2013
DOI: 10.1109/tpds.2012.92
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 45 publications
(21 citation statements)
references
References 25 publications
0
21
0
Order By: Relevance
“…A link exists if it's length is within the communication range of radio. In our previous work [10], [9], we find that most of links, which either have a good PRR (Packet Reception Ratio) more than 90%, or have a bad PRR less than 10%. Therefore, in this work, the basic idea is to use one flooding probe to check all the links.…”
Section: Main Designmentioning
confidence: 64%
See 1 more Smart Citation
“…A link exists if it's length is within the communication range of radio. In our previous work [10], [9], we find that most of links, which either have a good PRR (Packet Reception Ratio) more than 90%, or have a bad PRR less than 10%. Therefore, in this work, the basic idea is to use one flooding probe to check all the links.…”
Section: Main Designmentioning
confidence: 64%
“…Existing inference-based diagnosis schemes for WSNs like Sympathy [15] or Emstar [5] rely heavily on an add-in protocol that periodically reports a large amount of network information from individual sensor nodes to the sink, introducing huge overhead to the resource constrained and traffic sensitive sensor network. In order to minimize the overhead, some researchers propose to establish inference models by marking the data packets [11], [13], 9 and then parse the results at the sink to infer the network status, or conduct the diagnosis process in local areas [12]. Steinder and Sethi [18] apply Belief Network with the bipartite graph to represent dependencies among links and end to end connections, then the root causes can be deduced by conducting inference on the Belief Network.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Innetwork data aggregation and fusion used by different protocols under different topologies reduces energy consumption while data forwarding. [13], [17][18], [25][26][27] consider residual energy of node or path to reduce energy consumption while data dissemination in the network. Often aggregating data at a single node is erroneous due several network constraints.…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…Most widely used topologies are cluster based for aggregating and fusing the spatially correlated data [21][22][23]. Tree based data collection creates a hierarchy of nodes and aggregation of gathered data is performed at each level [24][25][26][27]. Coversets or backbone formation methods are implemented to avoid any loss due to link failure in tree based topology.…”
Section: Topologymentioning
confidence: 99%
“…For example, the sensor placement problem [58] and routing protocol design [59] are studied by Matlab. Sometimes, the collected traces from the real deployments [60,61] are imported into the simulation models to reproduce the transmission behaviors of links and paths in WSNs. A discrete event simulator is developed in Java to study the MAC performance of WSNs [62].…”
Section: Network Simulators With Node Modelsmentioning
confidence: 99%