default search action
ACM Transactions on Sensor Networks (TOSN), Volume 3
Volume 3, Number 1, March 2007
- Ankit Tiwari, Prasanna Ballal, Frank L. Lewis:
Energy-efficient wireless sensor network design and implementation for condition-based maintenance. 1 - Niki Trigoni, Yong Yao, Alan J. Demers, Johannes Gehrke, Rajmohan Rajaraman:
Wave scheduling and routing in sensor networks. 2 - Sunhee Yoon, Cyrus Shahabi:
The Clustered AGgregation (CAG) technique leveraging spatial and temporal correlations in wireless sensor networks. 3 - Iyappan Ramachandran, Arindam Kumar Das, Sumit Roy:
Analysis of the contention access period of IEEE 802.15.4 MAC. 4 - Chi-Fu Huang, Yu-Chee Tseng, Hsiao-Lu Wu:
Distributed protocols for ensuring both coverage and connectivity of a wireless sensor network. 5 - Xun Su:
A combinatorial algorithmic approach to energy efficient information collection in wireless sensor networks. 6
Volume 3, Number 2, June 2007
- Marco Zuniga, Bhaskar Krishnamachari:
An analysis of unreliability and asymmetry in low-power wireless links. 7 - Suyoung Yoon, Chanchai Veerarittiphan, Mihail L. Sichitiu:
Tiny-sync: Tight time synchronization for wireless sensor networks. 8 - Peter Brass:
Bounds on coverage and target detection capabilities for models of networks of mobile sensors. 9 - Erol Gelenbe:
A diffusion model for packet travel time in a random multihop medium. 10 - Guoliang Xing, Chenyang Lu, Ying Zhang, Qingfeng Huang, Robert Pless:
Minimum power configuration for wireless communication in sensor networks. 11 - Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu:
Coverage breach problems in bandwidth-constrained sensor networks. 12
Volume 3, Number 3, August 2007
- Lewis Girod, Nithya Ramanathan, Jeremy Elson, Thanos Stathopoulos, Martin Lukac, Deborah Estrin:
Emstar: A software environment for developing and deploying heterogeneous sensor-actuator networks. 13 - Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. 14 - Cunqing Hua, Tak-Shing Peter Yum:
Asynchronous random sleeping for sensor networks. 15 - Dijiang Huang, Deep Medhi:
Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. 16 - Anh Tuan Hoang, Mehul Motani:
Collaborative broadcasting and compression in cluster-based wireless sensor networks. 17
Volume 3, Number 4, October 2007
- Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbell, Jon Crowcroft:
Overload traffic management for sensor networks. 18 - Patrick Tague, Radha Poovendran:
A canonical seed assignment model for key predistribution in wireless sensor networks. 19 - Dan Wang, Qian Zhang, Jiangchuan Liu:
The self-protection problem in wireless sensor networks. 20 - Yunhui Zheng, David J. Brady, Pankaj K. Agarwal:
Localization using boundary sensors: An analysis based on graph theory. 21 - Aman Kansal, William J. Kaiser, Gregory J. Pottie, Mani B. Srivastava, Gaurav S. Sukhatme:
Reconfiguration methods for mobile sensor networks. 22
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.