152
Views
5
CrossRef citations to date
0
Altmetric
Article

Sleep–wake up scheduling with probabilistic coverage model in sensor networks1

&
Pages 1-16 | Received 29 Feb 2012, Accepted 06 Jan 2013, Published online: 12 Aug 2013

References

  • I.Altinel, N.Aras, E.Güney, and C.Ersoy, Binary integer programming formulation and heuristics for differentiated coverage in heterogeneous sensor networks, Comput. Networks52(12) (2008), pp. 2419–2431.
  • P.Berman, G.Calinescu, C.Shah, and A.Zelikovsky, Efficient energy management in sensor networks, Ad Hoc and Sensor Network, Wireless Networks (2005)
  • N.Bisnik, A.Abouzeid, and V.Isler, Stochastic event capture using mobile sensors subject to a quality metric, IEEE Trans. Robot.23(4) (2007), pp. 676–692.
  • M.Cardei and D.Du, Improving wireless sensor network lifetime through power aware organization, Wireless Networks11(3) (2005), pp. 333–340.
  • M.Cardei, T.Thai, Y.Li, and W.Wu, Energy-efficient target coverage in wireless sensor networks, in Proceedings of the IEEE Conference on Compute Communications (INFOCOM), Hongkong, China, 2005, pp. 1976–1984.
  • J.Chen, J.Li, S.He, Y.Sun, and H.Chen, Energy-efficient coverage based on probabilistic sensing model in wireless sensor networks, IEEE Commun. Lett.14(9) (2010), pp. 833–835.
  • Y.Gu, J.Hwang, T.He, and D.Du, usense: A unified asymmetric sensing coverage architecture for wireless sensor networks, in Proceedings of International Conference on Distributed Computing Systems (ICDCS), Toronto, Canada, 2007.
  • S.He, J.Chen, P.Cheng, J.Gu, T.He, and Y.Sun, Maintaining quality of sensing with actors in wireless sensor network, IEEE Trans. Parallel Distrib. Syst.23(9) (2012), pp. 1657–1667.
  • S.He, J.Chen, X.Li, X.Shen, and Y.Sun, Leveraging prediction to improve the coverage of wireless sensor networks, IEEE Trans. Parallel Distrib. Syst.23(4) (2012), pp. 701–712.
  • S.He, J.Chen, X.Li, X.Shen, and Y.Sun, Energy provisioning in wireless rechargeable sensor networks, IEEE Trans. Mobile Comput. doi:10.1109/TMC.2011.210 (in press)
  • S.He, J.Chen, Y.Sun, D.Yau, and N.Yip, On optimal information capture by energy-constrained mobile sensors, IEEE Trans. Veh. Technol.59(5) (2010), pp. 2472–2484.
  • S.He, J.Chen, D.Yau, H.Shao, and Y.Sun, Energy-efficient capture of stochastic events under periodic network coverage and coordinated sleep, IEEE Trans. Parallel Distrib. Syst.23(6) (2012), pp. 1090–1102.
  • T.He, J.Stankovic, R.Stoleru, Y.Gu, and Y.Wu, Essentia: Architecting wireless sensor networks asymmetrically, in Proceedings of the IEEE Conference on Compute Communications (INFOCOM), Phoenix, USA, 2008, pp. 1184–1192.
  • J.Joines, C.Culbreth, and R.King, Manufacturing cell design: An integer programming model employing genetic algorithm, IIE Trans.28(1) (1996), pp. 69–85.
  • G.Kasbekar, Y.Bejerano, and S.Sarkar, Lifetime and coverage guarantees through distributed coordinate-free sensor activation, in Proceedings of the International Conference on Mobile Computing and Networking (MobiCom), Beijing, China, 2009, pp. 169–180.
  • X.Li, H.Frey, N.Santoro, and I.Stojmenovic, Strictly localized sensor self-deployment for optimal focused coverage, IEEE Trans. Mobile Comput.10(11) (2011), pp. 1520–1533.
  • X.Li, N.Santoro, and I.Stojmenovic, Localized distance-sensitive service discovery in wireless sensor and actor networks, IEEE Trans. Comput.58(9) (2009), pp. 1275–1288.
  • A.Liu, P.Zhang, and Z.Chen, Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks, J. Parallel Distrib. Comput.71(10) (2011), pp. 1327–1355.
  • R.Lu, X.Lin, H.Zhu, X.Liang, and X.Shen, Becan: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks, IEEE Trans. Parallel Distrib. Syst.23(1) (2012), pp. 32–43.
  • R.Niu, P.Varshney, and Q.Cheng, Distributed detection in a large wireless sensor network, Inform. Fusion7(4) (2008), pp. 380–394.
  • Richard M.Karp, Reducibility among combinatorial problems, in 50 Years of Integer Programming 1958–2008, Springer, Berlin, Heidelberg, 2010, pp. 219–241.
  • S.Slijepcevic and M.Potkonjak, Power efficient organization of wireless sensor networks, in Proceedings of the IEEE International Conference on Communication (INFOCOM), Alaska, USA, 2001, pp. 472–476.
  • H.Tan, I.Korpeoglu, and I.Stojmenovic, Computing localized power efficient data aggregation trees for sensor networks, IEEE Trans. Parallel Distrib. Syst.22(3) (2011), pp. 489–500.
  • R.Tan, G.Xing, B.Liu, and J.Wang, Impact of data fusion on real-time detection in sensor networks, in Proceedings of the IEEE Real-Time Systems Symposium (RTSS), Washington, USA, 2009, pp. 323–332.
  • B.Wang, K.Chua, V.Srinivasan, and W.Wang, Information coverage in randomly deployed wireless sensor networks, IEEE Trans. Wireless Commun.6(8) (2007), pp. 2994–3004.
  • B.Wang, W.Wang, V.Srinivasan, and K.Chua, Information coverage for wireless sensor networks, IEEE Commun. Lett.9(11) (2005), pp. 967–969.
  • G.Xing, R.Tan, B.Liu, J.Wang, X.Jia, and C.Yi, Data fusion improves the coverage of wireless sensor networks, in Proceedings of the International Conference on Mobile Computing and Networking (MobiCom), Beijing, China, 2009, pp. 157–168.
  • S.Yang, F.Dai, M.Cardei, and J.Wu, On multiple point coverage in wireless sensor networks, in Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), Washington, USA, 2005.
  • Y.Zou and K.Chakrabarty, Sensor deployment and target localization in distributed sensor networks, ACM Trans. Embed. Comput. Syst.3(1) (2004), pp. 61–91.
  • Y.Zou and K.Chakrabarty, A distributed coverage and connectivity centric technique for selecting active nodes in wireless sensor networks, IEEE Trans. Comput.56(8) (2005), pp. 978–991.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.