2005
DOI: 10.1007/11502593_33
|View full text |Cite
|
Sign up to set email alerts
|

Project ExScal

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 0 publications
0
14
0
Order By: Relevance
“…nearby sensors within a few hops, or a distance of tens to hundreds of meters, are likely to yield similar readings, and vise versa. For example, in intrusion detection [1], the emergence of an intruder (i.e. human or vehicle) typically only triggers the number of sensors sufficiently close to it.…”
Section: Revisiting Sensor Datamentioning
confidence: 99%
See 3 more Smart Citations
“…nearby sensors within a few hops, or a distance of tens to hundreds of meters, are likely to yield similar readings, and vise versa. For example, in intrusion detection [1], the emergence of an intruder (i.e. human or vehicle) typically only triggers the number of sensors sufficiently close to it.…”
Section: Revisiting Sensor Datamentioning
confidence: 99%
“…Query results are the data items from all sensor motes in the window. 1 An example is shown in Figure 5, where the spatial window W is a rectangular region W = (0.125, 0.5) − (0.375, 0.6875) relative to the network area. Recall from Section 3.1 that geographic locations can be mapped to sensor motes' identifiers using Hilbert curve.…”
Section: Spatial Window Querymentioning
confidence: 99%
See 2 more Smart Citations
“…Hence, the existing algorithms are not scalable for extremely large networks, such as those in project ExScal [8]. ExScal consisted of 1,000 extreme scaling motes (XSMs) [9] and 203 XSSs.…”
mentioning
confidence: 99%