References
- C. D. Lee, "Similarity-based Caching Loss Minimization in the Wireless Mobile Proxy System," The Korea Navigation Institute, Vol 16, No. 3, pp. 455-462, 2012. https://doi.org/10.12673/jkoni.2012.16.3.455
- C. D. Lee, "Profit-based Segment Caching for Wireless QoS Streaming," The Korea Navigation Institute, Vol. 16, No. 3, pp. 463-470, 2012. https://doi.org/10.12673/jkoni.2012.16.3.463
- C. D. Lee, "Fuzzy Relevance-based Clustering for Routing Performance Evaluation in Wireless ad Hoc Networks," The Korea Navigation Institute, Vol. 14, No. 4, pp. 495-503, 2010.
- I. F. Akyildiz, T. Melodia, K. R. Chowdhury, "A Survey on Wireless Multimedia Sensor Network," Computer networks, Vol. 51, No. 4, pp. 921-960, 2007. https://doi.org/10.1016/j.comnet.2006.10.002
- S. Misra, M. Reisslein, G. Xue, "A Survey of Multimedia Streaming in Wireless Sensor Networks," IEEE Communications survey & Tutorials, Vol. 10, No. 4, pp. 18-39, 2008. https://doi.org/10.1109/SURV.2008.080404
- Y. Iyer, S. Gandham, S. Venkatesan, "STCP: A Generic Transport Protocol for Wireless Sensor Networks," In Proc. IEEE International Conference on Computer communications and Networks (ICCCN), pp. 17-19, 2005.
- F. Stann, J. Heidemann, "RMST: Reliable Data Transport in Sensor Networks," In Proc. First International Workshop on Sensor Net Protocols and Applications, pp. 102-112, 2003.
- B. Hull, K. Jamieson, H. Balakrishnan, "Mitigation Congestion in Wireless Sensor Networks," In proceedings of ACM SenSys, pp. 134-147, 2004.
- C. Y. Wan, S. B. Eisenman, A. T. Cambell, "CODA: Congestion Detection and Avoidance in Sensor Networks," in: Proceedings of ACM SenSys (The ACM Conference on Embedded Networked Sensor Systems), pp. 266-279, 2003.
- C. T. Ee, R. Bajcsy, "CCF: Congestion Control and Fairness for Many-to-one Routing in Sensor Networks," in: Proceedings of ACM sensys, 2004.
- C. Wang, K. Sohraby, V. Lawrence, B. Li, "Priority-based Congestion Control in Wireless Sensor Networks," In Proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 22-31, 2006.