• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 307
Next 10 →

Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks

by Qing Cao, Tarek Abdelzaher, Robin Kravets
"... Abstract—Providing efficient and reliable communication in wireless sensor networks is a challenging problem. To recover from corrupted packets, previous approaches have tried to use retransmissions and FEC mechanisms. The energy efficiency of these mechanisms, however, is very sensitive to unreliab ..."
Abstract - Cited by 20 (4 self) - Add to MetaCart
to unreliable links. In this paper, we present cluster-based forwarding, where each node forms a cluster such that any node in the next-hop’s cluster can take forwarding responsibility. This architecture, designed specifically for wireless sensor networks, achieves better energyefficiency by reducing

Reliable End-to-End Data Transmission in Wireless Sensor Networks

by Von Der Carl-friedrich-gauß-fakultät , 1983
"... »You can’t connect the dots looking forward; you can only connect them looking backwards. So you have to trust that the dots will somehow connect in your future. « Steve Jobs iii Acknowledgements I thought long and hard about ways to show gratitude to the people who supported me while working on thi ..."
Abstract - Add to MetaCart
»You can’t connect the dots looking forward; you can only connect them looking backwards. So you have to trust that the dots will somehow connect in your future. « Steve Jobs iii Acknowledgements I thought long and hard about ways to show gratitude to the people who supported me while working

LEDS: Providing Location-aware End-to-end Data Security

by Kui Ren - in Wireless Sensor Networks,” In Proc. of IEEE INFOCOM’06 , 2006
"... Abstract — Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider att ..."
Abstract - Cited by 51 (9 self) - Add to MetaCart
Abstract — Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider

MMSPEED: Multipath multi-SPEED protocol for QoS guarantee of reliability and timeliness in wireless sensor networks

by Emad Felemban, Student Member, Chang-gun Lee, Eylem Ekici - IEEE Trans. on Mobile Computing , 2006
"... Abstract—In this paper, we present a novel packet delivery mechanism called Multi-Path and Multi-SPEED Routing Protocol (MMSPEED) for probabilistic QoS guarantee in wireless sensor networks. The QoS provisioning is performed in two quality domains, namely, timeliness and reliability. Multiple QoS le ..."
Abstract - Cited by 140 (0 self) - Add to MetaCart
Abstract—In this paper, we present a novel packet delivery mechanism called Multi-Path and Multi-SPEED Routing Protocol (MMSPEED) for probabilistic QoS guarantee in wireless sensor networks. The QoS provisioning is performed in two quality domains, namely, timeliness and reliability. Multiple Qo

End-to-End Energy Efficient Geographic Path Discovery With Guaranteed Delivery in Ad Hoc and Sensor Networks

by E. H. Elhafsi, N. Mitton, D. Simplot-Ryl
"... We propose a novel localized routing protocol for wireless sensor networks (WSN) that is energy-efficient and guarantees delivery. We prove that it is constant factor of the optimum for dense networks. To forward a packet, a node s in graph G computes the cost of the energy weighted shortest path (S ..."
Abstract - Cited by 14 (11 self) - Add to MetaCart
We propose a novel localized routing protocol for wireless sensor networks (WSN) that is energy-efficient and guarantees delivery. We prove that it is constant factor of the optimum for dense networks. To forward a packet, a node s in graph G computes the cost of the energy weighted shortest path

An End-to-End Video Transmission System over Multimedia Wireless Sensor Networks

by Shibi K. John, T. V. U. Kiran Kumar, Alice Abraham
"... Abstract- Multimedia transmission requires timely delivery for its real time application. Multimedia wireless sensors have special characteristics that make them different from traditional Wireless sensors. In this paper we propose an End-to-End Video streaming system over wireless multimedia sensor ..."
Abstract - Add to MetaCart
Abstract- Multimedia transmission requires timely delivery for its real time application. Multimedia wireless sensors have special characteristics that make them different from traditional Wireless sensors. In this paper we propose an End-to-End Video streaming system over wireless multimedia

ESTIMATION OF THE PROBABILITY DENSITY FUNCTION OF END-TO-END DELAYS IN WIRELESS SENSOR NETWORKS

by Ramon Serna Oliver, Technische Universität Kaiserslautern , 2009
"... The nature of Wireless Sensor Networks (WSN) prevents applying classic real-time methods unless restrictive assumptions are taken about the participating en-tities. Thus, for applicability in realistic deployments alternative methods capable of offering meaningful Quality of Service (QoS) based on r ..."
Abstract - Add to MetaCart
on realistic assumptions are needed. This technical report presents an approach to estimate probabilistic timeliness guarantees of end-to-end message delivery delays in WSN. Each node computes at run-time local statistics about its message forwarding latency with low com-putational and memory requirements

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

by Zygmunt J. Haas, Tuan-che Chen - IEEE MILCOM
"... Abstract—Cooperative communication is a promising way to reduce probability of packet loss. The massive deployment of nodes in wireless sensor network renders such networks especially attractive for exploiting the advantage of cooperative diversity. Similarly, when used appropriately, network coding ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
clusters and nodes within the same cluster cooperate in transmitting and receiving packets. Such an integration reduces the amount of redundant information being forwarded to ensure high probability of correct end-to-end reception, when link-level retransmission of erroneous packets is not allowed (i

Caglayan, “Endto-end reliable event transfer in wireless sensor networks

by Nurcan Tezcan, Erdal Cayirci, M. Ufuk Caglayan - in IEEE PIMRC’04 , 2004
"... Abstract- In this paper, a new group of end-to-end reliable event transfer schemes is introduced for sensor networks. In these schemes, reliable event delivery is considered rather than reliable delivery of data packets, since the ultimate goal is the detection of events in sensor networks. Reliable ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Abstract- In this paper, a new group of end-to-end reliable event transfer schemes is introduced for sensor networks. In these schemes, reliable event delivery is considered rather than reliable delivery of data packets, since the ultimate goal is the detection of events in sensor networks

Abstract Reliable Bursty Convergecast in Wireless Sensor Networks

by Hongwei Zhang, Anish Arora, Young-ri Choi, Mohamed G. Gouda
"... We address the challenges of bursty convergecast in multi-hop wireless sensor networks, where a large burst of packets from different locations needs to be transported reliably and in realtime to a base station. Via experiments on a 49 MICA2 mote sensor network using a realistic traffic trace, we de ..."
Abstract - Add to MetaCart
that compared to a commonly used implicit-ack scheme, RBC doubles packet delivery ratio and reduces end-to-end delay by an order of magnitude, as a result of which RBC achieves a close-to-optimal ¢ goodput. — wireless sensor network, bursty convergecast, reliability, real-time, error control, contention control
Next 10 →
Results 1 - 10 of 307
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University