About this Journal Submit a Manuscript Table of Contents

Citations to this Journal [1,939 citations: 1–100 of 1,489 articles]

Articles published in International Journal of Distributed Sensor Networks have been cited 1,939 times. The following is a list of the 1,489 articles that have cited the articles published in International Journal of Distributed Sensor Networks.

  • Fernando Gielow, Gentian Jakllari, Michele Nogueira, and Aldri Santos, “Data similarity aware dynamic node clustering in wireless sensor networks,” Ad Hoc Networks, vol. 24, pp. 29–45, 2015. View at Publisher · View at Google Scholar
  • Min-Fan Ricky Lee, Ying-Chi Li, and Ming-Yen Chien, “Real-time face tracking and recognition using the mobile robots,” Advanced Robotics, vol. 29, no. 3, pp. 187–208, 2015. View at Publisher · View at Google Scholar
  • S. Jayaprakasam, S.K.A. Rahim, and Chee Yen Leow, “PSOGSA-Explore: A New Hybrid Metaheuristic Approach for Beampattern Optimization in Collaborative Beamforming,” Applied Soft Computing, 2015. View at Publisher · View at Google Scholar
  • Xiangning Shi, Linjun Fan, Yunxiang Ling, Jing He, and Dehui Xiong, “Dynamic and Quantitative Method of Analyzing Clock Inconsistency Factors among Distributed Nodes,” Arabian Journal For Science And Engineering, vol. 40, no. 2, pp. 519–530, 2015. View at Publisher · View at Google Scholar
  • Hanchen Jiang, Peng Lin, Maoshan Qiang, and Qixiang Fan, “A labor consumption measurement system based on real-time tracking technology for dam construction site,” Automation in Construction, vol. 52, pp. 1–15, 2015. View at Publisher · View at Google Scholar
  • Ghulam Muhammad, “Automatic speech recognition using interlaced derivative pattern for cloud based healthcare system,” Cluster Computing, 2015. View at Publisher · View at Google Scholar
  • Dohoon Kim, Donghee Choi, and Jonghyun Jin, “Method for Detecting Core Malware Sites Related to Biomedical Information Systems,” Computational and Mathematical Methods in Medicine, vol. 2015, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  • Julio A. Sanguesa, Manuel Fogue, Piedad Garrido, Francisco J. Martinez, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni, “RTAD: a Real-time Adaptive Dissemination System for VANETs,” Computer Communications, 2015. View at Publisher · View at Google Scholar
  • Chuchu Dong, and Fengqi Yu, “An efficient network reprogramming protocol for wireless sensor networks,” Computer Communications, vol. 55, pp. 41–50, 2015. View at Publisher · View at Google Scholar
  • Xenofon Fafoutis, Alessio Di Mauro, Madava D. Vithanage, and Nicola Dragoni, “Receiver-initiated medium access control protocols for wireless sensor networks,” Computer Networks, vol. 76, pp. 55–74, 2015. View at Publisher · View at Google Scholar
  • T Tran Nhon, and Dong-Seong Kim, “Real-time message scheduling for ISA100.11a networks,” Computer Standards & Interfaces, vol. 37, pp. 73–79, 2015. View at Publisher · View at Google Scholar
  • Chih-Fang Huang, Wei-Po Nien, and Yun-Sheng Yeh, “Learning Effectiveness of Applying Automated Music Composition Software in the High Grades of Elementary School,” Computers & Education, 2015. View at Publisher · View at Google Scholar
  • Ying An, Xi Luo, Yao Liu, Jiawei Huang, Geyong Min, and Jianxin Wang, “A congestion control scheme based on probabilistic packet acceptance and drop in delay-tolerant networks,” Concurrency and Computation: Practice and Experience, 2015. View at Publisher · View at Google Scholar
  • Hu Yang, Yuduo Wang, Jiangang Yang, and Tongning Wu, “Dosimetry of electromagnetic field exposure of an active armlet and its electromagnetic interference to the cardiac pacemakers using adult, child and infant models,” Electromagnetic Biology and Medicine, pp. 1–5, 2015. View at Publisher · View at Google Scholar
  • Ning Xi, Cong Sun, Jianfeng Ma, and Yulong Shen, “Secure service composition with information flow control in service clouds,” Future Generation Computer Systems, 2015. View at Publisher · View at Google Scholar
