Table of Contents Author Guidelines Submit a Manuscript
Scientific Programming
Volume 2016, Article ID 6907231, 21 pages
http://dx.doi.org/10.1155/2016/6907231
Research Article

Fast Program Codes Dissemination for Smart Wireless Software Defined Networks

School of Information Science and Engineering, Central South University, Changsha 410083, China

Received 17 July 2016; Accepted 25 August 2016

Academic Editor: Xiong Luo

Copyright © 2016 Xiao Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Luo, J. Liu, D. D. Zhang, and X. Chang, “A large-scale web QoS prediction scheme for the Industrial Internet of Things based on a kernel machine learning algorithm,” Computer Networks, vol. 101, pp. 81–89, 2016. View at Publisher · View at Google Scholar
  2. S. He, J. Chen, X. Li, X. S. Shen, and Y. Sun, “Mobility and intruder prior information improving the barrier coverage of sparse sensor networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 6, pp. 1268–1282, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. W. Zhao, “Performance optimization for state machine replication based on application semantics: a review,” Journal of Systems and Software, vol. 112, pp. 96–109, 2016. View at Publisher · View at Google Scholar · View at Scopus
  4. H. Liu, L. Yu, W. Wang, and F. Sun, “Extreme learning machine for time sequence classification,” Neurocomputing, vol. 174, pp. 322–330, 2016. View at Publisher · View at Google Scholar · View at Scopus
  5. L. Yang, J. Cao, W. Zhu, and S. Tang, “Accurate and efficient object tracking based on passive RFID,” IEEE Transactions on Mobile Computing, vol. 14, no. 11, pp. 2188–2200, 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. K. Hua and W. Wang, “High security self-encoded spread spectrum watermarking using genetic algorithms,” Telecommunication Systems, vol. 60, no. 1, pp. 143–148, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Liu, Y. Hu, and Z. Chen, “An energy-efficient mobile target detection scheme with adjustable duty cycles in wireless sensor networks,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 22, no. 4, pp. 203–225, 2016. View at Publisher · View at Google Scholar
  8. Y. Liu, A. Liu, Y. Hu et al., “FFSC: an energy efficiency communications approach for delay minimizing in internet of things,” IEEE Access, vol. 4, pp. 3775–3793, 2016. View at Google Scholar
  9. H. Dai, G. Chen, C. Wang, S. Wang, X. Wu, and F. Wu, “Quality of energy provisioning for wireless power transfer,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 2, pp. 527–537, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Li, D. Liu, Y. Dai, and T. H. Luan, “Engineering searchable encryption of mobile cloud networks: when QoE meets QoP,” IEEE Wireless Communications, vol. 22, no. 4, pp. 74–80, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. R. Xie, A. Liu, and J. Gao, “A residual energy aware schedule scheme for WSNs employing adjustable awake/sleep duty cycle,” Wireless Personal Communications, 2016. View at Publisher · View at Google Scholar
  12. Y. Hu and A. Liu, “Improvement the quality of mobile target detection through portion of node with fully duty cycle in WSNs,” Computer Systems Science and Engineering, vol. 31, no. 1, pp. 5–17, 2016. View at Google Scholar
  13. Y. Liu, M. Dong, K. Ota, and A. Liu, “ActiveTrust: secure and trustable routing in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 2013–2027, 2016. View at Publisher · View at Google Scholar
  14. X. Liu, K. Ota, A. Liu, and Z. Chen, “An incentive game based evolutionary model for crowd sensing networks,” Peer-to-Peer Networking and Applications, vol. 9, no. 4, pp. 692–711, 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. X. Zheng, J. Wang, W. Dong, Y. He, and Y. Liu, “Bulk data dissemination in wireless sensor networks: analysis, implications and improvement,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1428–1439, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  16. S. He, D.-H. Shin, J. Zhang, J. Chen, and Y. Sun, “Full-view area coverage in camera sensor networks: dimension reduction and near-optimal solutions,” IEEE Transactions on Vehicular Technology, 2015. View at Publisher · View at Google Scholar
  17. S. Guha and S. Khuller, “Approximation algorithms for connected dominating sets,” Algorithmica, vol. 20, no. 4, pp. 374–387, 1998. View at Publisher · View at Google Scholar · View at MathSciNet
