Journal articles on the topic 'Querying (Computer science). Wireless sensor networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Querying (Computer science). Wireless sensor networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ye, Mao, Ken C. K. Lee, Wang-Chien Lee, Xingjie Liu, and Meng-Chang Chen. "Querying Uncertain Minimum in Wireless Sensor Networks." IEEE Transactions on Knowledge and Data Engineering 24, no. 12 (December 2012): 2274–87. http://dx.doi.org/10.1109/tkde.2011.166.
Full textDemirbas, Murat, Anish Arora, and Vinodkrishnan Kulathumani. "Glance: A lightweight querying service for wireless sensor networks." Theoretical Computer Science 410, no. 6-7 (February 2009): 500–513. http://dx.doi.org/10.1016/j.tcs.2008.10.013.
Full textJoon Ahn and B. Krishnamachari. "Scaling Laws for Data-Centric Storage and Querying in Wireless Sensor Networks." IEEE/ACM Transactions on Networking 17, no. 4 (August 2009): 1242–55. http://dx.doi.org/10.1109/tnet.2008.2009220.
Full textMoro, Gianluca, and Gabriele Monti. "W-Grid: A scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks." Journal of Network and Computer Applications 35, no. 4 (July 2012): 1218–34. http://dx.doi.org/10.1016/j.jnca.2011.05.002.
Full textDi Pietro, Roberto, and Alexandre Viejo. "Location privacy and resilience in wireless sensor networks querying." Computer Communications 34, no. 3 (March 2011): 515–23. http://dx.doi.org/10.1016/j.comcom.2010.05.014.
Full textAhn, Joon, Shyam Kapadia, Sundeep Pattem, Avinash Sridharan, Marco Zuniga, Jung-Hyun Jun, Chen Avin, and Bhaskar Krishnamachari. "Empirical evaluation of querying mechanisms for unstructured wireless sensor networks." ACM SIGCOMM Computer Communication Review 38, no. 3 (July 2008): 17–26. http://dx.doi.org/10.1145/1384609.1384612.
Full textStankovic, John A. "Wireless Sensor Networks." Computer 41, no. 10 (October 2008): 92–95. http://dx.doi.org/10.1109/mc.2008.441.
Full textZorzi, M. "Wireless sensor networks." IEEE Wireless Communications 11, no. 6 (December 2004): 2. http://dx.doi.org/10.1109/mwc.2004.1368890.
Full textHavinga, P., J. C. Hou, and Feng Zhao. "Wireless sensor networks." IEEE Wireless Communications 11, no. 6 (December 2004): 4–5. http://dx.doi.org/10.1109/mwc.2004.1368892.
Full textAkan, O. B., M. T. Isik, and B. Baykal. "Wireless passive sensor networks." IEEE Communications Magazine 47, no. 8 (August 2009): 92–99. http://dx.doi.org/10.1109/mcom.2009.5181898.
Full textPerrig, Adrian, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47, no. 6 (June 2004): 53–57. http://dx.doi.org/10.1145/990680.990707.
Full textGavalas, D., G. Pantziou, and C. Konstantopoulos. "Mobility in Wireless Sensor Networks." Computer Journal 54, no. 12 (July 31, 2011): 1928–30. http://dx.doi.org/10.1093/comjnl/bxr074.
Full textMiyaji, Atsuko, and Kazumasa Omote. "Self‐healing wireless sensor networks." Concurrency and Computation: Practice and Experience 27, no. 10 (April 8, 2015): 2547–68. http://dx.doi.org/10.1002/cpe.3434.
Full textTerzis, Andreas, Razvan Musaloiu E., Joshua Cogan, Katalin Szlavecz, Alexander Szalay, Jim Gray, Stuart Ozer, Chieh Jan Mike Liang, Jayant Gupchup, and Randal Burns. "Wireless sensor networks for soil science." International Journal of Sensor Networks 7, no. 1/2 (2010): 53. http://dx.doi.org/10.1504/ijsnet.2010.031850.
Full textAnagnostopoulos, C., N. M. Adams, and D. J. Hand. "Streaming Covariance Selection with Applications to Adaptive Querying in Sensor Networks." Computer Journal 53, no. 9 (January 8, 2010): 1401–14. http://dx.doi.org/10.1093/comjnl/bxp123.
Full textHill, Jason, Mike Horton, Ralph Kling, and Lakshman Krishnamurthy. "The platforms enabling wireless sensor networks." Communications of the ACM 47, no. 6 (June 2004): 41–46. http://dx.doi.org/10.1145/990680.990705.
Full textYu-Chee Tseng, Meng-Shiuan Pan, and Yuen-Yung Tsai. "Wireless Sensor Networks for Emergency Navigation." Computer 39, no. 7 (July 2006): 55–62. http://dx.doi.org/10.1109/mc.2006.248.
