By Topic

Tsinghua Science and Technology

Issue 5 • Oct. 2012

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    IEEE is not the copyright holder of this material | PDF file iconPDF (3135 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2012, Page(s): 1
    IEEE is not the copyright holder of this material | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Guest editorial: Special issue on wireless computing and networking

    Publication Year: 2012, Page(s):485 - 486
    IEEE is not the copyright holder of this material | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • DATA MANAGEMENT AND QUERY PROCESSING IN WIRELESS NETWORKS 
  • Data collection capacity of random-deployed wireless sensor networks under physical models

    Publication Year: 2012, Page(s):487 - 498
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    Data collection is one of the most important functions provided by wireless sensor networks. In this paper, we study the theoretical limitations of data collection in terms of capacity for a wireless sensor network where n sensors are randomly deployed. We first consider data collection under physical model. We show that the capacity of data collection is in order of Θ(W) where W is the fix... View full abstract»

    Open Access
  • Area query processing based on gray code in wireless sensor networks

    Publication Year: 2012, Page(s):499 - 511
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (687 KB)

    Area query processing is significant for various applications of wireless sensor networks since it can request information of particular areas in the monitored environment. Existing query processing techniques cannot solve area queries. Intuitively centralized processing on Base Station can accomplish area queries via collecting information from all sensor nodes. However, this method is not suitab... View full abstract»

    Open Access
  • Distributed aggregation algorithms for mobile sensor networks with group mobility model

    Publication Year: 2012, Page(s):512 - 520
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (523 KB)

    In many applications of mobile sensor networks, such as water flow monitoring and disaster rescue, the nodes in the network can move together or separate temporarily. The dynamic network topology makes traditional spanning-tree-based aggregation algorithms invalid in mobile sensor networks. In this paper, we first present a distributed clustering algorithm which divides mobile sensor nodes into se... View full abstract»

    Open Access
  • A designated query protocol for serverless mobile RFID systems with reader and tag privacy

    Publication Year: 2012, Page(s):521 - 536
    Cited by:  Papers (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (274 KB)

    Recently, a new type of Radio Frequency IDentification (RFID) system with mobile readers is introduced. In such a system, it is more desirable for mobile readers to identify tags without a back-end server, and thus it is frequently referred as a serverless mobile RFID system. In this paper, we formalize a serverless mobile RFID system model and propose a new encryption-based system that preserves ... View full abstract»

    Open Access
  • BACKBONE MANAGEMENT IN WIRELESS NETWORKS 
  • Design and analysis of Prioritized Medium Access Control protocol for backbone routers in wireless mesh networks

    Publication Year: 2012, Page(s):537 - 552
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2112 KB)

    A Prioritized Medium Access Control (P-MAC) protocol is proposed for wireless routers of mesh networks with quality-of-service provisioning. The simple yet effective design of P-MAC offers strict service differentiation for prioritized packets. A Markov model is developed to yield important performance matrices including the packet blocking probability due to queue overflow and the packet reneging... View full abstract»

    Open Access
  • A distributed design for minimum 2-Connected m-Dominating Set in bidirectional wireless ad-hoc networks

    Publication Year: 2012, Page(s):553 - 566
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (725 KB)

    Wireless ad-hoc network is widely used in many fields for its convenience and outstanding suitability. Because of the inherent lack of infrastructure and the nature of wireless channels, people select the k-Connected m-Dominating Set ((k, m)-CDS) in a network as a fault-tolerant virtual backbone to help the routing process, which will save the energy of non-dominators and improve the network perfo... View full abstract»

    Open Access
  • Online learning approaches in maximizing weighted throughput in an unreliable channel

    Publication Year: 2012, Page(s):567 - 574
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (364 KB)

    We design online algorithms to schedule unit-length packets with values and deadlines through an unreliable communication channel. In this model, time is discrete. Packets arrive over time; each packet has a non-negative value and an integer deadline. In each time step, at most one packet can be sent. The ratio of successfully delivering a packet depends on the channel's quality of reliability. Th... View full abstract»

    Open Access
  • ROUTING IN WIRELESS NETWORKS 
  • Interference-aware probabilistic routing for wireless sensor networks

    Publication Year: 2012, Page(s):575 - 585
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (3849 KB)

    Wireless communications are prone to the interference, so the data transmission among the nodes in wireless sensor networks deployed in complex environments has the obvious uncertainty. This paper adopts probability theory to extend the existed interference model, and gives an interference analysis model and implements it through the cross-layer method. In addition, the isotonic property of the in... View full abstract»

    Open Access
  • A switch agent for wireless sensor nodes with dual interfaces: Implementation and evaluation

    Publication Year: 2012, Page(s):586 - 598
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1031 KB)

    Data generation in wireless sensor networks could be bursty as it is dictated by the presence or absence of events of interest that generate these data. While conventional sensor nodes possessed only one radio interface, next generation sensor nodes are expected to have two (possibly more) radio interfaces, each with different ranges, capacities, and power consumptions. Equipping sensor nodes with... View full abstract»

    Open Access
  • CoP: An ultra-lightweight secure network coding scheme via last forwarder's proof

    Publication Year: 2012, Page(s):599 - 605
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (207 KB)

    Network coding can improve network efficiency by extending copy-and-forward paradigm to code-and-forward paradigm. It thus imposes a security problem called pollution attack that some network coding or forwarding nodes may intentionally fabricate, modify, forge, or drop packets. Recently, many authentication methods are proposed to guarantee the correctness of encoding and forwarding results via t... View full abstract»

    Open Access
  • Call for papers: Special Issue of Tsinghua Science and Technology on Visualization and Computer Graphics

    Publication Year: 2012, Page(s): 606
    IEEE is not the copyright holder of this material | PDF file iconPDF (51 KB)
    Freely Available from IEEE

Aims & Scope

Tsinghua Science and Technology (Tsinghua Sci Technol) aims to highlight scientific achievements in computer science, electronic engineering, and other IT fields. Contributions all over the world are welcome.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Professor Jiaguang Sun
School of Software
Tsinghua University
Beijing  100084 China
journal@tsinghua.edu.cn
Phone:86-10-62771385