메뉴 건너뛰기




Volumn 12, Issue 1, 2005, Pages 61-67

Quality of deployment in surveillance wireless sensor networks

Author keywords

Deployment quality; Surveillance; Wireless sensor networks

Indexed keywords

DEPLOYMENT QUALITY; SURVEILLANCE; WIRELESS SENSOR NETWORKS;

EID: 23944485148     PISSN: 10689605     EISSN: 15728129     Source Type: Journal    
DOI: 10.1007/s10776-005-5152-7     Document Type: Article
Times cited : (10)

References (11)
  • 4
    • 23944494775 scopus 로고    scopus 로고
    • Sensing coverage and breach paths in surveillance wireless sensor networks
    • S. Phoha, T. F. La Porta, and C. Griffin, eds., IEEE Press
    • E. Onur, C. Ersoy, and H. Deliç, Sensing coverage and breach paths in surveillance wireless sensor networks, Sensor Network Operations, S. Phoha, T. F. La Porta, and C. Griffin, eds., IEEE Press, 2005.
    • (2005) Sensor Network Operations
    • Onur, E.1    Ersoy, C.2    Deliç, H.3
  • 5
    • 0002321870 scopus 로고
    • Occupancy grids: A stochastic spatial representation for active robot perception
    • S. S. Iyengar and A. Elfes, ed., IEEE Computer Society Press
    • A. Elfes, Occupancy grids: a stochastic spatial representation for active robot perception, Autonomous Mobile Robots: Perception, Mapping and Navigation, Vol. 1, S. S. Iyengar and A. Elfes, ed., IEEE Computer Society Press, pp. 60-70, 1991.
    • (1991) Autonomous Mobile Robots: Perception, Mapping and Navigation , vol.1 , pp. 60-70
    • Elfes, A.1
  • 8
    • 0042014539 scopus 로고    scopus 로고
    • Sensor deployment and target localization based on virtual forces
    • San Francisco, USA, March
    • Y. Zou and K. Chakrabarty, Sensor deployment and target localization based on virtual forces, Proceedings of the IEEE INFOCOM, San Francisco, USA, pp. 1293-1303, March 2003.
    • (2003) Proceedings of the IEEE INFOCOM , pp. 1293-1303
    • Zou, Y.1    Chakrabarty, K.2
  • 9
    • 33645433789 scopus 로고    scopus 로고
    • How many sensors for an acceptable breach detection probability?
    • in press
    • E. Onur, C. Ersoy, and H. Deliç, How many sensors for an acceptable breach detection probability? Computer Communications in press, 2005.
    • (2005) Computer Communications
    • Onur, E.1    Ersoy, C.2    Deliç, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.