  • Dan Tao, and Tin-Yu Wu, “A Survey on Barrier Coverage Problem in Directional Sensor Networks,” Ieee Sensors Journal, vol. 15, no. 2, pp. 876–885, 2015. View at Publisher · View at Google Scholar
  • Abdul Waheed Khan, Abdul Hanan Abdullah, Mohammad Abdur Razzaque, and Javed Iqbal Bangash, “VGDRA: A Virtual Grid-Based Dynamic Routes Adjustment Scheme for Mobile Sink-Based Wireless Sensor Networks,” Ieee Sensors Journal, vol. 15, no. 1, pp. 526–534, 2015. View at Publisher · View at Google Scholar
  • Jie Wu, Liyi Zhang, Yu Bai, and Yunshan Sun, “Cluster-Based Consensus Time Synchronization for Wireless Sensor Networks,” Ieee Sensors Journal, vol. 15, no. 3, pp. 1404–1413, 2015. View at Publisher · View at Google Scholar
  • Chunsheng Zhu, Hasen Nicanfar, Victor C. M. Leung, and Laurence T. Yang, “An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration,” Ieee Transactions On Information Forensics And Security, vol. 10, no. 1, pp. 118–131, 2015. View at Publisher · View at Google Scholar
  • Andrea Montecucco, and Andrew R. Knox, “Maximum Power Point Tracking Converter Based on the Open-Circuit Voltage Method for Thermoelectric Generators,” Ieee Transactions on Power Electronics, vol. 30, no. 2, pp. 828–839, 2015. View at Publisher · View at Google Scholar
  • Nicolo Michelusi, and Urbashi Mitra, “Cross-Layer Design of Distributed Sensing-Estimation With Quality Feedback-Part I: Optimal Schemes,” Ieee Transactions On Signal Processing, vol. 63, no. 5, pp. 1228–1243, 2015. View at Publisher · View at Google Scholar
  • Nicolo Michelusi, and Urbashi Mitra, “Cross-Layer Design of Distributed Sensing-Estimation With Quality Feedback-Part II: Myopic Schemes,” Ieee Transactions On Signal Processing, vol. 63, no. 5, pp. 1244–1258, 2015. View at Publisher · View at Google Scholar
  • E. G. Stephan, T. O. Elsethagen, L. K. Berg, M. C. Macduff, P. R. Paulson, W. J. Shaw, C. Sivaraman, W. P. Smith, and A. Wynne, “Semantic catalog of things, services, and data to support a wind data management facility,” Information Systems Frontiers, 2015. View at Publisher · View at Google Scholar
  • Ashok Kumar Das, “A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor,” International Journal of Communication Systems, 2015. View at Publisher · View at Google Scholar
  • Peng-zhan Chen, Jie Li, Man Luo, and Nian-hua Zhu, “Real-Time Human Motion Capture Driven by a Wireless Sensor Network,” International Journal of Computer Games Technology, vol. 2015, pp. 1–14, 2015. View at Publisher · View at Google Scholar
  • Liantao Wu, Shuguo Zhuo, Zhibo Wang, and Zhi Wang, “pQueue-MAC: An Energy Efficient Hybrid MAC Protocol for Event-Driven Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–11, 2015. View at Publisher · View at Google Scholar
  • Pingping Dong, Jianxin Wang, Haodong Wang, and Yi Pan, “Boosting VoIP Capacity via Service Differentiation in IEEE 802.11e EDCA Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–11, 2015. View at Publisher · View at Google Scholar
  • Jen-Ming Hsu, Tzu-Chiang Chiang, Yao-Chang Yu, Wei-Guang Teng, and Ting-Wei Hou, “A New Energy Efficient and Reliable MedRadio Scheme Based on Cooperative Communication for Implanted Medical Devices,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–11, 2015. View at Publisher · View at Google Scholar
  • Seyed Mahdi Jameii, Karim Faez, and Mehdi Dehghan, “Multiobjective Optimization for Topology and Coverage Control in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–11, 2015. View at Publisher · View at Google Scholar
  • Sungryoul Lee, “Stochastic Polling Interval Adaptation in Duty-Cycled Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–7, 2015. View at Publisher · View at Google Scholar
  • Wenxiang Dong, Ying Yang, and Wenyi Zhang, “Gossiping with Message Splitting on Structured Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  • Recep Özdağ, and Ali Karcı, “Sensor Node Deployment Based on Electromagnetism-Like Algorithm in Mobile Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–15, 2015. View at Publisher · View at Google Scholar
