29] Xiang-Yang Li. Multicast Capacity of Wireless Ad Hoc Networks , 2009, IEEE/ACM Transactions on Networking.