[1] C. Pham, “Fast event detection in mission-critical surveillance with wireless video sensor
networks,” in IEEE RIVF International Conference on Computing and Communication
Technologies, Research, Innovation, and Vision for the Future (RIVF), 2010,
http://dx.doi.org/10.1109/RIVF.2010.5633062.
[2] C. Pham and A. Makhoul, “Performance study of multiple cover-set strategies for
mission-critical video surveillance with wireless video sensors,” in IEEE 6th International
Conference on Wireless and Mobile Computing, Networking and Communications
(WiMob), October 2010, pp. 208–216, http://dx.doi.org/10.1109/WIMOB.2010.5644991.
[3] Z. Zhao, T. Braun, D. do Rosario, E. Cerqueira, R. Immich, and M. Curado,
“Qoe-aware fec mechanism for intrusion detection in multi-tier wireless multimedia
sensor networks,” in IEEE 8th International Conference on Wireless and Mobile
Computing, Networking and Communications (WiMob), Oct 2012, pp. 689–696,
http://dx.doi.org/10.1109/WiMOB.2012.6379150.
[4] M. Magno, D. Brunelli, P. Zappi, and L. Benini, “A solar-powered video sensor
node for energy efficient multimodal surveillance,” in Conference on Digital
System Design Architectures, Methods and Tools (DSD), Sept, pp. 512–519,
http://dx.doi.org/10.1109/DSD.2008.23.
[5] M. Atto and C. G. Guy, “A cross layer protocol based on mac and routing protocols
for healthcare applications using wireless sensor networks,” in International Journal
of Advanced Smart Sensor Network Systems ( IJASSN ), vol. 4, no. 2, April 2014,
http://dx.doi.org/10.5121/ijassn.
[6] P. Suriyachai, U. Roedig, and A. Scott, “A survey of mac protocols for
mission-critical applications in wireless sensor networks,” Communications
Surveys Tutorials, IEEE, vol. 14, no. 2, pp. 240 –264, May 2012,
http://dx.doi.org/10.1109/SURV.2011.020211.00036.
[7] D. Goyal and M. Tripathy, “Routing protocols in wireless sensor networks: A survey,” in
Second International Conference on Advanced Computing Communication Technologies
(ACCT), Jan 2012, pp. 474–480, http://dx.doi.org/10.1109/ACCT.2012.98.
[8] L. Tang and S. Liu, “Improvement on leach routing algorithm for wireless sensor networks,”
in International Conference on Internet Computing Information Services (ICICIS),
Sept. 2011, pp. 199 –202, http://dx.doi.org/10.1109/ICICIS.2011.572.
135 www.macrothink.org/npa
Network Protocols and Algorithms
ISSN 1943-3581
2014, Vol.6, No.3
[9] D. Zhixiang and Q. Bensheng, “Three-layered routing protocol for wsn based on
leach algorithm,” in IET Conference on Wireless, Mobile and Sensor Networks, 2007.
(CCWMSN07)., Dec. 2007, pp. 72 –75.
[10] Y. L. Chen, Y. C. Lin, and N. C. Wang, “An intersection-based coverage algorithm
for pegasis architecture in wireless sensor networks,” in Machine Learning and Cybernetics
(ICMLC), 2012 International Conference on, vol. 5, July 2012, pp. 1727–1731,
http://dx.doi.org/10.1109/ICMLC.2012.6359635.
[11] Z. Aliouat and M. Aliouat, “Efficient management of energy budget for pegasis routing
protocol,” in Sciences of Electronics, Technologies of Information and Telecommunications
(SETIT), 2012 6th International Conference on, March 2012, pp. 516–521,
http://dx.doi.org/0.1109/RIVF.2010.5633062.
[12] Z. Aliouat and S. Harous, “An efficient clustering protocol increasing wireless
sensor networks life time,” in Innovations in Information Technology
(IIT), 2012 International Conference on, March 2012, pp. 194–199,
http://dx.doi.org/10.1109/INNOVATIONS.2012.6207730.
[13] R. Vadlamudi and D. S. Umar, “A Review of APTEEN inWireless Sensor ,” International
Journal on Computer Science Engineering and Technology, vol. 3, no. 9, pp. 306–311,
2013.
[14] D. Baghyalakshmi, J. Ebenezer, and S. A. V. SatyaMurty, “Low latency and energy
efficient routing protocols for wireless sensor networks,” in International Conference
on Wireless Communication and Sensor Computing (ICWCSC), Jan 2010, pp. 1–6,
http://dx.doi.org/10.1109/ICWCSC.2010.5415892.
[15] D. Goyal and M. Tripathy, “Routing protocols in wireless sensor networks: A survey,” in
Second International Conference on Advanced Computing Communication Technologies
(ACCT), Jan 2012, pp. 474–480, http://dx.doi.org/10.1109/ACCT.2012.98.
[16] D. Rosario, R. Costa, H. Paraense, K. Machado, E. Cerqueira, T. Braun, and Z. Zhao,
“A Hierarchical Multi-hop Multimedia Routing Protocol for Wireless Multimedia Sensor
Networks,” Network Protocols and Algorithms, vol. 4, no. 2, pp. 44–64, 2012,
http://dx.doi.org/10.1109/ChinaCom.2012.6417532.
[17] S. Shi, X. Liu, and X. Gu, “An energy-efficiency optimized leach-c for wireless
sensor networks,” in Communications and Networking in China (CHINACOM),
2012 7th International ICST Conference on, Aug 2012, pp. 487–492,
http://dx.doi.org/10.1109/ChinaCom.2012.6417532.
[18] C. Pham, “Network lifetime and stealth time of wireless video sensor intrusion
detection systems under risk-based scheduling,” in 6th International Symposium
on Wireless and Pervasive Computing (ISWPC),, Feb 2011, pp. 1–6,
http://dx.doi.org/10.1109/ISWPC.2011.5751307.
[19] H. Yu, S. Son, N. Kim, S. Oh, S. Ko, I. Park, S. Yoon, and B. Lee, “Design and implementation
of a video surveillance system for a sensor network application service,”
in Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on,
July, pp. 494–497, http://dx.doi.org/10.1109/ICUFN.2012.6261759.
136 www.macrothink.org/npa
Network Protocols and Algorithms
ISSN 1943-3581
2014, Vol.6, No.3
[20] A. Boulis, “Castalia: A simulator for wireless sensor networks and body area
networks, [retrieved: June, 2014],” March 2011. [Online]. Available: http:
//castalia.npc.nicta.com.au,NICTA
[21] D. Rosario, Z. Zhao, C. Silva, E. Cerqueira, and T. Braun, “An OMNeT++
Framework to Evaluate Video Transmission in Mobile Wireless Multimedia Sensor
Networks,” in Proceedings of the 6th International Workshop on OMNeT++
(OMNeT++’13). Cannes, France: ICST, Mar. 2013, pp. 277–284,
http://dl.acm.org/citation.cfm?id=2512734.2512774.
[22] J. Klaue, B. Rathke, and A.Wolisz, “A framework for video transmission and quality evaluation,”
in 13th International Conference on Modelling Techniques and Tools for Computer
Performance Evaluation, Urbana, Illinois, USA, September 2003, pp. 255–272,
http://dx.doi.org/10.1007/978-3-540-45232-4 16.
[23] “Video trace library,” yuv video sequences”, [retrieved: June, 2014].” [Online]. Available:
http://trace.eas.asu.edu/index.html,