  18. H. Lim and C. Kim, “Flooding in wireless ad hoc networks,” Computer Communications, vol. 24, no. 3-4, pp. 353–363, 2001. View at Publisher · View at Google Scholar · View at Scopus
  19. J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, “On the construction of energy-efficient broadcast and multicast trees in wireless networks,” in Proceedings of the IEEE 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '00), vol. 2, pp. 585–594, Tel Aviv, Israel, March 2000. View at Publisher · View at Google Scholar
  20. A. K. Das, R. J. Marks, M. El-Sharkawi, P. Arabshahi, and A. Gray, “r-shrink: a heuristic for improving minimum power broadcast trees in wireless networks,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '03), pp. 523–527, December 2003. View at Scopus
  21. H. Dai, X. Wu, L. Xu, F. Wu, S. He, and G. Chen, “Practical scheduling for stochastic event capture in energy harvesting sensor networks,” International Journal of Sensor Networks, vol. 18, no. 1-2, pp. 85–100, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Dong, K. Ota, L. T. Yang, A. Liu, and M. Guo, “LSCD: a low-storage clone detection protocol for cyber-physical systems,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 35, no. 5, pp. 712–723, 2016. View at Publisher · View at Google Scholar
  23. H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, “EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2053–2064, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. X. Liu, “A novel transmission range adjustment strategy for energy hole avoiding in wireless sensor networks,” Journal of Network and Computer Applications, vol. 67, pp. 43–52, 2016. View at Publisher · View at Google Scholar
  25. T. Le Duc, D. T. Le, V. V. Zalyubovskiy, D. S. Kim, and H. Choo, “Level-based approach for minimum-transmission broadcast in duty-cycled wireless sensor networks,” Pervasive and Mobile Computing, vol. 27, pp. 116–132, 2016. View at Publisher · View at Google Scholar · View at Scopus
  26. D. Zhao, K.-W. Chin, and R. Raad, “Approximation algorithms for broadcasting in duty cycled wireless sensor networks,” Wireless Networks, vol. 20, no. 8, pp. 2219–2236, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. M. Khiati and D. Djenouri PhD, “BOD-LEACH: broadcasting over duty-cycled radio using LEACH clustering for delay/power efficient dissimilation in wireless sensor networks,” International Journal of Communication Systems, vol. 28, no. 2, pp. 296–308, 2015. View at Publisher · View at Google Scholar · View at Scopus
  28. H. Byun and J. So, “Node scheduling control inspired by epidemic theory for data dissemination in wireless sensor-actuator networks with delay constraints,” IEEE Transactions on Wireless Communications, vol. 15, no. 3, pp. 1794–1807, 2016. View at Publisher · View at Google Scholar
  29. S. He, J. Chen, F. Jiang, D. K. Y. Yau, G. Xing, and Y. Sun, “Energy provisioning in wireless rechargeable sensor networks,” IEEE Transactions on Mobile Computing, vol. 12, no. 10, pp. 1931–1942, 2013. View at Publisher · View at Google Scholar · View at Scopus
  30. X. Luo, D. Zhang, L. T. Yang, J. Liu, X. Chang, and H. Ning, “A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems,” Future Generation Computer Systems, vol. 61, pp. 85–96, 2016. View at Publisher · View at Google Scholar · View at Scopus
  31. X. Liu, “A deployment strategy for multiple types of requirements in wireless sensor networks,” IEEE Transactions on Cybernetics, vol. 45, no. 10, pp. 2364–2376, 2015. View at Publisher · View at Google Scholar
  32. A. Liu, X. Liu, and Y. Liu, “A comprehensive analysis for fair probability marking based traceback approach in WSNs,” Security and Communication Networks, vol. 9, no. 14, pp. 2448–2475, 2016. View at Publisher · View at Google Scholar
  33. H. Li, Y. Yang, T. H. Luan, X. Liang, L. Zhou, and X. S. Shen, “Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 312–325, 2016. View at Publisher · View at Google Scholar
  34. M. Malawski, K. Figiela, M. Bubak, E. Deelman, and J. Nabrzyski, “Scheduling multilevel deadline-constrained scientific workflows on clouds based on cost optimization,” Scientific Programming, vol. 2015, Article ID 680271, 13 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  35. OMNet++ Network Simulation Framework, http://www.omnetpp.org/