Kashyap S,Ramamirtham J,Rastogi R,et al.Efficient constraint monitoring using adaptive thresholds[A].2008 24th International Conference on Data Engineering[C].Piscataway,NJ:IEEE,2008.526-535.
[2]
Dilman M,Raz D.Efficient reactive monitoring[J].IEEE Journal on Selected Areas in Communications,2002,20(4):668-676.
[3]
梁俊斌,王建新,陈建二.在传感器网络中构造延迟限定的最大化生命周期树[J].电子学报,2010,38(2):345-351. Liang J,Wang J,Chen J.On the construction of a delay-constrained maximum lifetime tree in wireless sensor networks[J].Acta Electronica Sinica,2010,38(2):345-351.(in Chinese)
[4]
奎晓燕,杜华坤,梁俊斌.无线传感器网络中一种能量均衡的基于连通支配集的数据收集算法[J].电子学报,2013,41(8):1512-1528. Kui X,Du H,Liang J.An energy-balanced connected dominating sets for data gathering in wireless sensor networks[J].Acta Electronica Sinica,2013,41(8):1521-1528.(in Chinese)
[5]
陈零,王建新,张士庚,奎晓燕.无线传感器网络中基于树的能量高效分布式精确数据收集算法[J].电子学报,2013,41(9):1738-1743. Chen L,Wang J,Zhang S,et al.A distributed tree-based energy-efficient algorithm for precise data gathering in wireless sensor networks[J].Acta Electronica Sinica,2013,41(9):1738-1743.(in Chinese)
[6]
Noury N,Hervé T,Rialle V,et al.Monitoring behavior in home using a smart fall sensor and position sensors[A].2000 1st Annual International,Conference On Microtechnologies in Medicine and Biology[C].Piscataway,NJ:IEEE,2000.607-610.
[7]
Agrawal S,Deb S,Naidu K V M,et al.Efficient detection of distributed constraint violations[A].2007 23rd IEEE International Conference on Data Engineering[C].Piscataway,NJ:IEEE,2007.1320-1324.
[8]
Sharfman I,Schuster A,Keren D.A geometric approach to monitoring threshold functions over distributed data streams[J].ACM Transactions on Database Systems,2007,32(4):23-34.
[9]
Cormode G,Muthukrishnan S,Yi K.Algorithms for distributed functional monitoring[J].ACM Transactions on Algorithms,2011,7(2):21-40.
[10]
Cheng R,Kalashnikov D V,Prabhakar S.Evaluating probabilistic queries over imprecise data[A].Proceedings of the 2003 ACM SIGMOD International Conference on Management of data[C].New York:ACM,2003.551-562.
[11]
Deshpande A,Guestrin C,Madden S R,et al.Model-driven data acquisition in sensor networks[A].Proceedings of the 30th International Conference on Very Large Data bases[C].San Francisco:Morgan Kaufmann,2004.588-599.
[12]
Gruenwald L,Chok H,Aboukhamis M.Using data mining to estimate missing sensor data[A].2007 7th IEEE International Conference on Data Mining Workshops[C].Piscataway,NJ:IEEE,2007.207-212.
[13]
Suciu D,Olteanu D,Ré C,et al.Probabilistic databases[J].Synthesis Lectures on Data Management,2011,3(2):1-180.
[14]
Tang M,Li F,Phillips J M,et al.Efficient threshold monitoring for distributed probabilistic data[A].2012 28th IEEE International Conference on Data Engineering[C].Piscataway,NJ:IEEE,2012.1120-1131.
[15]
Keralapura R,Cormode G,Ramamirtham J.Communication-efficient distributed monitoring of thresholded counts[A].Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data[C].New York:ACM,2006.289-300.
[16]
Meng S,Wang T,Liu L.Monitoring continuous state violation in datacenters:Exploring the time dimension[A].2010 26th IEEE International Conference on Data Engineering[C].Piscataway,NJ:IEEE,2010.968-979.