|
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Net-works,” IEEE Communication Magazine, vol. 40, no. 8, pp. 102-114, August 2002. [2] L. Alvisi, D. Malkhi, E. Pierce, and M.K. Reiter, “Fault Detection for Byzantine Quorum Systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 12, no. 9, pp. 996-1007, September 2001. [3] M. Barborak, M. Malek, and A. Dahbura, “The Consensus Problem in Fault-Tolerant Computing,” ACM Computing Surveys, vol. 25, no. 2, pp. 171-220, June 1993. [4] I. Chatzigiannakis and A. Kinalis, “Fault-tolerant and Efficient Data Propagation in Wire-less Sensor Networks Using Local, Additional Network Information,” Journal of Parallel and Distributed Computing, vol. 67, no. 4, pp. 456-473, 2007. [5] J.Y. Chen, G. Pandurangan, and D.Y. Xu, “Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 9, pp. 987-1000, 2006. [6] S. Chessa and P. Santi, “Crash Faults Identification in Wireless Sensor Networks,” Com-puter Communications, vol. 25, no. 14, pp. 1273-1282, 2002. [7] T. Clouqueur, Kewal K. Saluja, and P. Ramanathan, “Fault Tolerance in Collaborative Sensor Networks for Target Detection,” IEEE Transactions on Computers, vol. 53, no. 3, March 2004. [8] D. Culler, D. Estrin, and M. Srivastava, “Overview of Sensor Networks,” IEEE Computer, vol. 37, no. 8, pp.41-49, 2004. [9] M. Ding, F. Liu, A. Thaeler, D. Chen, and X. Cheng, “Fault-Tolerant Target Localization in Sensor Networks,” EURASIP Journal on Wireless Communication and Networking, vol. 2007, no. 1, 2007. [10] M.J. Fischer, “The Consensus Problem in Unreliable Distributed Systems (a Brief Sur-vey),” Fundamentals of Computation Theory, pp. 127-140, 1983. [11] B. Krishnamachari, “Distributed Bayesian Algorithms for Fault-Tolerant Event Region Detection in Wireless Sensor Networks,” IEEE Transactions on Computers, vol. 53, no. 3, March 2004. [12] Y.C. Kuo and S.T. Huang, “A Geometric Approach for Constructing Coteries and k-Coteries,” IEEE Trans. Parallel and Distributed Systems, vol. 8, no. 4, pp. 402-411, April 1997. [13] Y.C. Kuo and S.T. Huang, “Recognizing Nondominated Coteries and wr-Coteries by Avaibility,” IEEE Trans. Parallel and Distributed Systems, vol. 9, no. 8, pp. 721-728, August 1998. [14] L. Lamport, R. Shostak, and M. Pease, “The Byzantine Generals Problem,” ACM Trans. Programming Languages and Systems, vol. 4, no. 3, pp. 382-401, July 1982. [15] D. Malkhi and M. Reiter, “Byzantine Quorum Systems,” The Journal of Distributed Computing, vol. 11, no. 4, pp. 203-213, 1998. [16] K. Martinez, J.K. Hart, and R. Ong, “Sensor Network Applications,” IEEE Computer, vol. 37, no. 8, pp. 50-56, 2004. [17] L. Paradis and Q. Han, “A Survey of Fault Management in Wireless Sensor Networks,” Journal of Network and Systems Management, vol. 15, no. 2, pp. 171-190, 2007. [18] K.F. SSu, C.H. Chou, H.C. Jiau, and W.T. Hu, “Detection and Diagnosis of Data Incon-sistency Failures in Wireless Sensor Networks,” Computer Networks, vol. 50, pp. 1247-1260, 2006. [19] O. Younis, S. Fahmy, and P. Santi, “An Architecture for Robust Sensor Network Com-munications,” International Journal of Distributed Sensor Networks, vol. 1, pp. 305-327, 2005. [20] Y.I. Zou and K. Chakrabarty, “Redundancy Analysis and A Distributed Self-organization Protocol for Fault-tolerant Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 3, no. 3, pp. 243-272, 2007.
|