  • O. H. Ando, C. L. Izidoro, J. M. Gomes, J. H. Correia, J. P. Carmo, and L. Schaeffer, “Acquisition and Monitoring System for TEG Characterization,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–7, 2015. View at Publisher · View at Google Scholar
  • Shengfeng Zhang, Xiaobei Wu, and Cheng Huang, “Adaptive Topology Reconfiguration from an Actor Failure in Wireless Sensor-Actor Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–11, 2015. View at Publisher · View at Google Scholar
  • Mohammad Nour Hindia, Ahmed Wasif Reza, and Kamarul Ariffin Noordin, “A Novel Scheduling Algorithm Based on Game Theory and Multicriteria Decision Making in LTE Network,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  • Sandra Sendra, Lorena Parra, Jaime Lloret, and Shafiullah Khan, “Systems and Algorithms for Wireless Sensor Networks Based on Animal and Natural Behavior,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–19, 2015. View at Publisher · View at Google Scholar
  • Chengqun Chu, Yongfeng Ren, Xin Liu, Yongqiu Zheng, and Wei Fang, “An Efficiency Multiplexing Scheme and Improved Sampling Method for Multichannel Data Acquisition System,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Xiaodong He, and Bin Tang, “Direction of Arrival Estimation Based on the Multistage Nested Wiener Filter,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–11, 2015. View at Publisher · View at Google Scholar
  • Yanrong Lu, Lixiang Li, Haipeng Peng, Xing Yang, and Yixian Yang, “A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Woojin Joe, Jonghyun Lee, and Karpjoo Jeong, “CSN: The Conceptually Manageable Sensor Network,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–17, 2015. View at Publisher · View at Google Scholar
  • Zhixin Fu, Zhen Liu, Yue Yuan, Min Zhao, and Qiaomu Li, “Coverage Restoration Method for Wireless Sensor Networks of Distributed PV System,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–7, 2015. View at Publisher · View at Google Scholar
  • Guifang Qiao, Guangming Song, Ying Zhang, Jun Zhang, and Jin Peng, “Lifetime Optimization of an Indoor Surveillance Sensor Network Using Adaptive Energy-Efficient Transmission,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–12, 2015. View at Publisher · View at Google Scholar
  • Li Fei, Yi Chen, Qiang Gao, Xiao-Hong Peng, and Qiong Li, “Energy Hole Mitigation through Cooperative Transmission in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–14, 2015. View at Publisher · View at Google Scholar
  • Yuanjie Li, Hongyun Xu, Qiying Cao, Zichuan Li, and Shigen Shen, “Evolutionary Game-Based Trust Strategy Adjustment among Nodes in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–12, 2015. View at Publisher · View at Google Scholar
  • Jiradett Kerdsri, and Komwut Wipusitwarakun, “Dynamic Rendezvous Based Routing Algorithm on Sparse Opportunistic Network Environment,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–12, 2015. View at Publisher · View at Google Scholar
  • Shuhua Zhu, Xiaojie Li, Chunsheng Zhu, Lei Shu, and Wei Sun, “Making It Trustable: Acoustic-Based Signcryption Mutual Authentication for Multiwearable Devices,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–14, 2015. View at Publisher · View at Google Scholar
  • Federica Paganelli, Francesca Paradiso, Stefano Turchi, Antonio Luchetta, Pino Castrogiovanni, and Dino Giuli, “Appliance Recognition in an OSGi-Based Home Energy Management Gateway,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–12, 2015. View at Publisher · View at Google Scholar
  • Omid Naderi, Mahdi Shahedi, and Sayyed Majid Mazinani, “A Trust Based Routing Protocol for Mitigation of Sinkhole Attacks in Wireless Sensor Networks,” International Journal of Information and Education Technology, vol. 5, no. 7, pp. 520–526, 2015. View at Publisher · View at Google Scholar
  • Younsung Choi, Donghoon Lee, Jiye Kim, Jaewook Jung, and Dongho Won, “Cryptanalysis of Improved Biometric-Based User Authentication Scheme for C/S System,” International Journal of Information and Education Technology, vol. 5, no. 7, pp. 538–542, 2015. View at Publisher · View at Google Scholar