Full textCoulson, Geoff, Barry Porter, Ioannis Chatzigiannakis, Christos Koninis, Stefan Fischer, Dennis Pfisterer, Daniel Bimschas, et al. "Flexible experimentation in wireless sensor networks." Communications of the ACM 55, no. 1 (January 2012): 82–90. http://dx.doi.org/10.1145/2063176.2063198.
Full textNagy, Naya, Marius Nagy, and Selim G. Akl. "Quantum security in wireless sensor networks." Natural Computing 9, no. 4 (April 22, 2010): 819–30. http://dx.doi.org/10.1007/s11047-010-9190-4.
Full textSarkar, Sanchita Mal, Iftikhar U. Sikder, Chansu Yu, and Vijay K. Konangi. "Uncertainty-aware Wireless Sensor Networks." International Journal of Mobile Communications 7, no. 3 (2009): 330. http://dx.doi.org/10.1504/ijmc.2009.023675.
Full textPICOVICI, D., M. BERGLUND, and J. NELSON. "Voice Controlled Wireless Sensor Networks." Advances in Electrical and Computer Engineering 7, no. 1 (2007): 3–8. http://dx.doi.org/10.4316/aece.2007.01001.
Full textXiaojiang Du and Hsiao-Hwa Chen. "Security in wireless sensor networks." IEEE Wireless Communications 15, no. 4 (August 2008): 60–66. http://dx.doi.org/10.1109/mwc.2008.4599222.
Full textLiming Zhou, Qiaoyan Wen, Hua Zhang, and Lin Cheng. "Enhancing Sensor Location Privacy in Wireless Sensor Networks." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 10 (May 31, 2013): 789–96. http://dx.doi.org/10.4156/aiss.vol5.issue10.92.
Full textDelaët, Sylvie, Partha Sarathi Mandal, Mariusz A. Rokicki, and Sébastien Tixeuil. "Deterministic secure positioning in wireless sensor networks." Theoretical Computer Science 412, no. 35 (August 2011): 4471–81. http://dx.doi.org/10.1016/j.tcs.2011.04.010.
Full textAliouat, Zibouda, and Saad Harous. "Energy efficient clustering for wireless sensor networks." International Journal of Pervasive Computing and Communications 10, no. 4 (October 28, 2014): 469–80. http://dx.doi.org/10.1108/ijpcc-05-2014-0033.
Full textZhang, Mingze, Mun Choon Chan, and A. L. Ananda. "Connectivity monitoring in wireless sensor networks." Pervasive and Mobile Computing 6, no. 1 (February 2010): 112–27. http://dx.doi.org/10.1016/j.pmcj.2009.07.009.
Full textBahi, Jacques, Wiem Elghazel, Christophe Guyeux, Mourad Hakem, Kamal Medjaher, and Noureddine Zerhouni. "Reliable diagnostics using wireless sensor networks." Computers in Industry 104 (January 2019): 103–15. http://dx.doi.org/10.1016/j.compind.2018.10.006.
Full textVoronenko, Oleksandr, Igor Galelyuka, and Volodymyr Romanov. "Wireless sensor networks for smart agriculture." International Journal of Reasoning-based Intelligent Systems 13, no. 3 (2021): 147. http://dx.doi.org/10.1504/ijris.2021.10040159.
Full textRomanov, Volodymyr, Igor Galelyuka, and Oleksandr Voronenko. "Wireless sensor networks for smart agriculture." International Journal of Reasoning-based Intelligent Systems 13, no. 3 (2021): 147. http://dx.doi.org/10.1504/ijris.2021.117079.
Full textShaoguo Xie, Yanjun Hu, Yi Wang, Lele Qiu, and Yingguan Wang. "Probability-based Localization in Wireless Sensor Networks." International Journal of Advancements in Computing Technology 5, no. 9 (May 31, 2013): 670–78. http://dx.doi.org/10.4156/ijact.vol5.issue9.79.
Full textSneha, V., and M. Nagarajan. "Localization in Wireless Sensor Networks: A Review." Cybernetics and Information Technologies 20, no. 4 (November 1, 2020): 3–26. http://dx.doi.org/10.2478/cait-2020-0044.
Full textBordim, Jacir Luiz, Koji Nakano, and Hong Shen. "Sorting on Single-Channel Wireless Sensor Networks." International Journal of Foundations of Computer Science 14, no. 03 (June 2003): 391–403. http://dx.doi.org/10.1142/s0129054103001807.
Full textBok, Kyoungsoo, Eunkyung Ryu, Junho Park, Jaijin Jung, and Jaesoo Yoo. "Multimedia congestion control in wireless sensor networks." Computer Science and Information Systems 12, no. 2 (2015): 801–21. http://dx.doi.org/10.2298/csis141009027b.
Full textWeimin, Gao, and Zhu Lingzhi. "Distributed Data Storage in Wireless Sensor Networks." International Journal of Database Theory and Application 8, no. 4 (August 30, 2015): 179–82. http://dx.doi.org/10.14257/ijdta.2015.8.4.18.
Full textJi, W. W., and Z. Liu. "Locating ineffective sensor nodes in wireless sensor networks." IET Communications 2, no. 3 (2008): 432. http://dx.doi.org/10.1049/iet-com:20060044.
Full textZhang, Fenghui, Anxiao (Andrew) Jiang, and Jianer Chen. "On the Planarization of Wireless Sensor Networks." Algorithmica 60, no. 3 (December 14, 2010): 593–608. http://dx.doi.org/10.1007/s00453-010-9476-z.
Full textGandino, Filippo, and Antonio Servetti. "Key Recoverability in Wireless Sensor Networks." IEEE Access 7 (2019): 164407–17. http://dx.doi.org/10.1109/access.2019.2952945.
Full textLee, Sang Hoon, Hyeokman Kim, and Lynn Choi. "Sleep Control Game for Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/3085408.
Full textSiqueira, Isabela G., Linnyer Beatrys Ruiz, Antonio A. F. Loureiro, and José Marcos Nogueira. "Coverage area management for wireless sensor networks." International Journal of Network Management 17, no. 1 (January 2007): 17–31. http://dx.doi.org/10.1002/nem.604.
Full textPICOVICI, D., A. V. CONTIU, A. TOPA, and J. NELSON. "Virtual Lab for Wireless Sensor Networks." Advances in Electrical and Computer Engineering 8, no. 2 (2008): 37–42. http://dx.doi.org/10.4316/aece.2008.02007.
Full textYen, Y. S., S. Hong, R. S. Chang, and H. C. Chao. "Controlled deployments for wireless sensor networks." IET Communications 3, no. 5 (2009): 820. http://dx.doi.org/10.1049/iet-com.2008.0262.
Full textBoukerche, Azzedine, and Eduardo Nakamura. "Localization systems for wireless sensor networks." IEEE Wireless Communications 14, no. 6 (December 2007): 6–12. http://dx.doi.org/10.1109/mwc.2007.4407221.
Full textRajasegarar, S., C. Leckie, and M. Palaniswami. "Anomaly detection in wireless sensor networks." IEEE Wireless Communications 15, no. 4 (August 2008): 34–40. http://dx.doi.org/10.1109/mwc.2008.4599219.
Full textPrasad, Neeli R., and Mahbubul Alam. "Security Framework for Wireless Sensor Networks." Wireless Personal Communications 37, no. 3-4 (May 16, 2006): 455–69. http://dx.doi.org/10.1007/s11277-006-9044-7.
Full textPandey, Manjusha, and Shekhar Verma. "Privacy Provisioning in Wireless Sensor Networks." Wireless Personal Communications 75, no. 2 (September 23, 2013): 1115–40. http://dx.doi.org/10.1007/s11277-013-1411-6.
Full textLi, Jason H., and Miao Yu. "Sensor coverage in wireless ad hoc sensor networks." International Journal of Sensor Networks 2, no. 3/4 (2007): 218. http://dx.doi.org/10.1504/ijsnet.2007.013202.
Full textLeone, Pierre, and José Rolim. "Towards a dynamical model for wireless sensor networks." Theoretical Computer Science 344, no. 1 (November 2005): 69–85. http://dx.doi.org/10.1016/j.tcs.2005.06.027.
Full textÀlvarez, Carme, Josep Díaz, Jordi Petit, José Rolim, and Maria Serna. "High level communication functionalities for wireless sensor networks." Theoretical Computer Science 406, no. 3 (October 2008): 240–47. http://dx.doi.org/10.1016/j.tcs.2008.06.055.
Full textHwang, Shiow‐Fen, Kun‐Hsien Lu, Tsung‐Hsiang Chang, and Chyi‐Ren Dow. "Hierarchical data gathering schemes in wireless sensor networks." International Journal of Pervasive Computing and Communications 4, no. 3 (September 5, 2008): 299–321. http://dx.doi.org/10.1108/17427370810911649.
Full textLi, Xin, Bei Hua, Yi Shang, and Yan Xiong. "A robust localization algorithm in wireless sensor networks." Frontiers of Computer Science in China 2, no. 4 (July 30, 2008): 438–50. http://dx.doi.org/10.1007/s11704-008-0018-7.
Full text