Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005.
DOI: 10.1109/ewsn.2005.1462003
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring volcanic eruptions with a wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
198
0
4

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 346 publications
(209 citation statements)
references
References 20 publications
1
198
0
4
Order By: Relevance
“…The definitions of events in previous literature fall into two categories: thresholdbased [5,4,3] and non-threshold-based [1,6], the methods of which are discussed in the following two paragraphs correspondingly.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The definitions of events in previous literature fall into two categories: thresholdbased [5,4,3] and non-threshold-based [1,6], the methods of which are discussed in the following two paragraphs correspondingly.…”
Section: Related Workmentioning
confidence: 99%
“…Once a tuple is satisfied, a report is returned. [3] develops a local event detection method -exponentially weighted moving average(EWMA) without collecting neighbors' readings, while still maintaining certain reliability in the presence of reading errors. It calculates short-term and long-term moving averages with different gain parameters and compares the ratio of the short-term average to the long-term average with a predefined threshold to decide whether an event has occurred.…”
Section: Related Workmentioning
confidence: 99%
“…The tracking of mobile targets is one typical task for geosensor networks [16,18]. Other applications have included observing hazards [19], monitoring seismic activity [20,21], or managing traffic flow [11]. When the sensor nodes are deployed to moving entities in a dynamic scenario, we refer to a mobile wireless sensor network (mWSN).…”
Section: Mobile Wireless Sensor Networkmentioning
confidence: 99%
“…These constraints appear in terms of energy constraints, available memory constraints [9], and, in some scenarios, delay constraints [2,[11][12][13]. Accordingly, we desire to reduce the energy overhead due to communications as much as possible, while keeping memory and delay requirements as low as possible.…”
Section: Wsn: Why Is Analysis Difficult?mentioning
confidence: 99%
“…Finally, but most importantly, in many applications, both the packet size and data transmission rate will be likely to be very small: for example, 36 bytes in [10], 32 bytes data in [13], up to 16 bits in [14], few of tens of bits in most medical applications [15], etc. In terms of transmission rate, Mica2 (19.2 kbps) and MicaZ (250 kbps) are well-known examples.…”
Section: Application Typesmentioning
confidence: 99%