1 |
L. Cheng, S. Kotoulas, T. E. Ward & G. Theodoropoulos. (2017). Improving the robustness and performance of parallel joins over distributed systems, Journal of Parallel and Distributed Computing, 109, 310-323.
DOI
|
2 |
M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker & I. Stoica. (2010). Spark: cluster computing with working sets, Proceedings of the 2nd USENIX conference on Hot topics in cloud computing(HotCloud'10), 10-10.
|
3 |
W. R. Heinzelman, A. Chandrakasan & H. Balakrishnan. (2000). Energyefficient communication protocol for wireless microsensor networks, Proceedings of the 33rd annual Hawaii international conference on System sciences, IEEE, 10.
|
4 |
G. Chen, C. Li, M. Ye & J. Wu. (2009). An unequal cluster-based routing protocol in wireless sensor networks, Wireless Networks, 15(2), 193-207.
DOI
|
5 |
H. Mao, M. Alizadeh, I. Menache & S. Kandula. (2016). Resource management with deep reinforcement learning, Proceedings of the 15th ACM Workshop on Hot Topics in Networks. ACM, 50-56.
|
6 |
C. Y. Chen & H. C. Chao. (2014). A survey of key distribution in wireless sensor networks, Security and Communication Networks, 7, 2495-2508.
DOI
|
7 |
M. A. Simplicio Jr., P. S.L.M. Barreto., C. B. Margi, & T. C.M.B. Carvalho (2010). A survey on key management mechanisms for distributed wireless Sensor networks, Computer Networks, 54, 2591-2612.
DOI
|
8 |
S. Zhu, S. Setia & S. Jajodia. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks, In Proc. of ACM CCS.
|
9 |
B. Cao, J. Zhao, Z. Lv, X. Liu, X. Kang & S. Yang. (2018). Deployment optimization for 3D industrial wireless sensor networks based on particle swarm optimizers with distributed parallelism, Journal of Network and Computer Applications, 103, 225-238,
DOI
|
10 |
L. Eschenauer & V. Gligor. (2002). A key-management scheme for distributed sensor networks, In Proc. of ACM CCS.
|
11 |
T. Kwon, J. Lee & J. Song. (2009). Location-based pairwise key predistribution for wireless sensor networks, IEEE Trans. on Wireless Communications, 8(11).
|
12 |
M. Farsi, M. A. Elhosseini, M. Badawy, H. A. Ali & H. Z. Eldin. (2019). Deployment techniques in wireless sensor networks, coverage and connectivity: a survey, IEEE Access, 7.
|
13 |
J. W. Choi, J. H. Bang, L. H. Kim, M. R. Ahn and T. Y. Kwon, "Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks," IEEE Systems Journal, Vol. 11, Issue 2, 2017
|
14 |
C. G. Ma, G. Geng, H. Q. Wang and G. Yang. (2009). Location-Aware and Secret Share Based Dynamic Key Management Scheme for Wireless Sensor Networks, Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 1.
|
15 |
H. Chan, A. Perrig & D. Song. (2003). Random key predistribution schemes for sensor networks, In Proc. of IEEE S&P.
|