{"id":"https://openalex.org/W2168838129","doi":"https://doi.org/10.1109/dcoss.2011.5982161","title":"Directional diagnosis for wireless sensor networks","display_name":"Directional diagnosis for wireless sensor networks","publication_year":2011,"publication_date":"2011-06-01","ids":{"openalex":"https://openalex.org/W2168838129","doi":"https://doi.org/10.1109/dcoss.2011.5982161","mag":"2168838129"},"language":"en","primary_location":{"id":"doi:10.1109/dcoss.2011.5982161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dcoss.2011.5982161","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041835402","display_name":"Wei Gong","orcid":"https://orcid.org/0000-0003-3622-7090"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Gong","raw_affiliation_strings":["Tsinghua University, Beijing, Beijing, CN"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, Beijing, CN","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101510961","display_name":"Kebin Liu","orcid":"https://orcid.org/0000-0002-6347-6976"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Kebin Liu","raw_affiliation_strings":["Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong, China","Key Laboratory of Information System Security of Ministry of Education, TNLIST, School of Software, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]},{"raw_affiliation_string":"Key Laboratory of Information System Security of Ministry of Education, TNLIST, School of Software, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101877973","display_name":"Yunhao Liu","orcid":"https://orcid.org/0000-0001-8052-9200"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Yunhao Liu","raw_affiliation_strings":["Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong, China","Key Laboratory of Information System Security of Ministry of Education, TNLIST, School of Software, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]},{"raw_affiliation_string":"Key Laboratory of Information System Security of Ministry of Education, TNLIST, School of Software, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100773043","display_name":"Xibin Zhao","orcid":"https://orcid.org/0000-0002-6168-7016"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xibin Zhao","raw_affiliation_strings":["Key Laboratory of Information System Security of Ministry of Education, TNLIST, School of Software, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information System Security of Ministry of Education, TNLIST, School of Software, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100846520","display_name":"Ming Gu","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Gu","raw_affiliation_strings":["Key Laboratory of Information System Security of Ministry of Education, TNLIST, School of Software, Tsinghua University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information System Security of Ministry of Education, TNLIST, School of Software, Tsinghua University, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5041835402"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":1.7504,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.86461556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9667999744415283,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7621793746948242},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.7608295679092407},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7085484862327576},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6508663296699524},{"id":"https://openalex.org/keywords/root-cause","display_name":"Root cause","score":0.6171521544456482},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5992236137390137},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.521547794342041},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5049212574958801},{"id":"https://openalex.org/keywords/root-cause-analysis","display_name":"Root cause analysis","score":0.4811352789402008},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46844249963760376},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.43562060594558716},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4168601632118225},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.41109633445739746},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.40595918893814087},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3965895473957062},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3200170397758484},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.2974805235862732},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2844032347202301},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2571393847465515},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1586359739303589},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11668267846107483},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.0883888304233551}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7621793746948242},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.7608295679092407},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7085484862327576},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6508663296699524},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.6171521544456482},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5992236137390137},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.521547794342041},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5049212574958801},{"id":"https://openalex.org/C130963320","wikidata":"https://www.wikidata.org/wiki/Q1401207","display_name":"Root cause analysis","level":2,"score":0.4811352789402008},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46844249963760376},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.43562060594558716},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4168601632118225},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.41109633445739746},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.40595918893814087},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3965895473957062},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3200170397758484},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2974805235862732},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2844032347202301},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2571393847465515},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1586359739303589},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11668267846107483},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.0883888304233551},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dcoss.2011.5982161","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dcoss.2011.5982161","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","score":0.5699999928474426,"display_name":"Life in Land"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1572481965","https://openalex.org/W1998666667","https://openalex.org/W2023346859","https://openalex.org/W2035363137","https://openalex.org/W2043153351","https://openalex.org/W2063165833","https://openalex.org/W2069841827","https://openalex.org/W2073280033","https://openalex.org/W2076533039","https://openalex.org/W2085942561","https://openalex.org/W2100617218","https://openalex.org/W2109948354","https://openalex.org/W2110715322","https://openalex.org/W2111269353","https://openalex.org/W2112203058","https://openalex.org/W2124165698","https://openalex.org/W2127577941","https://openalex.org/W2127928514","https://openalex.org/W2139515706","https://openalex.org/W2139524463","https://openalex.org/W2140616837","https://openalex.org/W2144201174","https://openalex.org/W2150441580","https://openalex.org/W2153713154","https://openalex.org/W2156776663","https://openalex.org/W2157999049","https://openalex.org/W2159080219","https://openalex.org/W2163027868","https://openalex.org/W2163975189","https://openalex.org/W2164745623","https://openalex.org/W2168125208","https://openalex.org/W2169854556","https://openalex.org/W2170378215","https://openalex.org/W2170985435","https://openalex.org/W2396666742","https://openalex.org/W3145128584","https://openalex.org/W4251701311","https://openalex.org/W6659235122","https://openalex.org/W6676576622"],"related_works":["https://openalex.org/W1977342959","https://openalex.org/W2148549110","https://openalex.org/W145760256","https://openalex.org/W2999657022","https://openalex.org/W2536494564","https://openalex.org/W1657620843","https://openalex.org/W1996270948","https://openalex.org/W2525537297","https://openalex.org/W2545116705","https://openalex.org/W3148968234"],"abstract_inverted_index":{"Network":[0],"diagnosis":[1,82,87],"is":[2,44,90],"crucial":[3],"in":[4,38,51,84,143],"managing":[5],"a":[6,80,120],"wireless":[7],"sensor":[8,147],"network":[9,111,148],"(WSN)":[10],"since":[11],"many":[12],"network-related":[13],"faults,":[14],"such":[15],"as":[16],"node":[17,121],"and":[18,34,104,132,156],"link":[19],"failures,":[20],"can":[21],"easily":[22],"happen.":[23],"Diagnosis":[24],"tools":[25],"usually":[26],"consist":[27],"of":[28,100,109,129,158],"two":[29],"key":[30],"components,":[31],"information":[32,41,54,65,88,102],"collection":[33,42],"root-cause":[35,47,67],"deduction,":[36],"while":[37],"most":[39],"cases":[40],"process":[43],"independent":[45],"with":[46,113],"deduction.":[48],"This":[49],"results":[50,152],"either":[52],"redundant":[53],"which":[55,85],"might":[56],"pose":[57],"high":[58,114],"communication":[59],"burden":[60],"on":[61],"WSNs,":[62],"or":[63],"incomplete":[64],"for":[66],"inference":[68,95,135],"that":[69],"leads":[70],"false":[71],"judgments.":[72],"To":[73],"address":[74],"the":[75,86,93,110,126,134,140,154],"issue,":[76],"we":[77],"propose":[78],"DID,":[79],"directional":[81],"approach,":[83],"acquirement":[89],"guided":[91],"by":[92],"fault":[94,105],"process.":[96],"Through":[97],"several":[98],"rounds":[99],"incremental":[101],"probing":[103],"reasoning,":[106],"root":[107],"causes":[108],"abnormalities":[112],"credibility":[115],"are":[116],"deduced.":[117],"We":[118,138],"employ":[119],"tracing":[122],"scheme":[123],"to":[124],"reconstruct":[125],"topical":[127],"topology":[128],"faulty":[130],"regions":[131],"build":[133],"model":[136],"accordingly.":[137],"implement":[139],"DID":[141],"approach":[142],"our":[144],"forest":[145],"monitoring":[146],"system,":[149],"GreenOrbs.":[150],"Experimental":[151],"validate":[153],"scalability":[155],"effectiveness":[157],"this":[159],"design.":[160]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
