Power management in energy harvesting sensor networks
Citations
3,172 citations
Cites background from "Power management in energy harvesti..."
...A comprehensive take at the technological problem of energy harvesting in real devices is described in [54]....
[...]
1,870 citations
Cites background or methods from "Power management in energy harvesti..."
...An alternative approach to energy availability prediction uses an Exponentially Weighted Moving-Average (EWMA) filter [20]....
[...]
...Energy sources have different characteristics along the axes of controllability, predictability and magnitude[20]....
[...]
...The condition for energy neutral operation for the two energy harvesting options is as follows[20],...
[...]
...A similar categorization is present in [20]....
[...]
...A thorough and complete mathematical analysis of these conditions is presented in [20]....
[...]
914 citations
829 citations
References
4,623 citations
"Power management in energy harvesti..." refers background or methods in this paper
...achieve much higher duty cycles than those currently used, s uch as 1% used in battery based deployments [Mainwaring et al. 2002]....
[...]
...In addition, these results reiterate the importance of harvesting by showing that environmental energy-harvesting with appropriate power-management can achieve much higher duty cycles than those currently used, such as 1% used in battery-based deployments [Mainwaring et al. 2002]....
[...]
3,967 citations
"Power management in energy harvesti..." refers methods in this paper
...We define the following model which is motivated by leaky bucket Internet traffic models [Cruz 1991a; Parekh and Gallager 1993]....
[...]
...One approach to modeling bursty sources is given by the (r, b) token bucket traf.c regulator [Parekh and Gallager 1993; Parekh 1992; Cruz 1991a; Cruz 1991b] used to model bursty traf.c for QoS in Internet....
[...]
...One approach to modeling bursty sources is given by the (r, b) token bucket traffic regulator [Parekh and Gallager 1993; Parekh 1992; Cruz 1991a; 1991b] used to model bursty traffic for QoS in Internet....
[...]
...We de.ne the following model that is motivated by leaky-bucket Internet traf.c models [Cruz 1991a; Parekh and Gallager 1993]....
[...]
2,829 citations
2,638 citations
2,049 citations