共 17 条
[1]
Han X.F., Cao X., Lloyd E.L., Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks, IEEE Transactions On Mobile Computing, 9, 5, pp. 643-656, (2010)
[2]
Lee E., Park S., Yu F., Communication model and protocol based on multiple static sinks for supporting mobile users in wireless sensor networks, IEEE Transactions On Consumer Electronics, 56, 3, pp. 1652-1660, (2010)
[3]
Raymond D.R., Marchany R.C., Brownfield M.I., Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols, IEEE Transactions On Vehicular Technology, 58, 1, pp. 367-380, (2009)
[4]
Shin S., Kwon T., Jo G.-Y., An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks, IEEE Transactions On Industrial Informatics, 6, 4, pp. 744-757, (2010)
[5]
Mao S., Hou Y.T., BeamStar: An Edge-Based Approach to Routing in Wireless Sensor Networks, IEEE Transactions On Mobile Computing, 56, 3, pp. 1284-1296, (2007)
[6]
Zhen Y., Guan Y., A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks, IEEE/ACM Transactions On Networking, 18, 1, pp. 150-163, (2010)
[7]
Aboelfotoh H.M.F., Iyengar S.S., Chakrabarty K., Computing reliability and message delay for Cooperative wireless distributed sensor networks subject to random failures, IEEE Transactions On Reliability, 56, 3, pp. 145-155, (2005)
[8]
Zhang H., Shen H., Energy-Efficient Beaconless Geographic Routing in Wireless Sensor Networks, IEEE Transactions On Parallel and Distributed Systems, IEEE Press, 21, 6, pp. 881-896, (2010)
[9]
Ma N., Bouchard M., Goubran R.A., Speech enhancement using a masking threshold constrained Kalman filter and its heuristic implementations, IEEE Transactions On Audio, Speech, and Language Processing, 14, 1, pp. 19-32, (2006)
[10]
Sinha A., Kirubarajan T., Bar-Shalom Y., Application of the Kalman-Levy Filter for Tracking Maneuvering Targets, IEEE Transactions On Aerospace and Electronic Systems, 43, 3, pp. 1099-1107, (2007)