Toward Reliable Actor Services in Wireless Sensor and Actor Networks
暂无分享,去创建一个
Jiming Chen | Xiaohui Liang | Xuemin Shen | Rongxing Lu | Shibo He | Xu Li | Xuemin Shen | R. Lu | Xiaohui Liang | Jiming Chen | Shibo He | Xu Li
[1] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.
[2] Ivan Stojmenovic,et al. Strictly Localized Sensor Self-Deployment for Optimal Focused Coverage , 2011, IEEE Transactions on Mobile Computing.
[3] Haiyun Luo,et al. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks , 2004, INFOCOM 2004.
[4] Ivan Stojmenovic,et al. Communication Aspects of Coordination in Robot Wireless Networks , 2010 .
[5] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[6] Panagiotis Papadimitratos,et al. Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.
[7] Hai Liu,et al. Chapter 9 Coordination in Sensor , Actuator and Robot Networks , 2010 .
[8] Ivan Stojmenovic,et al. Sink Mobility in Wireless Sensor Networks , 2010 .
[9] Konstantinos Psounis,et al. Modeling spatially correlated data in sensor networks , 2006, TOSN.
[10] Jiming Chen,et al. Leveraging Prediction to Improve the Coverage of Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[11] Marinho P. Barcellos,et al. Flexible and secure service discovery in ubiquitous computing , 2010, J. Netw. Comput. Appl..
[12] J. Rodgers,et al. Thirteen ways to look at the correlation coefficient , 1988 .
[13] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[14] Xiaohui Liang,et al. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[15] Ivan Stojmenovic,et al. Robot to Robot , 2010, IEEE Robotics & Automation Magazine.
[16] Damla Turgut,et al. Defense against Sybil attack in vehicular ad hoc network based on roadside unit support , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[17] Sheikh Iqbal Ahamed,et al. A trust-based secure service discovery (TSSD) model for pervasive computing , 2008, Comput. Commun..
[18] Younghee Lee,et al. Autonomic Trust Extraction for Trustworthy Service Discovery in Urban Computing , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[19] Ivan Stojmenovic,et al. Localized Distance-Sensitive Service Discovery in Wireless Sensor and Actor Networks , 2009, IEEE Transactions on Computers.
[20] Ivan Stojmenovic,et al. Coordination in Sensor, Actuator, and Robot Networks , 2010 .
[21] Peng Wang,et al. Robust Accounting in Decentralized P2P Storage Systems , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[22] Yuguang Fang,et al. A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[23] Ravishankar K. Iyer,et al. Inner-Circle Consistency for Wireless Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.
[24] Ian F. Akyildiz,et al. Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.
[25] Xiaohui Liang,et al. GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.