  • Atchara Rueangprathum, Somchai Limsiroratana, and Suntorn Witosurapot, “Enabling Semantic-Based Ubiquitous Learning in UPnP Network Environment,” International Journal of Information and Education Technology, vol. 5, no. 10, pp. 794–798, 2015. View at Publisher · View at Google Scholar
  • Yanbin Shen, Pengcheng Yang, and Yaozhi Luo, “Development of a Customized Wireless Sensor System for Large-Scale Spatial Structures and Its Applications in Two Cases,” International Journal of Structural Stability and Dynamics, pp. 1640017, 2015. View at Publisher · View at Google Scholar
  • Jun Teng, Wei Lu, Yan Cui, and Rengui Zhang, “Temperature and Displacement Monitoring to Steel Roof Construction of Shenzhen Bay Stadium,” International Journal of Structural Stability and Dynamics, pp. 1640020, 2015. View at Publisher · View at Google Scholar
  • Atiq-Ur -Rahman, M.M. Al-Shomran, Irshad Ahmad, and Halabi Hasbullah, “Two Echelon Architecture Using Relay Node Placement in Wireless Sensor Network,” Journal of Applied Sciences, vol. 15, no. 2, pp. 214–222, 2015. View at Publisher · View at Google Scholar
  • Vaibhav Soni, and Dheeresh K. Mallick, “A Novel Scheme to Minimize Hop Count for GAF in Wireless Sensor Networks: Two-Level GAF,” Journal of Computer Networks and Communications, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Lili Xu, and Fan Wu, “Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care,” Journal Of Medical Systems, vol. 39, no. 2, 2015. View at Publisher · View at Google Scholar
  • Qazi Mamoon Ashraf, and Mohamed Hadi Habaebi, “Autonomic schemes for threat mitigation in Internet of Things,” Journal Of Network And Computer Applications, vol. 49, pp. 112–127, 2015. View at Publisher · View at Google Scholar
  • Raja Wasim Ahmad, Abdullah Gani, Siti Hafizah Ab Hamid, Muhammad Shiraz, Abdullah Yousafzai, and Feng Xia, “A Survey on Virtual Machine Migration and Server Consolidation Techniques for Cloud Data Centers,” Journal of Network and Computer Applications, 2015. View at Publisher · View at Google Scholar
  • Navdeep Kaur Kapoor, Shikharesh Majumdar, and Biswajit Nandy, “Techniques for Allocation of Sensors in Shared Wireless Sensor Networks,” Journal of Networks, vol. 10, no. 01, 2015. View at Publisher · View at Google Scholar
  • Jing Zhou, Aihuang Guo, Hung T. Nguyen, and Steven Su, “Intelligent Management of Multiple Access Schemes in Wireless Body Area Network,” Journal of Networks, vol. 10, no. 2, 2015. View at Publisher · View at Google Scholar
  • Shuhao Yu, Shoubao Su, and Li Huang, “A simple diversity guided firefly algorithm,” Kybernetes, vol. 44, no. 1, pp. 43–56, 2015. View at Publisher · View at Google Scholar
  • Junchang Xin, Zhiqiong Wang, Mei Bai, Linlin Ding, and Guoren Wang, “ Energy-Efficient β -Approximate Skylines Processing in Wireless Sensor Networks ,” Mathematical Problems in Engineering, vol. 2015, pp. 1–11, 2015. View at Publisher · View at Google Scholar
  • Kang Xie, Yixian Yang, Yang Xin, and Guangsheng Xia, “Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection,” Mathematical Problems in Engineering, vol. 2015, pp. 1–10, 2015. View at Publisher · View at Google Scholar
  • Mohammad Jalil Piran, Amjad Ali, and Doug Young Suh, “Fuzzy-Based Sensor Fusion for Cognitive Radio-Based Vehicular Ad Hoc and Sensor Networks,” Mathematical Problems in Engineering, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Mary Opokua Ansong, Jun Steed Huang, Mary Ann Yeboah, Han Dun, and Hongxing Yao, “Non-Gaussian Hybrid Transfer Functions: Memorizing Mine Survivability Calculations,” Mathematical Problems in Engineering, vol. 2015, pp. 1–18, 2015. View at Publisher · View at Google Scholar
  • Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, and Zhe Liu, “Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks,” Mobile Information Systems, vol. 2015, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  • Amilcare Francesco Santamaria, Cesare Sottile, Floriano De Rango, and Salvatore Marano, “Safety Enhancement and Carbon Dioxide (C O 2) reduction in VANETs,” Mobile Networks and Applications, 2015. View at Publisher · View at Google Scholar
