Adaptive protocols for information dissemination in wireless sensor networks
Citations
70 citations
Cites background from "Adaptive protocols for information ..."
...Lots of studies on WSNs have been carried out showing that this technology is continuously finding new application in various areas[5,6,7]....
[...]
69 citations
69 citations
Cites background from "Adaptive protocols for information ..."
...Note that a two-dimensional setting is also used in [7, 8, 9, 10, 13]....
[...]
...A family of negotiation-based information dissemination protocols suitable for wireless sensor networks is presented in [8]....
[...]
68 citations
Cites background from "Adaptive protocols for information ..."
...The parameter k is the value of the counter maintained at a sensor node and is decreased by one at every round....
[...]
...In our study the choice of communication partner is done randomly from the set of neighboring nodes....
[...]
68 citations
Cites background from "Adaptive protocols for information ..."
...Recently, many protocols have been proposed to extend the network lifetime of sensor networks in their deployment protocols [14], [17], [22], powerefficient medium access control (MAC) protocols [3], [4], [7], [8], [15], [18], [24], [26], and routing protocols [2], [ 9 ], [20]....
[...]
References
6,877 citations
5,147 citations
"Adaptive protocols for information ..." refers background in this paper
...Recently, mobile ad hoc routing protocols have become an active area of research [3, 10, 16, 18, 22]....
[...]
2,211 citations
"Adaptive protocols for information ..." refers background in this paper
...Recently, mobile ad hoc routing protocols have become an active area of research [3, 10, 16, 18, 22]....
[...]
1,958 citations
"Adaptive protocols for information ..." refers background or methods in this paper
...Using gossiping and broadcasting algorithms to disseminate information in distributed systems has been extensively explored in the literature, often as epidemic algorithms [6]....
[...]
...In [1, 6], gossiping is used to maintain database consistency, while in [18], gossiping is used as a mechanism to achieve fault tolerance....
[...]
1,365 citations