2017
DOI: 10.1145/3145453
|View full text |Cite
|
Sign up to set email alerts
|

Software Adaptation in Wireless Sensor Networks

Abstract: We present design concepts, programming constructs, and automatic verification techniques to support the development of adaptive Wireless Sensor Network (WSN) software. WSNs operate at the interface between the physical world and the computing machine, and are hence exposed to unpredictable environment dynamics. WSN software must adapt to these dynamics to maintain dependable and efficient operation. However, developers are left without proper support to develop adaptive functionality in WSN software. Our work… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 55 publications
0
6
0
Order By: Relevance
“…ConesC [30] is a verification WSN tool designed to easily deploy and test different types of WSN models in terms of design perspectives. It efficiently allows developers to check and evaluate the correctness of proposed WSN designs.…”
Section: Network Simulators and Emulatorsmentioning
confidence: 99%
“…ConesC [30] is a verification WSN tool designed to easily deploy and test different types of WSN models in terms of design perspectives. It efficiently allows developers to check and evaluate the correctness of proposed WSN designs.…”
Section: Network Simulators and Emulatorsmentioning
confidence: 99%
“…The urge of applying SE processes is of vital importance especially to large, complex systems including networking and security service systems [3][4][5][6]. Such systems are associated with risks that increase in unattended environments such as wireless networks.…”
Section: Introductionmentioning
confidence: 99%
“…Such systems are associated with risks that increase in unattended environments such as wireless networks. Therefore, embracing a holistic approach of any weakness along the engineering process of the system is required [1][2][3][4][5][6] to secure the networks from vulnerabilities that may lead to future security breaches.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations