[1] Akyildiz I F, Su W, Sankarasubramaniam Y, Cayirci E. Wire-üess sensor networks: A survey. Computer Networks, 2002,ü8(4): 393-422.[2] Krishnamachari B. Networking Wireless Sensors. New York,üSA: Cambridge University Press, 2005.[3] Kim S, Pakzad S, Culler D et al. Health monitoring of civilünfrastructures using wireless sensor networks. In Proc. theüth ACM/IEEE IPSN, Apr. 2007, pp.254-263.[4] Xu N, Rangwala S, Chintalapudi K K, Ganesan D, Broad A,üovindan R, Estrin R. A wireless sensor network for struc-üural monitoring. In Proc. the 2nd ACM SenSys, Nov. 2004,üp.13-24.[5] Mo L, He Y, Liu Y, Zhao J, Tang S, Li X Y, Dai G. Canopyülosure estimates with GreenOrbs: Sustainable sensing in theüorest. In Proc. the 7th ACM SenSys, Nov. 2009, pp.99-112.[6] Liu Y, Mao X, He Y, Liu K, Gong W, Wang J. CitySee: Notünly a wireless sensor network. IEEE Network, 2013, 27(5):ü2-47.[7] Li M, Liu Y. Underground coal mine monitoring with wire-üess sensor networks. ACM Transactions on Sensor NetworksüTOSN), 2009, 5(2): Article No. 10.[8] Li M, Liu M, Chen L. Nonthreshold-based event detection forüD environment monitoring in sensor networks. IEEE Trans-üctions on Knowledge and Data Engineering, 2008, 20(12):ü699-1711.[9] Polastre J, Szewczyk R, Mainwaring A, Culler D, Anderson J.ünalysis of wireless sensor networks for habitat monitoring.ün Wireless Sensor Networks, Raghavendra C S, Sivalingam Kü, Znati T (eds.), Kluwer Academic Publishers, 2004, pp.399-ü23.[10] Yang Z, Liu Y. Understanding node localizability of wirelessüd-hoc networks. IEEE Transactions on Mobile Computing,ü012, 11(8): 1249-1260.[11] Wang J, Li Z, Li M, Liu Y, Yang Z. Sensor network naviga-üion without locations. IEEE Transactions on Parallel andüistributed Systems, 2013, 24(7): 1436-1446.[12] Li Z, Chen W, Li C, Li M, Li X, Liu Y. Flight: Clock cali-üration using fluorescent lighting. Proc. the 18th ACM Mo-üiCom, Aug. 2012, pp.329-340.[13] Liu Y, Liu K, Li M. Passive diagnosis for wireless sensor net-üorks. IEEE/ACM Transactions on Networking, 2010, 18(4):ü132-1144.[14] Cao Z, He Y, Liu Y. L2: Lazy forwarding in low duty cycleüireless sensor networks. In Proc. the 31st IEEE INFOCOM,üar. 2012, pp.1323-1331.[15] Dong W, Chen C, Liu X, Liu Y, Bu J, Zheng K. SenspireüS: A predictable, flexible, and effcient operating system forüireless sensor networks. IEEE Transactions on Computers,ü011, 60(12): 1788-1801.[16] Dong W, Liu Y,Wu X, Gu L, Chen C. Elon: Enabling effcientünd long-term reprogramming for wireless sensor networks.üCM SIGMETRICS Performance Evaluation Review, 2010,ü8(1): 49-60.[17] Li X Y, Liu Y, Li S, Tang S J. Multicast capacity of wirelessüd hoc networks under Gaussian channel model. IEEE/ACMüransactions on Networking, 2010, 18(4): 1145-1157.[18] Li M, Liu Y. Iso-Map: Energy-effcient contour mapping inüireless sensor networks. IEEE Transactions on Knowledgeünd Data Engineering, 2010, 22(5): 699-710.[19] Liu Y, He Y, Li M, Wang J, Liu K, Li X Y. Does wirelessüensor network scale? A measurement study on GreenOrbs.üEEE Transactions on Parallel and Distributed Systems,ü013, 24(10): 1983-1993.[20] Li M, Yang Z, Liu Y. Sea depth measurement with restrictedüoating sensors. ACM Transactions on Embedded Computingüystems, 2013, 13(1): Article No. 1.[21] Wang J, Liu Y, Li M, Dong W, He Y. QoF: Towards compre-üensive path quality measurement in wireless sensor networks.ün Proc. the 30th IEEE INFOCOM, Apr. 2011, pp.775-783.[22] Werner-Allen G, Lorincz K, Ruiz M et al. Deploying a wire-üess sensor network on an active volcano. Internet Computing,ü006, 10(2): 18-25.[23] Ni S Y, Tseng Y C, Chen Y S, Sheu J P. The broadcast stormüroblem in a mobile ad hoc network. In Proc. the 15th ACMüobiCom, Aug. 1999, pp.151-162.[24] Hill J L, Culler D E. Mica: A wireless platform for deeplyümbedded networks. IEEE Micro, 2002, 22(6): 12-24.[25] Polastre J, Szewczyk R, Culler D. Telos: Enabling ultra-lowüower wireless research. In Proc. the 4th ACM/IEEE IPSN,üpr. 2005, pp.364-369.[26] Tseng Y C, Ni S Y, Shih E Y. Adaptive approaches to re-üieving broadcast storms in a wireless multihop mobile adüoc network. IEEE Transactions on Computers, 2003, 52(5):ü45-557.[27] Haas Z J, Halpern J Y, Li L. Gossip-based ad hoc routing. Inüroc. the 21st IEEE INFOCOM, Jun. 2002, pp.1707-1716.[28] Levis P, Patel N, Culler D, Shenker S. Trickle: A self-üegulating algorithm for code propagation and maintenanceün wireless sensor networks. In Proc. the 1st USENIX NSDI,üar. 2004, Article No.2.[29] Kyasanur P, Choudhury R R, Gupta I. Smart gossip: Anüdaptive gossip-based broadcasting service for sensor net-üorks. In Proc. the 3rd IEEE MASS, Oct. 2006, pp.91-100.[30] Heinzelman W R, Kulik J, Balakrishnan H. Adaptive proto-üols for information dissemination in wireless sensor networks.ün Proc. the 5th ACM MobiCom, Aug. 1999, pp.174-185.[31] Kulik J, HeinzelmanWR, Balakrishnan H. Negotiation-basedürotocols for disseminating information in wireless sensor net-üorks. Wireless Networks, 2002, 8(2/3): 169-185.[32] Heidemann J, Stathopoulos T, Estrin D. A remote code up-üate mechanism for wireless sensor networks. Technical Re-üort, CENS Technical Report #30, Department of Computerücience, University of California, Los Angeles, USA, 2003.[33] Hui J W, Culler D E. The dynamic behavior of a data dissemi-üation protocol for network programming at scale. In Proc.ühe 2nd ACM SenSys, Nov. 2004, pp.81-94.[34] Kulkarni S S, Wang L. MNP: Multihop network reprogram-üing service for sensor networks. In Proc. the 25th IEEEüCDCS, Jun. 2005, pp.7-16.[35] Dong W, Liu Y, Wang C, Liu X, Chen C, Bu J. Link qua-üity aware code dissemination in wireless sensor networks. Inüroc. the 19th IEEE ICNP, Oct. 2011, pp.89-98.[36] De P, Liu Y, Das S K. Remo: An energy effcient reprogram-üing protocol for mobile sensor networks. In Proc. the 6thüEEE PerCom, Mar. 2008, pp.60-69.[37] Arumugam M U. Infuse: A TDMA based reprogramming ser-üice for sensor networks. In Proc. the 2nd ACM SenSys, Nov.ü004, pp.281-282.[38] Krasniewski M D, Panta R K, Bagchi S, Yang C L, Chap-üellWJ. Energy-effcient on-demand reprogramming of large-ücale sensor networks. ACM Transactions on Sensor Net-üorks, 2008, 4(1): Article No.2.[39] Naik V, Arora A, Sinha P, Zhang H. Sprinkler: A reliableünd energy effcient data dissemination service for wirelessümbedded devices. In Proc. the 26th IEEE RTSS, Dec. 2005,üp.277-286.[40] Levis P, Culler D E. The firecracker protocol. In Proc. theü1th ACM SIGOPS European Workshop, Sept. 2004, Articleüo.3.[41] Huang L, Setia S. CORD: Energy-effcient reliable bulk dataüissemination in sensor networks. In Proc. the 27th IEEEüNFOCOM, Apr. 2008, pp.574-582.[42] Maia G, Guidoni D L, de Aquino A L L, Loureiro A A F.ümproving an over-the-air programming protocol for wirelessüensor networks based on small world concepts. In Proc. theü2th ACM MSWiM, Oct. 2009, pp.261-267.[43] Panta R K, Khalil I, Bagchi S. Stream: Low overhead wirelessüeprogramming for sensor networks. In Proc. the 26th IEEEüNFOCOM, May 2007, pp.928{936.[44] Rossi M, Bui N, Zanca G, Stabellini L, Crepaldi R, Zorzi M.üYNAPSE++: Code dissemination in wireless sensor net-üorks using fountain codes. IEEE Transactions on Mobileüomputing, 2010, 9(12): 1749-1765.[45] MacKay DJC. Fountain codes. IEE Proceedings Communi-üations, 2005, 152(6): 1062-1068.[46] Hagedorn A, Starobinski D, Trachtenberg A. Rateless Deluge:üver-the-air programming of wireless sensor networks usingüandom linear codes. In Proc. the 7th ACM/IEEE IPSN,üpr. 2008, pp.457-466.