2012 Proceedings IEEE INFOCOM 2012
DOI: 10.1109/infcom.2012.6195789
|View full text |Cite
|
Sign up to set email alerts
|

Location Aware Peak Value Queries in sensor networks

Abstract: In the applications of wireless sensor networks, the peak values, such as largest sensed values and their locations, are very useful for detecting abnormal events happened in the monitored region. Although the results returned by the traditional top-queries provide largest sensed values, they ignore the spatial-correlation of the sensed data so that the locations of the returned values are very close to each other and only tell a small area being abnormal or few number of abnormal events happening. Due to this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 24 publications
0
16
0
Order By: Relevance
“…The hashed data point, as the example demonstrated in Fig. 3, 3 , and d i,4 are the given leaf nodes, we have evidence h 4 , as the root node…”
Section: A the Manufacture Of A Layered Authentication (La) Treementioning
confidence: 99%
See 2 more Smart Citations
“…The hashed data point, as the example demonstrated in Fig. 3, 3 , and d i,4 are the given leaf nodes, we have evidence h 4 , as the root node…”
Section: A the Manufacture Of A Layered Authentication (La) Treementioning
confidence: 99%
“…3, the leaf nodes (blue nodes) are data points, the inner nodes (gray nodes) are signified as hashed data points, and the root node (red node) denotes the verifiable information, HM AC. The data characterizes the order relation in each layer; that is, the 3 , and d i,4 in layer 1 is with the descending order from d i,4 to d i,1 , and moreover, the second dimension of d i,1 , d i,2 , d i, 3 , and d i,4 is with the ascending order from d i,4 to d i,1 . Similarly, the order relations are still reserved in other layers.…”
Section: A the Manufacture Of A Layered Authentication (La) Treementioning
confidence: 99%
See 1 more Smart Citation
“…The authors proposed to use samples of past sensor readings, which can reduce energy significantly. The work in [18] The relationship between the errors of δ-approximate critical points and t values, the extremum and inflection points are also critical points.…”
Section: Related Workmentioning
confidence: 99%
“…Under such assumptions, a great number of query processing techniques on discrete sensory data have been proposed, including the curve query processing algorithms [13], aggregation query processing algorithms [14][15][16][17], top-k query processing algorithms [18][19][20], skyline [21,22], and quantilen [23,24] query processing algorithms. Although all the above algorithms are efficient for processing the discrete sensory data, they cannot meet the complicated query requirements given by users and do not support to retrieve the critical data points in current WSNs since only discrete data were considered.…”
Section: Introductionmentioning
confidence: 99%