Next: Perguntas e Respostas
Up: Introdução às Redes de
Previous: Considerações Finais
  Sumário
- 1
-
``Revista Business 2.0.''
http://www.business2.com.
- 2
-
C. Dr. Terry J. van der Werff, ``Global future report.''
http://www.globalfuture.com/mit-trends2003.htm.
- 3
-
B. Warneke, ``Miniaturizing sensor networks with mems,'' in Handbook of
Sensor Networks: Compact Wireless and Wired Sensing Systems, 2004.
- 4
-
M. Ilyas and I. Mahgoub in Handbook of Sensor Networks: Compact Wireless
and Wired Sensing Systems, 2004.
- 5
-
S. Megerian, F. Koushanfar, G. Qu, G. Veltri, and M. Potkonjak, ``Exposure in
wireless sensor networks: Theory and practical solutions,'' 2002.
- 6
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ``A Survey on
Sensor Networks,'' IEEE Communications Magazine , pp. 102-114,
Aug. 2002.
- 7
-
M. R. Pereira, C. L. de Amorim, and M. C. S. de Castro, ``Tutorial sobre redes
de sensores.''
- 8
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, ``SPINS:
security protocols for sensor netowrks,'' in Mobile Computing and
Networking, pp. 189-199, 2001.
- 9
-
C.-Y. Chong and S. P. Kumar, ``Sensor networks: Evolution, opportunities, and
challenges,'' Proceeedings of the IEEE 91, Aug. 2003.
- 10
-
D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar, ``Next century
challenges: Scalable coordination in sensor networks,'' in Mobile
Computing and Networking, pp. 263-270, 1999.
- 11
-
D. Estrin, L. Girod, G. Pottie, and M. Srivastava, ``Instrumenting the world
with wireless sensor networks,'' 2001.
- 12
-
S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. B. Srivastava, ``Coverage
problems in wireless ad-hoc sensor networks,'' in INFOCOM,
pp. 1380-1387, 2001.
- 13
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. S. J. Pister,
``System architecture directions for networked sensors,'' in Architectural Support for Programming Languages and Operating Systems,
pp. 93-104, 2000.
- 14
-
A. Wood, ``Security in sensor networks.''
- 15
-
P. R. U. Shashi, ``Survey on sensor networks.''
- 16
-
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava,
``On communication security in wireless ad-hoc sensor networks,'' in 11th IEEE International Workshops on Enabling Technologies: Infrastructure
for Collaborative Enterprises, pp. 139-144, 2002.
- 17
-
E. Riedy and R. Szewczyk, ``Power and control in networked sensors.''
- 18
-
S. Megerian and M. Potkonjak, ``Wireless sensor networks.''
- 19
-
J. Deng, R. Han, and S. Mishra, ``A performance evaluation of intrusiontolerant
routing in wireless sensor networks,'' 2003.
- 20
-
A. D. Wood and J. A. Stankovic, ``Denial of service in sensor networks,'' IEEE Computer 35, pp. 54-62, Oct. 2002.
- 21
-
H. Chan, A. Perrig, and D. Song, ``Random key predistribution schemes for
sensor networks,'' 2003.
- 22
-
C. Karlof and D. Wagner, ``Secure routing in wireless sensor networks: Attacks
and countermeasures,'' Elsevier's AdHoc Networks Journal, Special Issue
on Sensor Network Applications and Protocols 1, pp. 293-315,
September 2003.
Copyright © 2006 Marcelo D. D. Moreira