Identifying defective nodes in wireless sensor networks
暂无分享,去创建一个
[1] Pietro Michiardi,et al. Security in ad hoc networks , 2003 .
[2] Yong Yao,et al. The cougar approach to in-network query processing in sensor networks , 2002, SGMD.
[3] Deborah Estrin,et al. Directed diffusion for wireless sensor networking , 2003, TNET.
[4] Wei Hong,et al. TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.
[5] Klemens Böhm,et al. Processing continuous join queries in sensor networks: a filtering approach , 2010, SIGMOD Conference.
[6] Michael I. Jordan,et al. Bug isolation via remote program sampling , 2003, PLDI '03.
[7] Tomonari Furukawa,et al. Defect Identification by Sensor Network Under Uncertainties , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[8] Gunter Saake,et al. Piggyback Meta-Data Propagation in Distributed Hash Tables , 2005, WEBIST.
[9] S. Sitharama Iyengar,et al. A new architecture for distributed sensor integration , 1993, Proceedings of Southeastcon '93.
[10] Klemens Böhm,et al. A Wavelet Transform for Efficient Consolidation of Sensor Relations with Quality Guarantees , 2009, Proc. VLDB Endow..
[11] Andreas Zeller,et al. Predicting component failures at design time , 2006, ISESE '06.
[12] Konstantinos N. Plataniotis,et al. Detecting the defective nodes in wireless sensor networks , 2010, 2010 25th Biennial Symposium on Communications.
[13] Chao Liu,et al. Mining Behavior Graphs for "Backtrace" of Noncrashing Bugs , 2005, SDM.
[14] Klemens Böhm,et al. Mining Edge-Weighted Call Graphs to Localise Software Bugs , 2008, ECML/PKDD.
[15] Chao Liu,et al. Mining Control Flow Abnormality for Logic Error Isolation , 2006, SDM.
[16] Felix C. Freiling,et al. Query Dissemination in Sensor Networks - Predicting Reachability and Energy Consumption , 2010, Ad Hoc Sens. Wirel. Networks.
[17] Pascal Frossard,et al. Distributed group testing detection in sensor networks , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[18] Vesa Karpijoki. Security in Ad Hoc Networks , 2001 .
[19] Andreas Zeller,et al. Mining metrics to predict component failures , 2006, ICSE.
[20] Abraham Bernstein,et al. Predicting defect densities in source code files with decision tree learners , 2006, MSR '06.
[21] Klemens Böhm,et al. Software-Defect Localisation by Mining Dataflow-Enabled Call Graphs , 2010, ECML/PKDD.
[22] Abdel Aitouche,et al. Optimal design of fault tolerant sensor networks , 2000, Proceedings of the 2000. IEEE International Conference on Control Applications. Conference Proceedings (Cat. No.00CH37162).
[23] Pascal Frossard,et al. Distributed sensor failure detection in sensor networks , 2011, Signal Process..
[24] Giuseppe Di Fatta,et al. Discriminative pattern mining in software fault detection , 2006, SOQUA '06.
[25] Tomonari Furukawa,et al. Stochastic identification of defects under sensor uncertainties , 2012 .
[26] Jiawei Han,et al. CloseGraph: mining closed frequent graph patterns , 2003, KDD '03.
[27] Ian F. Akyildiz,et al. Energy efficiency based packet size optimization in wireless sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..