


default search action
ACM Transactions on Sensor Networks (TOSN), Volume 7
Volume 7, Number 1, August 2010
- Branislav Kusy

, Isaac Amundson, János Sallai, Péter Völgyesi, Ákos Lédeczi, Xenofon D. Koutsoukos:
RF doppler shift-based mobile sensor tracking and navigation. 1:1-1:32 - Jun Zhang, Xiaohua Jia

, Guoliang Xing:
Real-time data aggregation in contention-based wireless sensor networks. 2:1-2:25 - YoungMin Kwon, Kirill Mechitov, Sameer Sundresh, WooYoung Kim, Gul Agha

:
Resilient localization for sensor networks in outdoor environments. 3:1-3:30 - Ryo Sugihara, Rajesh K. Gupta:

Speed control and scheduling of data mules in sensor networks. 4:1-4:29 - Wen Hu

, Hailun Tan, Peter Corke
, Wen Chan Shih, Sanjay Jha
:
Toward trusted wireless sensor networks. 5:1-5:25 - Christopher Miller, Christian Poellabauer

:
Reliable and efficient reprogramming in sensor networks. 6:1-6:32 - Jun Bum Lim, Beakcheol Jang, Suyoung Yoon, Mihail L. Sichitiu

, Alexander G. Dean
:
RaPTEX: Rapid prototyping tool for embedded communication systems. 7:1-7:40 - Chao Wang, Parameswaran Ramanathan, Kewal K. Saluja:

Modeling latency - lifetime trade-off for target detection in mobile sensor networks. 8:1-8:24 - Konstantinos Kalpakis:

Everywhere sparse approximately optimal minimum energy data gathering and aggregation in sensor networks. 9:1-9:26 - Koen Langendoen

, Andreas Meier:
Analyzing MAC protocols for low data-rate applications. 10:1-10:34
Volume 7, Number 2, August 2010
- Keith M. Martin, Maura B. Paterson

, Douglas R. Stinson:
Key predistribution for homogeneous wireless sensor networks with group deployment of nodes. 11:1-11:27 - Periklis Liaskovitis, Curt Schurgers:

Leveraging redundancy in sampling-interpolation applications for sensor networks: A spectral approach. 12:1-12:28 - Renita Machado, Wensheng Zhang, Guiling Wang

, Sirin Tekinay:
Coverage properties of clustered wireless sensor networks. 13:1-13:21 - Petr Jurcík, Anis Koubaa

, Ricardo Severino
, Mário Alves
, Eduardo Tovar
:
Dimensioning and worst-case analysis of cluster-tree sensor networks. 14:1-14:47 - Luca Mottola

, Gian Pietro Picco, Matteo Ceriotti
, Stefan Guna, Amy L. Murphy:
Not all wireless sensor networks are created equal: A comparative study on tunnels. 15:1-15:33 - Mario Strasser, Boris Danev, Srdjan Capkun:

Detection of reactive jamming in sensor networks. 16:1-16:29 - Ioannis Ch. Paschalidis, Yin Chen:

Statistical anomaly detection with sensor networks. 17:1-17:23 - David K. Y. Yau, Nung Kwan Yip, Chris Y. T. Ma, Nageswara S. V. Rao

, Mallikarjun Shankar
:
Quality of monitoring of stochastic events by periodic and proportional-share scheduling of sensor coverage. 18:1-18:49 - Koen Langendoen

, Andreas Meier:
Analyzing MAC protocols for low data-rate applications. 19:1-19:40
Volume 7, Number 3, September 2010
- Jeongyeup Paek

, Ramesh Govindan:
RCRT: Rate-controlled reliable transport protocol for wireless sensor networks. 20:1-20:45 - Jren-Chit Chin, Nageswara S. V. Rao

, David K. Y. Yau, Mallikarjun Shankar
, Yong Yang, Jennifer C. Hou, Srinivasagopalan Srivathsan, S. Sitharama Iyengar
:
Identification of low-level point radioactive sources using a sensor network. 21:1-21:35 - Rong Zheng, Khuong Vu, Amit Pendharkar, Gangbing Song:

Obstacle discovery in distributed actuator and sensor networks. 22:1-22:24 - Hristo N. Djidjev

:
Approximation algorithms for computing minimum exposure paths in a sensor field. 23:1-23:25 - Thomas Schmid, Roy Shea, Zainul Charbiwala, Jonathan Friedman, Mani B. Srivastava

, Young H. Cho:
On the interaction of clocks, power, and synchronization in duty-cycled embedded sensor nodes. 24:1-24:19 - David Peleg, Liam Roditty:

Localized spanner construction for ad hoc networks with variable transmission range. 25:1-25:14 - Yibei Ling, Chung-Min Chen, Shigang Chen:

Analysis of power-aware buffering schemes in wireless sensor networks. 26:1-26:33 - Alon Efrat

, David Forrester, Anand Iyer, Stephen G. Kobourov
, Cesim Erten
, Ozan Kilic:
Force-directed approaches to sensor localization. 27:1-27:25
Volume 7, Number 4, February 2011
- Matthew Holland, Tianqi Wang, Bülent Tavli

, Alireza Seyedi, Wendi Beth Heinzelman
:
Optimizing physical-layer parameters for wireless sensor networks. 28:1-28:20 - Aldar C.-F. Chan

, Claude Castelluccia:
A security framework for privacy-preserving data aggregation in wireless sensor networks. 29:1-29:45 - Rajesh Krishna Panta, Saurabh Bagchi, Samuel P. Midkiff

:
Efficient incremental code update for sensor networks. 30:1-30:32 - Andreas Krause

, Carlos Guestrin, Anupam Gupta, Jon M. Kleinberg:
Robust sensor placements at informative and communication-efficient locations. 31:1-31:33 - Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbell:

Energy-efficient congestion detection and avoidance in sensor networks. 32:1-32:31 - Guiling Wang

, Mary Jane Irwin, Haoying Fu, Piotr Berman, Wensheng Zhang, Tom La Porta:
Optimizing sensor movement planning for energy efficiency. 33:1-33:17 - Holger Paul Keeler, Peter G. Taylor

:
A model framework for greedy routing in a sensor network with a stochastic power scheme. 34:1-34:28 - Haiyan Cai, Xiaohua Jia

, Mo Sha
:
Critical sensor density for partial connectivity in large area wireless sensor networks. 35:1-35:23 - Yuanchen Zhu, Steven J. Gortler, Dylan Thurston

:
Sensor network localization using sensor perturbation. 36:1-36:23

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














