Protecting with sensor networks: perimeters and axes
暂无分享,去创建一个
[1] Kenneth Baclawski,et al. A core ontology for situation awareness , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.
[2] Cynthia E. Irvine,et al. Toward quality of security service in a resource management system benefit function , 2000, Proceedings 9th Heterogeneous Computing Workshop (HCW 2000) (Cat. No.PR00556).
[3] J. O'Rourke. Art gallery theorems and algorithms , 1987 .
[4] Miodrag Potkonjak,et al. Exposure in wireless Ad-Hoc sensor networks , 2001, MobiCom '01.
[5] Miodrag Potkonjak,et al. Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure , 2001, MobiHoc '01.
[6] Krishnendu Chakrabarty,et al. Sensor deployment and target localization based on virtual forces , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] Aaron Strauss,et al. Carnival Booth: An Algorithm for Defeating the Computer-Assisted Passenger Screening System , 2002, First Monday.
[8] C. J. Tarr,et al. Using CLASP to assess perimeter security , 1995, Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology.
[9] Miodrag Potkonjak,et al. Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).