next up previous contents
Next: Perguntas e Respostas Up: Introdução às Redes de Previous: Considerações Finais   Sumário

Referências Bibliográficas

1
``Revista Business 2.0.''
http://www.business2.com.

2
C. Dr. Terry J. van der Werff, ``Global future report.''
http://www.globalfuture.com/mit-trends2003.htm.

3
B. Warneke, ``Miniaturizing sensor networks with mems,'' in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, 2004.

4
M. Ilyas and I. Mahgoub in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, 2004.

5
S. Megerian, F. Koushanfar, G. Qu, G. Veltri, and M. Potkonjak, ``Exposure in wireless sensor networks: Theory and practical solutions,'' 2002.

6
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ``A Survey on Sensor Networks,'' IEEE Communications Magazine , pp. 102-114, Aug. 2002.

7
M. R. Pereira, C. L. de Amorim, and M. C. S. de Castro, ``Tutorial sobre redes de sensores.''

8
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, ``SPINS: security protocols for sensor netowrks,'' in Mobile Computing and Networking, pp. 189-199, 2001.

9
C.-Y. Chong and S. P. Kumar, ``Sensor networks: Evolution, opportunities, and challenges,'' Proceeedings of the IEEE 91, Aug. 2003.

10
D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar, ``Next century challenges: Scalable coordination in sensor networks,'' in Mobile Computing and Networking, pp. 263-270, 1999.

11
D. Estrin, L. Girod, G. Pottie, and M. Srivastava, ``Instrumenting the world with wireless sensor networks,'' 2001.

12
S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava, ``Coverage problems in wireless ad-hoc sensor networks,'' in INFOCOM, pp. 1380-1387, 2001.

13
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. S. J. Pister, ``System architecture directions for networked sensors,'' in Architectural Support for Programming Languages and Operating Systems, pp. 93-104, 2000.

14
A. Wood, ``Security in sensor networks.''

15
P. R. U. Shashi, ``Survey on sensor networks.''

16
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava, ``On communication security in wireless ad-hoc sensor networks,'' in 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 139-144, 2002.

17
E. Riedy and R. Szewczyk, ``Power and control in networked sensors.''

18
S. Megerian and M. Potkonjak, ``Wireless sensor networks.''

19
J. Deng, R. Han, and S. Mishra, ``A performance evaluation of intrusiontolerant routing in wireless sensor networks,'' 2003.

20
A. D. Wood and J. A. Stankovic, ``Denial of service in sensor networks,'' IEEE Computer 35, pp. 54-62, Oct. 2002.

21
H. Chan, A. Perrig, and D. Song, ``Random key predistribution schemes for sensor networks,'' 2003.

22
C. Karlof and D. Wagner, ``Secure routing in wireless sensor networks: Attacks and countermeasures,'' Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols 1, pp. 293-315, September 2003.



Copyright © 2006 Marcelo D. D. Moreira