[47] Wang X,Wang J, Xu Y. Data dissemination in wireless sensorüetworks with network coding. EURASIP Journal on Wire-üess Communications and Networking, 2010, Article No.2.[48] Firooz M H, Roy S. Data dissemination in wireless networksüith network coding. IEEE Communications Letters, 2013,ü7(5): 944-947.[49] Ferrari F, Zimmerling M, Thiele L, Saukh O. Effcient net-üork flooding and time synchronization with glossy. In Proc.ühe 10th IEEE IPSN, Apr. 2011, pp.73-84.[50] Ephremides A, Truong T V. Scheduling broadcasts in multi-üop radio networks. IEEE Transactions on Communications,ü990, 38(4): 456-460.[51] Whitehouse K, Woo A, Jiang F, Polastre J, Culler D E. Ex-üloiting the capture effect for collision detection and recovery.ün Proc. the IEEE EmNetS-II, May 2005, pp.45-52.[52] Leentvaar K, Flint J. The capture effect in FM receivers.üEEE Transactions on Communications, 1976, 24(5): 531-ü39.[53] Wang Q, Zhu Y, Cheng L. Reprogramming wireless sensorüetworks: Challenges and approaches. IEEE Network, 2006,ü0(3): 48-55.[54] Sun J Z. Dissemination protocols for reprogramming wirelessüensor networks: A literature survey. In Proc. the 4th IEEEüENSORCOMM, Jul. 2010, pp.151-156.[55] Dong W, Chen C, Liu X, Teng G, Bu J, Liu Y. Bulk dataüissemination in wireless sensor networks: Modeling and anal-üsis. Computer Networks, 2012, 56(11): 2664-2676.[56] Dong W, Chen C, Liu X, Bu J, Gao Y. A light-weightünd density-aware reprogramming protocol for wireless sensorüetworks. IEEE Transactions on Mobile Computing, 2011,ü0(10): 1403-1415.[57] Zheng X, Wang J, Dong W, He Y, Liu Y. Survival of theüttest: Data dissemination with selective negotiation in wire-üess sensor networks. In Proc. the 10th IEEE MASS, Oct.ü013, pp.443-451.[58] Ferrari F, Zimmerling M, Mottola L, Thiele L. Low-powerüireless bus. In Proc. the 10th ACM SenSys, Nov. 2012,üp.1-14.[59] Parthasarathy R, Shirazi B A, Peterson N, Song W Z, Hur-üon A. Management and security of remote sensor networks inüazardous environments using over the air programming. In-üormation Systems and e-Business Management, 2012, 10(4):ü21-548.[60] Tan H, Ostry D, Zic J, Jha S. A confidential and DoS-resistantüulti-hop code dissemination protocol for wireless sensor net-üorks. Computers & Security, 2013, 32: 36-55.[61] Peng S, Li S S, Liao X K, Peng X Y, Xiao N. A scalableüode dissemination protocol in heterogeneous wireless sensorüetworks. Science China Information Sciences, 2012, 55(6):ü323-1336.[62] Yang Z, Liu Y, Li X Y. Beyond trilateration: On the localiz-übility of wireless ad hoc networks. IEEE/ACM Transactionsün Networking, 2010, 18(6): 1806-1814.[63] Li M, Liu Y. Rendered path: Range-free localization inünisotropic sensor networks with holes. IEEE/ACM Trans-üctions on Networking, 2010, 18(1): 320-332.[64] Yang Z, Wu C, Liu Y. Locating in fingerprint space: Wirelessündoor localization with little human intervention. In Proc.ühe 18th ACM MobiCom, Aug. 2012, pp.269-280.[65] Yang Z, Zhou Z M, Liu Y. From RSSI to CSI: Indoor locali-üation via channel response. ACM Computing Survey, 2013,ü6(2): Article No.25.[66] He Y, Liu Y, Shen X, Mo L, Dai G. Non-interactive locali-üation of wireless camera sensors with mobile beacon. IEEEüransactions on Mobile Computing, 2013, 12(2): 333-345.[67] Maróti M, Kusy B, Simon G, Lédeczi Á. The flooding timeüynchronization protocol. In Proc. the 2nd ACM SenSys,üov. 2004, pp.39-49.[68] Shen X, Qian X, Zhao B, Fang Q, Dai G. Clapping and broad-üasting synchronization in wireless sensor networks. Tsinghuaücience & Technology, 2011, 16(6): 632-639.[69] Ma Q, Liu K, Miao X, Liu Y. Sherlock is around: Detectingüetwork failures with local evidence fusion. In Proc. the 31stüEEE INFOCOM, Mar. 2012, pp.792-800.[70] Liu K, Ma Q, Zhao X, Liu Y. Self-diagnosis for large scaleüireless sensor networks. In Proc. the 30th IEEE INFO-üOM, Apr. 2011, pp.1539-1547. |