[1]
|
D. Chen and P. K. Varshney, “QoS Support in Wireless Sensor Networks: A Survey,” Proceedings of the International Conference on Wireless Networks (ICWN 04), Las Vegas, 21-24 June 2004, pp. 227-233.
|
[2]
|
J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor Network Survey,” Computer Networks, Vol. 52, No. 12, 2008, pp. 2292-2330. http://dx.doi.org/10.1016/j.comnet.2008.04.002
|
[3]
|
J. L. Lu, W. Shu and W. Wu, “A Survey on Multipacket Reception for Wireless Random Access Networks,” Journal of Computer Networks and Communications, Vol. 2012, 2012, 14 p.
|
[4]
|
D. Chen and P. K. Varshney, “QoS Support in Wireless Sensor Networks: A Survey,” Proceedings of the International Conference on Wireless Networks, Las Vegas, 2004, pp. 609-619.
|
[5]
|
M. Z. Hasan and T. C. Wan, “Optimized Quality of Service for Real-Time Wireless Sensor Networks Using a Partitioning Multipath Routing Approach,” Journal of Computer Networks and Communications, Vol. 2013, 2013, 18 p. http://dx.doi.org/10.1155/2013/497157
|
[6]
|
E. Crawley, R. Nair, B. Rajagopalan and H. Sandick, “A Framework for QoS-Based Routing in the Internet,” RFC 2386, Internet Eng. Task Force, 1997. fttp://fttp.ietf.org/internet-draftsdraft-ietf-qosr-framework-02.txt
|
[7]
|
S. G. Chen, “Routing Support for Providing Guaranteed End-to-End Quality-of-Service,” Ph.D. Thesis, University of Illinois at Urbana-Champaign (UIUC), Champaign, 1999. http://cairo.cs.uiuc.edu/papers/SCthesis.ps.
|
[8]
|
G. Pottie and W. Kaiser, “Wireless Integrated Network Sensors,” Communications of the ACM, Vol. 43, No. 5, 2000, pp. 51-58. http://dx.doi.org/10.1145/332833.332838
|
[9]
|
D. Estrin, L. Girod, G. Pottie and M. Srivastava, “Instrumenting the World with Wireless Sensor Networks,” Proceedings of International Conference Acoustics, Speech and Signal Processing (ICASSP 2001), May 2001, pp. 2675-2678.
|
[10]
|
MIT Technology Review, “10 Emerging Technologies That Will Change the World,” MIT’s Magazine of Innovation Technology Review, 2003. www.technologyreview.com
|
[11]
|
R. F. Rey, “Engineering and Operations in the Bell System,” Bell Labs, Murray Hill, 1977.
|
[12]
|
X. Wang, W. Gu, K. Schosek, S. Chellappan and D. Xuan, “Sensor Network Configuration under Physical Attacks,” Technical Report Technical Report (OSU-CISRC-7/04-TR45), The Ohio-State University, Columbus, 2004.
|
[13]
|
X. Wang, W. Gu, S. Chellappan, D. Xuan and T. H. Laii, “Search-Based Physical Attacks in Sensor Networks: Modeling and Defense,” Technical Report, The Ohio-State University, Columbus, 2005.
|
[14]
|
H. Chan, A. Perrig and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington DC, 2003, p. 197.
|
[15]
|
Y. Desmedt and S. Jajodia, “Redistributing Secret Shares to New Access Structures and Its Applications,” Technical Report ISSE TR-97-01, George Mason University, Fairfax, 1997.
|
[16]
|
M. Perillo and W. Heinzelman, “Providing Application QoS through Intelligent Sensor Management,” 1st Sensor Network Protocols and Applications Workshop (SNPA 2003), Anchorage, 11 May 2003, pp. 93-101.
|
[17]
|
R. Iyer and L. Kleinrock, “QoS Control for Sensor Networks,” IEEE International Communications Conference (ICC 2003), Anchorage, 11-15 May 2003, pp. 517-521.
|
[18]
|
Arora, et al., “Extreme Scale Wireless Sensor Networking,” Technical Report, 2004. http://www.cse.ohio-state.edu/exscal/
|
[19]
|
M. W. Chiang, Z. Zilic, K. Radecka and J.-S. Chenard, “Architectures of Increased Availability Wireless Sensor Network Nodes,” ITC International Test Conference, Vol. 43, No. 2, 2004, pp. 1232-1241.
|
[20]
|
Headquarters, Department of the Army, “Reliability/Availability of Electrical & Mechanical Systems for Command, Control, Communications, Computer, Intelligence, Surveillance, and Reconnaissance Facilities,” Department of the Army, Washington DC, 2003.
|
[21]
|
M. Eddous and R. Stansfield, “Methods of Decision Making,” UNITY, Audit, 1997.
|
[22]
|
J. C. Knight, “An Introduction to Computing System Dependability,” Proceedings of the 26th International Conference on Software Engineering (ICSE’04), Scotland, 2004, pp. 730-731. http://dx.doi.org/10.1109/ICSE.2004.1317509
|