1 |
Duarte-Melo E J , Liu M Y . Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks. Proceedings of the GLOBECOM 2002, New York, USA, 2002: 21~25
|
2 |
Yarvis M , Kushalnagar N , Singh H , et al. Exploiting heterogeneity in sensor networks. Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2005), Miami, FL, USA, 2005: 878~890
|
3 |
Malhotra B , Nikolaidis I , Nascimento M A . Aggregation convergecast scheduling in wireless sensor networks. Wireless Network, 2011,17(2): 319~335
|
4 |
Desnoyers P , Ganesan D , Li H , et al. PRESTO: a predictive storage architecture for sensor networks. Proceedings of the Tenth Conference on Hot Topics in Operating Systems(HotOS-X), Santa Fe, New Mexico, USA, 2005: 231~236
|
5 |
Madden S , Franklin M J , Hellerstein J M . TAG: a tiny aggregation service for Ad Hoc sensor networks. Proceedings of the 5th Symposium on Operating Systems Design and Implementation, New York, USA, 2002: 131~146
|
6 |
Deshpande A , Nath S , Gibbons P B , et al. Cache-and-query for wide area sensor databases. Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, CA, USA, 2003: 503~514
|
7 |
Tang X , Xu J . Extending network lifetime for precision constrained data aggregation in wireless sensor networks. Proceedings of the IEEE INFOCOM, Barcelona, Catalunya, Spain, 2006: 755~766
|
8 |
Yao J B , Wen G J . Protecting classification privacy data aggregation in wireless sensor networks. Proceedings of the 4th International Conference on Wireless Communication, Networking and Mobile Computing(WiCOM), Dalian, China, 2008: 1~5
|
9 |
杨庚, 王安琪, 陈正宇 等. 一种低耗能的数据融合隐私保护算法. 计算机学报, 2011,34(5):792~800
|
10 |
Papadopoulos S , Kiayias A Papadias D . Secure and efficient in-network processing of exact SUM queries. Proceedings of the 27th International Conference on Data Engineering(ICDE), Hannover, Germany, 2011: 517~528
|
11 |
He W , Liu X , Nguyen H , et al. A cluster-based protocol to enforce integrity and preserve privacy in data aggregation. Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops, Montreal, QC, Canada, 2009: 14~19
|
12 |
Nath S , Yu H , Chan H . Secure outsourced aggregation via one way chains. Proceedings of the ACM SIGMOD International Conference on Management of Data, Rhode Island,USA, 2009: 31~34
|
13 |
Mykletun E , Girao J , Westhoff D . Public key based crypto schemes for data concealment in wireless sensor networks. Proceedings of the 2006 IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, 2006: 2288~2295
|
14 |
Boneh D , Gentry C , Lynn B , et al. Aggregate and verifiably encrypted signatures from bilinear maps. Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques(Eurocrypt 2003), Warsaw, Poland, 2003: 416~432
|
15 |
Madden S , Franklin M J , Hellerstein J M . TAG: a tiny aggregation service for Ad Hoc sensor networks. Proceedings of the 5th Symposium on Operating Systems Design and Implementation, New York, USA, 2002: 131~146
|