Anti-detection: how does a target traverse a sensing field
暂无分享,去创建一个
[1] Parameswaran Ramanathan,et al. Vulnerability of sensor networks to unauthorized traversal and monitoring , 2004, IEEE Transactions on Computers.
[2] Parameswaran Ramanathan,et al. Detecting unauthorized activities using a sensor network , 2004 .
[3] Ketan Mulmuley,et al. Computational geometry : an introduction through randomized algorithms , 1993 .
[4] Miodrag Potkonjak,et al. Exposure in wireless Ad-Hoc sensor networks , 2001, MobiCom '01.
[5] Ivan Stojmenovic,et al. Routing with Guaranteed Delivery in Ad Hoc Wireless Networks , 1999, DIALM '99.
[6] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[7] Miodrag Potkonjak,et al. Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[8] Ivan Stojmenovic,et al. Loop-Free Hybrid Single-Path/Flooding Routing Algorithms with Guaranteed Delivery for Wireless Networks , 2001, IEEE Trans. Parallel Distributed Syst..
[9] Franz Aurenhammer,et al. Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.
[10] Miodrag Potkonjak,et al. Location Discovery in Ad-hoc Wireless Sensor Networks , 2004 .
[11] Laurence T. Yang,et al. Proceedings of the 3rd international conference on Embedded Software and Systems , 2007 .
[12] Jorge Urrutia,et al. Compass routing on geometric networks , 1999, CCCG.
[13] P. Bose,et al. Online routing in geometric graphs , 2001 .
[14] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[15] Prosenjit Bose,et al. Online Routing in Triangulations , 1999, SIAM J. Comput..