參考文獻 |
References
[1] Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun, and Ten H. Lai. Deploying wireless sensors to achieve both coverage and connectivity. In Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’06, pages 131–142, New York, NY, USA, 2006. ACM.
[2] Paul Balister, B ́ela Bollobas, Amites Sarkar, and Santosh Kumar. Re- liable density estimates for coverage and connectivity in thin strips of finite length. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, MobiCom ’07, pages 75–86, New York, NY, USA, 2007. ACM.
[3] Jill Britton. Symmetry and Tesselations: Investination Patterns. Dale Seymour Publications, 1999.
[4] Ai Chen, Santosh Kumar, and Ten H. Lai. Designing localized algo- rithms for barrier coverage. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Mobi- Com ’07, pages 63–74, New York, NY, USA, 2007. ACM.
[5] Richard Kershner. The number of circles covering a set. American Journal of Mathematics, 61(3):pp. 665–671, 1939.
31
[6] W.-S. Ku, K. Sakai, and M.-T. Sun. The Optimal k-Covering Tag De- ployment for RFID-based Localization. Journal of Network and Com- puter Applications, 34(3):914–924, 2011.
[7] Mo Li, Zhenjiang Li, and Athanasios V. Vasilakos. A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues. Proceedings of the IEEE, 101(12):2538–2557, 2013.
[8] Yunhao Liu, Lei Chen, Pei Jian, Qiuxia Chen, and Yiyang Zhao. Min- ing Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays. pages 37–46, 2007.
[9] Yunhao Liu, Lei Chen, Jian Pei, Qiuxia Chen, and Yiyang Zhao. Min- ing frequent trajectory patterns for activity monitoring using radio fre- quency tag arrays. In Proceedings of the Fifth IEEE International Con- ference on Pervasive Computing and Communications, PERCOM ’07, pages 37–46, Washington, DC, USA, 2007. IEEE Computer Society.
[10] Rudolf Mathar et al. Optimum positioning of base stations for cellular radio networks. Wirel. Netw., 6(6), December.
[11] Christopher Mitchell, Vikram P. Munishwar, Shailendra Singh, Xi- aoshuang Wang, Kartik Gopalan, and Nael B. Abu-Ghazaleh. Testbed design and localization in mint-2: A miniaturized robotic platform for
32
wireless protocol development and emulation. In Proceedings of the First International Conference on COMmunication Systems And NET- works, COMSNETS’09, pages 268–277, Piscataway, NJ, USA, 2009. IEEE Press.
[12] Lionel M. Ni, Yunhao Liu, Yiu Cho Lau, and Abhishek P. Patil. Land- marc: Indoor location sensing using active rfid. pages 407–415, 2003.
[13] Atsuyuki Okabe, Barry Boots, and Kokichi Sugihara. Spatial Tessella- tions: Concepts and Applications of Voronoi Diagrams. John Wiley & Sons, Inc., New York, NY, USA, 1992.
[14] Yuuki Ota, Toshihiro Hori, Taiki Onishi, Tomotaka Wada, Kouichi Mut- suura, and Hiromi Okada. An adaptive likelihood distribution algorithm for the localization of passive rfid tags. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E91-A(7):1666–1675, July 2008.
[15] H. Takagi and L. Kleinrock. Optimal transmission ranges for randomly distributed packet radio terminals. Communications, IEEE Transac- tions on, 32(3):246–257, Mar 1984.
[16] Jin Teng, Junda Zhu, Boying Zhang, Dong Xuan, and Yuan F. Zheng. E-V: Efficient Visual Surveillance with Electronic Footprints. pages 109–117, 2012.
33
[17] Sabu M. Thampi, Nithya Aniyan, and K. Chitharanjan. Hexagonal groups based key management using deployment knowledge in wireless sensor networks. In Proceedings of the International Conference on Ad- vances in Computing, Communications and Informatics, ICACCI ’12, pages 387–391, New York, NY, USA, 2012. ACM.
[18] Peng-Jun Wan and Chih-Wei Yi. Asymptotic critical transmission ra- dius and critical neighbor number for k-connectivity in wireless ad hoc networks. In Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’04, pages 1–8, New York, NY, USA, 2004. ACM.
[19] Peng-Jun Wan and Chih-Wei Yi. Coverage by randomly deployed wire- less sensor networks. IEEE/ACM Trans. Netw., 14(SI):2658–2669, June 2006.
[20] You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng. Efficient deploy- ment algorithms for ensuring coverage and connectivity of wireless sensor networks. In Wireless Internet, 2005. Proceedings. First International Conference on, pages 114–121, July 2005.
[21] Ziqiu Yun, Xiaole Bai, Dong Xuan, Ten H. Lai, and Weijia Jia. Optimal deployment patterns for full coverage and k- connectivity (k ≤
34
6) wireless sensor networks. IEEE/ACM Trans. Netw., 18(3):934–947, June 2010.
[22] H. Zhang and J. Hou. Maintaining Sensing Coverage and Connectivity in Large Sensor Networks. Ad Hoc and Sensor Wireless Networks, 1(1- 2):89–124, 2005. |