최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.16 no.4, 2006년, pp.69 - 76
손태식 (삼성전자 통신연구소) , 최욱 (삼성전자 통신연구소)
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless Sensor Networks: a Survey. Computer Networks, vol. 38(4):393-422, 2002
A. Gosh and S. K. Das. A Distributed Greedy Algorithm for Connected Sensor Cover in Dense Sensor Networks. In Proceedings of Int'l Conference on Distributed Computing in Sensor Networks (DCOSS), 2005
D. Tihan and N. D. Georganas. A Coverage-Preserving Node Scheduling Scheme for Large Wireless Sensor Networks. In Proceedings of ACM Workshop on Wireless Sensor Networks and Applications (WSNA), pp. 32-41, 2002
O. Younis and S. Fahmy. HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks. IEEE Transactions on Mobile Computing, vol. 3(4):366-379, 2004
C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Diffusion:A Scalable and Robust Communication Paradigm for Sensor Networks. In Proceedings of ACM Mobile Computing and Networking (MOBICOM), pp. 56-67, 2000
S. Tilak, N. B. Abu-Ghazal도, and W. Heinzelman. A Taxonomy of Wireless Micro-Sensor Network Models. ACM Mobile Computing and Communications Review, vol. 6(2):28-36, 2002
Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM 47(6):53-57, 2004
J.ohn Paul Walters, Zhengqiang Liang, Weisong Shi, and Vipin Chaudhary, Wireless Sensor Network Security: A Survey, http://www.cs.wayne.edu/~weisong/papers/walters05-wsn-security-survey.pdf
Haowen Chan; Perrig, A, 'Security and privacy in sensor networks', Computer Volume 36, Issue 10, Oct. 2003 Page(s): 103 - 105
Steinbach, M., Karypis, G., Kumar, V., 'A Comparison of Document Clustering Tech,' U of Minnesota, Technical Report #00-034, 2000
Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth Silverman, Angela Y. Wu, 'An Efficient k-Means Clustering Algorithm: Analysis and Implementation', IEEE Transactions on Pattern Analysis and Machine Intelligence archive, Volume 24 , Issue 7 (July 2002), pp 881 - 892, 2002
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.