  • M. Shamim Hossain, and Ghulam Muhammad, “Cloud-Assisted Speech and Face Recognition Framework for Health Monitoring,” Mobile Networks and Applications, 2015. View at Publisher · View at Google Scholar
  • Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen Chilamkurti, and Seng-Soo Yeo, “Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks,” Multimedia Systems, vol. 21, no. 1, pp. 49–60, 2015. View at Publisher · View at Google Scholar
  • Musab Ghadi, Lamri Laouamer, and Tarek Moulahi, “Securing data exchange in wireless multimedia sensor networks: perspectives and challenges,” Multimedia Tools and Applications, 2015. View at Publisher · View at Google Scholar
  • Shuai Liu, Zhibin Zhang, Lingyun Qi, and Ming Ma, “A fractal image encoding method based on statistical loss used in agricultural image compression,” Multimedia Tools and Applications, 2015. View at Publisher · View at Google Scholar
  • Mehdi Sookhak, Adnan Akhundzada, Alireza Sookhak, Mohammadreza Eslaminejad, Abdullah Gani, Muhammad Khurram Khan, Xiong Li, and Xiaomin Wang, “Geographic Wormhole Detection in Wireless Sensor Networks,” Plos One, vol. 10, no. 1, 2015. View at Publisher · View at Google Scholar
  • Naouel Ayari, Abdelghani Chibani, Yacine Amirat, and Eric Matson, “A semantic approach for enhancing assistive services in ubiquitous robotics,” Robotics and Autonomous Systems, 2015. View at Publisher · View at Google Scholar
  • Muhammad Altaf Khan, Shafiullah Khan, Bilal Shams, and Jaime Lloret, “Distributed flood attack detection mechanism using artificial neural network in wireless mesh networks,” Security and Communication Networks, 2015. View at Publisher · View at Google Scholar
  • Long Cheng, Yan Wang, Hao Wu, Nan Hu, and Chengdong Wu, “Non-Parametric Location Estimation in Rough Wireless Environments for Wireless Sensor Network,” Sensors and Actuators A: Physical, 2015. View at Publisher · View at Google Scholar
  • Bing Dai, Guoyan Zhao, Longjun Dong, and Chen Yang, “Mechanical Characteristics for Rocks under Different Paths and Unloading Rates under Confining Pressures,” Shock and Vibration, vol. 2015, pp. 1–8, 2015. View at Publisher · View at Google Scholar
  • Haoxiang He, Ruifeng Li, and Kui Chen, “Characteristics of Jerk Response Spectra for Elastic and Inelastic Systems,” Shock and Vibration, vol. 2015, pp. 1–12, 2015. View at Publisher · View at Google Scholar
  • Sudhanshu Tyagi, Sudeep Tanwar, Sumit Kumar Gupta, Neeraj Kumar, and Joel J. P. C. Rodrigues, “A lifetime extended multi-levels heterogeneous routing protocol for wireless sensor networks,” Telecommunication Systems, 2015. View at Publisher · View at Google Scholar
  • Deepa Devasenapathy, and Kathiravan Kannan, “An Energy-Efficient Cluster-Based Vehicle Detection on Road Network Using Intention Numeration Method,” The Scientific World Journal, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Duen-Yian Yeh, and Ching-Hsue Cheng, “Recommendation system for popular tourist attractions in Taiwan using Delphi panel and repertory grid techniques,” Tourism Management, vol. 46, pp. 164–176, 2015. View at Publisher · View at Google Scholar
  • Inn-Ho Tsai, Ying-Ming Wang, and Kai-Fa Huang, “Effects of single N-glycosylation site knockout on folding and defibrinogenating activities of acutobin recombinants from HEK293T,” Toxicon, vol. 94, pp. 50–59, 2015. View at Publisher · View at Google Scholar
  • Long-jun Dong, Xi-bing Li, Zi-long Zhou, Guang-hui Chen, and Ju Ma, “Three-dimensional analytical solution of acoustic emission source location for cuboid monitoring network without pre-measured wave velocity,” Transactions of Nonferrous Metals Society of China, vol. 25, no. 1, pp. 293–302, 2015. View at Publisher · View at Google Scholar
  • Leena Kumari, K. Narsaiah, M.K. Grewal, and R.K. Anurag, “Application of RFID in Agri-food sector-A review,” Trends in Food Science & Technology, 2015. View at Publisher · View at Google Scholar
