[1]
ISL: ISL Monthly Container Port Monitor, http: /www. isl. org/products_services/publications/ pdf/MCPM_3rd_quarter_2006_sum. pdf, (2007).
Google Scholar
[2]
Lauf, J.O. and Gollmann, D., Monitoring and Security of Container Transports, Proceedings of New Technologies, Mobility and Security, Paris, France, (2002).
DOI: 10.1007/978-1-4020-6270-4_54
Google Scholar
[3]
Steffen Schaefer, Secure Trade Lane: A Sensor Network Solution for More Predictable and More Secure Container Shipments, Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications, Portland, Oregon, USA, (2006).
DOI: 10.1145/1176617.1176732
Google Scholar
[4]
Mahlknecht, S. and Madani, SA, On architecture of low power wireless sensor networks for container tracking and monitoring applications, 5th IEEE International Conference on Industrial Informatics, Vienna, Austria, (2007), pp.353-358.
DOI: 10.1109/indin.2007.4384782
Google Scholar
[5]
Gehrke, J.D., Behrens, C., Jedermann, R. and Morales Kluge, E., The intelligent Container-Toward Autonomous Logistic Processes, Demo Presentations, Universitat Bremen, (2007).
Google Scholar
[6]
Ko, M.D., Hsu, H.J. and Lin, H.J., A wireless sensor network application for management on marine cold chains, International Journal of Radio Frequency Identification Technology and Applications, Vol. 1, No. 3(2007) , p.278—290.
DOI: 10.1504/ijrfita.2007.015851
Google Scholar
[7]
Heinzelman W.R., Chandrakasan, A. and Balakrishnan, H., Energy-efficient communication protocol for wireless microsensor networks, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Hawaii, USA, (2000), pp.1-10.
DOI: 10.1109/hicss.2000.926982
Google Scholar
[8]
Tao Yang and Zheng Yaling, The combination of the optimal number of cluster-heads and energy adaptive cluster-head selection algorithm in wireless sensor networks, WiCOM 2006 International Conference, Wuhan, China, (2006), pp.1-4.
DOI: 10.1109/wicom.2006.289
Google Scholar
[9]
Hou, G. and Tang, K.W., Evaluation of LEACH Protocol Subject to Different Traffic Models, The Joint International Conference on Optical Internet and Next Generation Network, (2006), pp.281-283.
DOI: 10.1109/coinngncon.2006.4454603
Google Scholar