Intruder Activity Analysis under Unreliable Sensor Networks
暂无分享,去创建一个
[1] Feng Zhao,et al. Scalable Information-Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks , 2002, Int. J. High Perform. Comput. Appl..
[2] T. C. Shermer,et al. Recent results in art galleries (geometry) , 1992, Proc. IEEE.
[3] Miodrag Potkonjak,et al. Exposure in wireless Ad-Hoc sensor networks , 2001, MobiCom '01.
[4] D. T. Lee,et al. Computational complexity of art gallery problems , 1986, IEEE Trans. Inf. Theory.
[5] Parameswaran Ramanathan,et al. Sensor deployment strategy for target detection , 2002, WSNA '02.
[6] Gaurav S. Sukhatme,et al. Mobile Sensor Network Deployment using Potential Fields : A Distributed , Scalable Solution to the Area Coverage Problem , 2002 .
[7] H. Vincent Poor,et al. Online activity detection in a multiuser environment using the matrix CUSUM Algorithm , 2002, IEEE Trans. Inf. Theory.
[8] Andrew J. Viterbi,et al. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.
[9] Miodrag Potkonjak,et al. Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[10] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[11] Nael B. Abu-Ghazaleh,et al. A taxonomy of wireless micro-sensor network models , 2002, MOCO.
[12] Vinayak S. Naik,et al. A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.
[13] J. Andel. Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.
[14] Peter Willett,et al. Detection of hidden Markov model transient signals , 2000, IEEE Trans. Aerosp. Electron. Syst..
[15] Meng-Chang Lee. Top 100 Documents Browse Search Ieee Xplore Guide Support Top 100 Documents Accessed: Nov 2005 a Tutorial on Hidden Markov Models and Selected Applications Inspeech Recognition , 2005 .
[16] Krishnendu Chakrabarty,et al. Sensor deployment and target localization in distributed sensor networks , 2004, TECS.
[17] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[18] Héctor H. González-Baños,et al. A randomized art-gallery algorithm for sensor placement , 2001, SCG '01.
[19] Igor V. Nikiforov,et al. A generalized change detection problem , 1995, IEEE Trans. Inf. Theory.
[20] G. Lorden. PROCEDURES FOR REACTING TO A CHANGE IN DISTRIBUTION , 1971 .
[21] J. O'Rourke. Art gallery theorems and algorithms , 1987 .
[22] E. S. Page. CONTINUOUS INSPECTION SCHEMES , 1954 .
[23] Sonia Martínez,et al. Coverage control for mobile sensing networks , 2002, IEEE Transactions on Robotics and Automation.
[24] T. Shermer. Recent Results in Art Galleries , 1992 .