  • Alfredo Navarra, Cristina M. Pinotti, Mario Di Francesco, and Sajal K. Das, “Interference-free scheduling with minimum latency in cluster-based wireless sensor networks,” Wireless Networks, 2015. View at Publisher · View at Google Scholar
  • Abhimanyu Kumar, and Sachin Tripathi, “A Pairing Free Anonymous Certificateless Group Key Agreement Protocol for Dynamic Group,” Wireless Personal Communications, 2015. View at Publisher · View at Google Scholar
  • Mohammad Bsoul, Yousef Kilani, Maen Hammad, Emad E. Abdallah, and Ayoub Alsarhan, “An Index-Based Approach for Wireless Sensor Networks,” Wireless Personal Communications, 2015. View at Publisher · View at Google Scholar
  • Cheng Bo, Zhao Shuai, and Tang Haina, “Wireless Machine to Machine Monitoring Using Cross-Platform Smart Phone for District Heating,” Wireless Personal Communications, 2015. View at Publisher · View at Google Scholar
  • De Gu, Jishuai Wang, and Ji Li, “Boundary Recognition by Simulating a Diffusion Process in Wireless Sensor Networks,” Abstract and Applied Analysis, vol. 2014, pp. 1–11, 2014. View at Publisher · View at Google Scholar
  • Longjun Dong, Xibing Li, and Gongnan Xie, “Nonlinear Methodologies for Identifying Seismic Event and Nuclear Explosion Using Random Forest, Support Vector Machine, and Naive Bayes Classification,” Abstract and Applied Analysis, vol. 2014, pp. 1–8, 2014. View at Publisher · View at Google Scholar
  • E. Ghazizadeh, Z. S. Shams Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, and M. S. Abdullah, “Secure OpenID Authentication Model by Using Trusted Computing,” Abstract and Applied Analysis, vol. 2014, pp. 1–15, 2014. View at Publisher · View at Google Scholar
  • Yuanjiang Huang, Raúl M. del Toro, José-Fernán Martínez, Vicente Hernández, and Rodolfo Haber, “Connectivity control in WSN based on fuzzy logic control,” ACM SIGBED Review, vol. 11, no. 3, pp. 54–57, 2014. View at Publisher · View at Google Scholar
  • Thomas La Porta, Chiara Petrioli, Cynthia Phillips, and Dora Spenza, “Sensor Mission Assignment in Rechargeable Wireless Sensor Networks,” ACM Transactions on Sensor Networks, vol. 10, no. 4, pp. 1–39, 2014. View at Publisher · View at Google Scholar
  • Shusen Yang, and Julie A. Mccann, “Distributed Optimal Lexicographic Max-Min Rate Allocation in Solar-Powered Wireless Sensor Networks,” ACM Transactions on Sensor Networks, vol. 11, no. 1, pp. 1–35, 2014. View at Publisher · View at Google Scholar
  • Inès El Korbi, and Sherali Zeadally, “Energy-Aware Sensor Node Relocation in Mobile Sensor Networks,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Ding Wang, and Ping Wang, “Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Dilan Sahin, Vehbi Cagri Gungor, Taskin Kocak, and Gurkan Tuna, “Quality-of-service differentiation in single-path and multi-path routing for wireless sensor network-based smart grid applications,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Huang Cheng, Xin Fei, Azzedine Boukerche, and Mohammed Almulla, “GeoCover: An Efficient Sparse Coverage Protocol For RSU Deployment Over Urban VANETs,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Fatih Senel, Kemal Akkaya, Melike Erol-Kantarci, and Turgay Yilmaz, “Self-deployment of mobile underwater acoustic sensor networks for maximized coverage and guaranteed connectivity,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Haitao Yu, Nianmin Yao, and Jun Liu, “An Adaptive Routing Protocol in Underwater Sparse Acoustic Sensor Networks,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Meenakshi Panda, and P.M. Khilar, “Distributed self fault diagnosis algorithm for large scale wireless sensor networks using modified three sigma edit test,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar
  • Saru Kumari, Muhammad Khurram Khan, and Mohammed Atiquzzaman, “User Authentication Schemes for Wireless Sensor Networks: A Review,” Ad Hoc Networks, 2014. View at Publisher · View at Google Scholar