References
- Ren Fengyuan, Huang Hai and Lin Chuang, "Wireless sensor networks(In Chinese)," Journal of Software, vol. 14, no. 7, pp. 1282-1291, 2003.
- Akyildiz I F, Su W, Sankarasubramaniam Y, et al, "Wireless sensor networks: a survey," Computer networks, vol. 38, no. 4, pp. 393-422, 2002. https://doi.org/10.1016/S1389-1286(01)00302-4
- Liu Kunpeng, JiangWeidong, "The research of underwater sensor node coverage model based on perception factor (In Chinese)," Journal of Nanjing University (natural sciences), vol. 51, no. 6, pp. 1203-1209, 2015.
- Huang Renjie, Song Wen-Zhan, Xu Mingsen, et al, "Real-world sensor network for long-term volcano monitoring: design and findings," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 2, pp. 321-329, 2012. https://doi.org/10.1109/TPDS.2011.170
- Tan Xin, Sun Zhi, Akyildiz I F, "Wireless underground sensor networks: MI-based communication systems for underground applications," IEEE Antennas and Propagation Magazine, vol. 57, no. 4, pp. 74-87, 2015. https://doi.org/10.1109/MAP.2015.2453917
- Cobos M, Perez-Solano J J, Felici-Castell S, et al, "Cumulative-sum-based localization of sound events in low-cost wireless acoustic sensor networks," IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 22, no. 12, pp. 1792-1802, 2014. https://doi.org/10.1109/TASLP.2014.2351132
- Liu Peng, Zhang Song, Qiu Jian, et al, "A redistribution method to conserve data in isolated energy-harvesting sensor networks," Computer Science and Information Systems, vol. 8, no. 4, pp. 1009-1025, 2011. https://doi.org/10.2298/CSIS110420066L
- Shen Chao, "A study of distributed fountain codes based data collection techniques in wireless sensor networks (In Chinese)," Master's diss. Hangzhou:HangzhouDianzi University, 2011.
- XueXinyu, Hou Xiang, Bagai Rajiv, "Data preservation in intermittently connected sensor networks with data priority," in Proc. of 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.122-130, 2013.
- Shen Yulong, Xi Ning, Pei Qingqi, et al, "Distributed storage schemes for controlling data availability in wireless sensor networks," in Proc. of 7th International Conference on Computational Intelligence and Security, pp.545-549, 2011.
- Tang Bin, JaggiNeeraj, Takahashi Masaaki, "Achieving Data K-Availability in Intermittently Connected Sensor Networks," in Proc. of 23rd International Conference on Computer Communication and Networks, pp.1-8, 2014.
- Lin Yunfeng, Liang Ben, Li baochun, "Data Persistence in large-scale sensor networks with decentralized fountain codes," in Proc. of 26th IEEE International Conference on Computer Communications, pp.1658-1666, 2007.
- Zhang Wei, Zhang Qinchao, Xu Xianghua, Wan Jian, "An optimized degree strategy for persistent sensor network data distribution," in Proc. of 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing, pp.130-137, 2012.
- Aly S A, Kong Z N, Soljanin E, "Fountain codes based distributed storage algorithm for large-scale wireless sensor networks," in Proc. of International Conference on Information Processing in Sensor Networks, pp.171-182, 2008.
- XiaoYilong, "Random data redundancy method and it application in distributed storage systems (In Chinese)," PhD diss. Chengdu: School of Computer Science and Engineering, 2013.
- Camila H. S. Oliveira, Yacine Ghamri-Doudane, Carlos E. F. Brito, et al, "Optimal network coding-based in-network data storage and data retrieval for IoT/WSNs," in Proc. of 14th IEEE International Symposium on Network Computing and Applications, pp.208-215, 2015.
- Cheng Zhan, Fuyuan Xiao, "Coding-based storage design for continuous data collection in wireless sensor networks," in Proc. of Journal of Communications and Networks, pp.493-501, 2016.
- Bin Gu, Victor S. Sheng, Shuo Li, "Bi-parameter space partition for cost-sensitive SVM," in Proc. of 24th International Joint Conference on Artificial Intelligence (IJCAI 2015), pp.3532-3539, 2015.
- Bin Gu, Xingming Sun, Victor S. Sheng, "Structural minimax probability machine," in Proc. of IEEE Transactions on Neural Networks and Learning Systems, pp.1-11, 2016.
- Zhihua Xia, Xinhui Wang, Xingming Sun, et al, "Steganalysis of least significant bit matching using multi-order differences," in Proc. of Security and Communication Networks, pp.1283-1291, 2014.
- Zhihua Xia, Xinhui Wang, Xingming Sun, et al, "Steganalysis of LSB matching using differences between nonadjacent pixels," in Proc. of Multimed Tools Appl, pp.1947-1962, 2016.