2009
DOI: 10.1016/j.comnet.2009.05.002
|View full text |Cite
|
Sign up to set email alerts
|

Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 20 publications
(21 citation statements)
references
References 72 publications
0
21
0
Order By: Relevance
“…This work also lays a foundation for our future work on sensor network scheduling algorithms. Evidently, we have extended partially this work and investigated the properties of randomized scheduling algorithms in sensor networks where sensor nodes are deployed either on two-dimensional plane or in three-dimensional space and intrusion objects occupy either areas in a two-dimensional plane or volumes in three-dimensional space, respectively [23].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This work also lays a foundation for our future work on sensor network scheduling algorithms. Evidently, we have extended partially this work and investigated the properties of randomized scheduling algorithms in sensor networks where sensor nodes are deployed either on two-dimensional plane or in three-dimensional space and intrusion objects occupy either areas in a two-dimensional plane or volumes in three-dimensional space, respectively [23].…”
Section: Resultsmentioning
confidence: 99%
“…In [9], the analysis on the impact of time asynchrony is provided. In [23], the analysis on coverage intensity of sensor networks where sensor nodes are deployed either on two-dimensional plane or in threedimensional space and intrusion objects occupy either areas in two-dimensional plane or volumes in three-dimensional space is presented.…”
Section: Introductionmentioning
confidence: 99%
“…The analysis of the randomized scheduling has been usually done using the paper-andpencil based probabilistic technique Hsin and Liu, 2004;Xiao et al, 2009). Such analysis consists in constructing a theoretical model where the required random variables are specified and analyzed together with the associated performance metrics.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the sound formalization of probability and its reasoning support available in the HOL theorem prover, we first provide, in this paper, a formal analysis of the lifetime for randomly-scheduled WSN. Then, we develop the intrusion coverage formalizations of a novel version of the randomized algorithm (Xiao et al, 2009), under new assumptions related to the intrusion object.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation