Formal probabilistic analysis of detection properties in wireless sensor networks
暂无分享,去创建一个
Sofiène Tahar | Mohamed Abid | Osman Hasan | Maissa Elleuch | S. Tahar | O. Hasan | M. Abid | M. Elleuch
[1] Sofiène Tahar,et al. On the Formalization of the Lebesgue Integration Theory in HOL , 2010, ITP.
[2] Joe Hurd,et al. Formal verification of probabilistic algorithms , 2003 .
[3] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[4] Sofiène Tahar,et al. Using Theorem Proving to Verify Expectation and Variance for Discrete Random Variables , 2008, Journal of Automated Reasoning.
[5] Xiaojiang Du,et al. Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks , 2009, Comput. Networks.
[6] Sofiène Tahar,et al. Formal Reasoning about Expectation Properties for Continuous Random Variables , 2009, FM.
[7] David R Lester,et al. Topology in PVS: continuous mathematics with applications , 2007, AFM '07.
[8] M. Gordon,et al. Introduction to HOL: a theorem proving environment for higher order logic , 1993 .
[9] Hridesh Rajan,et al. Slede: a domain-specific verification framework for sensor network security protocol implementations , 2008, WiSec '08.
[10] Peter V. Schaeffer,et al. Econometric methods for analyzing economic development , 2014 .
[11] Mark-Alexander Sujan,et al. Computer Safety, Reliability, and Security , 2014, Lecture Notes in Computer Science.
[12] Reformatting Fighter Tactics , .
[13] H. Katzgraber. Introduction to Monte Carlo Methods , 2009, 0905.1629.
[14] Sofiène Tahar,et al. Formalization of Continuous Probability Distributions , 2007, CADE.
[15] Yang Xiao,et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, PAPER ID: TPDS-0307-0605.R1 1 Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks , 2022 .
[16] L.F.W. van Hoesel,et al. Modelling and Verification of the LMAC Protocol for Wireless Sensor Networks , 2007, IFM.
[17] Ying Zhang,et al. Asymptotic Coverage and Detection in Randomized Scheduling Algorithm in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[18] Jean-Raymond Abrial,et al. Faultless Systems: Yes We Can! , 2009, Computer.
[19] Peter Csaba Ölveczky,et al. Formal Modeling and Analysis of the OGDC Wireless Sensor Network Algorithm in Real-Time Maude , 2007, FMOODS.
[20] R. Burger,et al. A New Keynesian Phillips Curve for South Africa , 2014 .
[21] Christine Paulin-Mohring,et al. Proofs of randomized algorithms in Coq , 2006, Sci. Comput. Program..
[22] Jun Sun,et al. Towards a Model Checker for NesC and Wireless Sensor Networks , 2011, ICFEM.
[23] David J. C. Mackay,et al. Introduction to Monte Carlo Methods , 1998, Learning in Graphical Models.
[24] Liya Liu,et al. Formalization of Discrete-time Markov Chains in HOL , 2013 .
[25] Sofiène Tahar,et al. Formal Analysis of a Scheduling Algorithm for Wireless Sensor Networks , 2011, ICFEM.
[26] Jenn-Wei Lin,et al. Improving the coverage of randomized scheduling in wireless sensor networks , 2008, IEEE Transactions on Wireless Communications.
[27] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1951 .
[28] Sofiène Tahar,et al. Formal Probabilistic Analysis of a Wireless Sensor Network for Forest Fire Detection , 2012, SCSS.
[29] Johannes Hölzl,et al. Three Chapters of Measure Theory in Isabelle/HOL , 2011, ITP.
[30] Osman Hasan,et al. Formal probabilistic analysis using theorem proving , 2008 .
[31] W. Feller,et al. An Introduction to Probability Theory and Its Applications, Vol. 1 , 1967 .
[32] Kamel Barkaoui,et al. Probabilistic verification and evaluation of Backoff procedure of the WSN ECo-MAC protocol , 2010, ArXiv.
[33] Anil Aggarwal,et al. Managing Big Data Integration in the Public Sector , 2015 .
[34] Edmund M. Clarke,et al. Model Checking , 1999, Handbook of Automated Reasoning.
[35] Sofiène Tahar,et al. Formalization of Entropy Measures in HOL , 2011, ITP.
[36] Cinzia Bernardeschi,et al. Analysis of Wireless Sensor Network Protocols in Dynamic Scenarios , 2009, SSS.
[37] José Meseguer,et al. PMaude: Rewrite-based Specification Language for Probabilistic Object Systems , 2006, QAPL.
[38] Ashish Goel,et al. Set k-cover algorithms for energy efficient monitoring in wireless sensor networks , 2003, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[39] Matthias Fruth,et al. Probabilistic Model Checking of Contention Resolution in the IEEE 802.15.4 Low-Rate Wireless Personal Area Network Protocol , 2006, Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006).
[40] Jan J. M. M. Rutten,et al. Mathematical techniques for analyzing concurrent and probabilistic systems , 2004, CRM monograph series.
[41] Ian F. Akyildiz,et al. BorderSense: Border patrol through advanced wireless sensor networks , 2011, Ad Hoc Networks.
[42] Tarek Mhamdi,et al. Information-Theoretic Analysis using Theorem Proving , 2012 .
[43] Cinzia Bernardeschi,et al. Early Prototyping of Wireless Sensor Network Algorithms in PVS , 2008, SAFECOMP.
[44] S. Srivastava,et al. A Survey and Classification of Distributed Scheduling Algorithms for Sensor Networks , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).
[45] Ying Zhang,et al. Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.
[46] Vinayak S. Naik,et al. A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.