Joint monitoring and routing in wireless sensor networks using robust identifying codes
暂无分享,去创建一个
[1] Jie Wu,et al. Dominating-set-based routing in ad hoc wireless networks , 2002 .
[2] Danny Raz,et al. Global optimization using local information with applications to flow control , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[3] David S. Johnson,et al. Approximation algorithms for combinatorial problems , 1973, STOC.
[4] David Starobinski,et al. Robust location detection with sensor networks , 2004, IEEE Journal on Selected Areas in Communications.
[5] Alan M. Frieze,et al. Identifying codes in random networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[6] Mark G. Karpovsky,et al. On robust and dynamic identifying codes , 2006, IEEE Transactions on Information Theory.
[7] Cyril Gavoille,et al. A survey on interval routing , 2000, Theor. Comput. Sci..
[8] Antoine Lobstein,et al. Minimizing the size of an identifying or locating-dominating code in a graph is NP-hard , 2003, Theor. Comput. Sci..
[9] Mikkel Thorup,et al. Compact routing schemes , 2001, SPAA '01.
[10] Ari Trachtenberg,et al. Disjoint identifying-codes for arbitrary graphs , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[11] Ittai Abraham,et al. Compact routing on euclidian metrics , 2004, PODC '04.
[12] Sylvain Gravier,et al. Construction of Codes Identifying Sets of Vertices , 2005, Electron. J. Comb..
[13] Antoine Lobstein,et al. Identifying and locating-dominating codes: NP-Completeness results for directed graphs , 2002, IEEE Trans. Inf. Theory.
[14] Eli Upfal,et al. A trade-off between space and efficiency for routing tables , 1989, JACM.
[15] Vijay V. Vazirani,et al. Primal-Dual RNC Approximation Algorithms for Set Cover and Covering Integer Programs , 1999, SIAM J. Comput..
[16] Deborah Estrin,et al. A wireless sensor network For structural monitoring , 2004, SenSys '04.
[17] Jie Wu,et al. A Dominating-Set-Based Routing Scheme in Ad Hoc Wireless Networks , 2001, Telecommun. Syst..
[18] M. Laifenfeld,et al. Localization and identification in networks using robust identifying codes , 2008, 2008 Information Theory and Applications Workshop.
[19] Wei Hong,et al. A macroscope in the redwoods , 2005, SenSys '05.
[20] Ari Trachtenberg,et al. Identifying Codes and Covering Problems , 2008, IEEE Transactions on Information Theory.
[21] Arthur L. Liestman,et al. CLUSTERING ALGORITHMS FOR AD HOC WIRELESS NETWORKS , 2004 .
[22] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[23] Mark G. Karpovsky,et al. On a New Class of Codes for Identifying Vertices in Graphs , 1998, IEEE Trans. Inf. Theory.
[24] Cheng-Shong Wu,et al. Novel optimal real‐time admission control and buffer management for the Video‐On‐Demand (VOD) service , 2000, Telecommun. Syst..
[25] Lenore Cowen,et al. Compact routing with minimum stretch , 1999, SODA '99.
[26] Francesco De Pellegrini,et al. Robust location detection in emergency sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[27] Julien Moncel,et al. On graphs on n vertices having an identifying code of cardinality [log2(n+1)] , 2006, Discret. Appl. Math..
[28] P.H.J. Chong,et al. A survey of clustering schemes for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[29] Xiuzhen Cheng,et al. Connected Dominating Set in Sensor Networks and MANETs , 2004 .
[30] William E. Hart,et al. Discrete sensor placement problems in distribution networks , 2005, Math. Comput. Model..
[31] Roger Wattenhofer,et al. Constant Time Distributed Dominating Set Approximation , 2022 .
[32] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[33] Yong Wang,et al. Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.