Proceedings of the 6th International Wireless Communications and Mobile Computing Conference 2010
DOI: 10.1145/1815396.1815550
|View full text |Cite
|
Sign up to set email alerts
|

Contaminated areas monitoring via distributed rateless coding with constrained data gathering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Packet-centric means that in the encoding phase, it just needs to control the data packets itself, which can tolerant nodes failure. Paper [17] used the above method in the special scenarios where nodes are deployed in inaccessible location. It used a simple edge detection method to find the surrounding nodes and the collector can recover source data by visiting these surrounding nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Packet-centric means that in the encoding phase, it just needs to control the data packets itself, which can tolerant nodes failure. Paper [17] used the above method in the special scenarios where nodes are deployed in inaccessible location. It used a simple edge detection method to find the surrounding nodes and the collector can recover source data by visiting these surrounding nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Packet-centric means that in the encoding phase, it just has to control the data packets itself, which can tolerate node failures. In [29], the above methods are observed in the special scenarios where sensor nodes are deployed in an inaccessible location. A simple edge detection method is utilized to find the surrounding nodes and the collector can recover source data by visiting these surrounding nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The traffic data management issue for large data stream has been investigated in , and the corresponding solutions have been given in . To ensure data confidentiality in cloud, the data are usually encrypted, but encrypted data storage makes data utilization difficult .…”
Section: Introductionmentioning
confidence: 99%