Introducing Intelligent Agents Potential into a competent Integral Multi-Agent
Sensor Network Simulation Architecture Design
Copyright © 2013 SciRes. JSEA
48
(2006)
[11] Timo Ojala et al “UBI-AMI: Real-Time Metering of En-
ergy Consumption at Homes Using Multi-Hop IP-based
Wireless Sensor Networks” Advances In Grid and Perva-
sive Computing GPC Oulu Finland 2011, pp. 274-284
[12] M.A Labrador, P.M. Wightman “Topology Control in
Wireless Sensor Networks,” Springer 2009.
[13] T. Watteyne, et al. “Centroid Virtual Coordinates – A
novel Near – Shortest Path Routing Paradigm,” Computer
Networks 17 October, 2008.
[14] P. Levis, N. Lee, M. Welsh and D. Culler, “Tossim: Ac-
curate and scalable simulation of entire tinyos applica-
tions,” First International Conference on Embedded Net-
worked Sensor Systems (SenSys 2003) (November 2003).
[15] Khan M, Abdelzaher T.,Gupta K.K “Towards Diagnostic
Simulation in Sensor Networks,” Distributed Computing
in Sensor Systems 4th IEEE International Conference
DCOSS 2008 Santorini Island Greece June 11-14, 2008.
[16] W. B. Heinzelman, A. P. Chandrakasan and H.
Balakrishnan, “An Application-specific Protocol Archi-
tecture for Wireless Microsensor Networks,” IEEE
Transactions on Wireless Communications, Vol. 1, No. 4,
2002, pp. 660-670. doi:10.1109/TWC.2002.804190
[17] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power
Efficient Gathering in Sensor Information Systems,” in:
Proc. IEEE Aerospace Conference, Big Sky, Montana,
March 2002. doi:10.1109/AERO.2002.1035242
[18] A. Manjeshwar and D. P. Agrawal, “TEEN: A Protocol
For Enhanced Eficiency in Wireless Sensor Networks,” in
Proceedings of the 1International Workshop on Parallel
and Distributed Computing Issues in Wireless Networks
and Mobile Computing, San Francisco, CA April 2001.
[19] H. Frey and I. Stojmenovic, “On delivery guarantees of
face and combined greedy-face routing algorithms in ad
hoc and sensor networks,” in twelfth ACM Annual Inter-
national Conference on Mobile Computing and Network-
ing (MOBICOM) Los Angeles CA USA ACM September
23-29, 2006, pp. 390-401.
[20] T Watteyne, et al., “On using virtual coordinates for
routing in the context of wireless sensor networks,” in
18th Annual International Symposium on Personal Indoor
and Mobile Radio Communications (PIMRC) Athens
Greece IEEE, September 3-7, 2007.
[21] C. Inatanagonwiwat, R. Govindan and D. Estrin, “Di-
rected Diffusion: A Scalable and Robust Communication
Paradigm for Sensor Networksm,” Mobicom 2000, Bos-
ton, MA, USA (2000).
[22] Jon S. Wilson ed. “Sensor Technology Handbook,” El-
sevier 2005.
[23] Patrick Kuckertz et al, “Sniper Fire Localization Using
Wireless Sensor Networks and Genetic Algorithm Based
Data Fusion,” Military Communications Conference 2007
MILCOM 2007 IEEE (2007).
[24] Muhammad Imran et al. “Application-Centric Connec-
tivity Restoration Algorithm for Wireless Sensor and Ac-
tor Networks,” Advances in Grip and Pervasice Comput-
ing GPC 2011, pp. 243-253.
[25] H. M. Ammari “Challenges and Opportunities of Con-
nected k Covered Wireless Sensor Networks - From Sen-
sor Deployment to Data Gathering,” Springer 2009.
[26] J. Fraden, “Handbook of Modern Sensors – Physics De-
signs and Applications,” Springer Verlag, 2004.
[27] P. Balister, S. Kumar, Z. Zheng and P. Sinsha, “Trap
Coverage : Allowing Coverage Holes of Bounded Di-
ameter in Wireless Sensor Networks,” Infocom/IEEE
2009.
[28] M. Cardei, M. T. Thai, Y. Li and W. Wu, “En-
ergy-efficient Target Coverage in Wireless Sensor Net-
works,” In: IEEE INFOCOM (2005).
[29] M. X. Cheng, L. Ruan and W. Wu, “Achieving minimum
coverage breach under bandwidth constraints in wireless
sensor networks,” IEEE INFOCOM (2005).
[30] O. Saukh, R. Sauter and P. J. Marron, “Time-Bounded
and Space-Bounded Sensing in Wireless Sensor Net-
works,” Distributed Computing in Sensor Systems
DCOSS 2008, LNCS 5067, pp. 357-371.
[31] C. K. Liang and Y. T. Chen, “The Target Coverage Prob-
lem in Directional Sensor Networks with Rotatable An-
gles,” Distributed Computing in Sensor Systems DCOSS
2008, LNCS 5067, pp. 264-273.
[32] C. Gilbert, et al., “SENSE: a wireless sensor network
simulator,” Advances in Pervasive Computing and Net-
working (2005), pp. 249-267.
[33] de P. Alberola, Rodolfo and D. Pesch, “AvroraZ: extend-
ing Avrora with an IEEE 802.15. 4 compliant radio chip
model,” Proceedings of the 3nd ACM workshop on Per-
formance monitoring and measurement of heterogeneous
wireless and wired networks. ACM, 2008.
[34] Y. Sangho, et al., “SensorMaker: A Wireless Sensor
Network Simulator for Scalable and Fine-grained Instru-
mentation,” Computational Science and Its Applica-
tions–ICCSA 2008, pp. 800-810.
[35] M. Bruynooghe, The Memory Management of PROLOG
Implementations, in Clark, K. L. and S. Tarnlund (1982,
eds.), Logic Programming, Academic Press, London.
[36] P. Civera, G. Piccinini and M. Zamboni, “Implementation
Studies for a VLSI Prolog Coprocessor,” in IEEE Micro,
Vol.9/1 February 1989 pp.10-23. doi:10.1109/40.16791