Journal of Combinatorial Theory Series B
Distributed computing: a locality-sensitive approach
Distributed computing: a locality-sensitive approach
Exposure in wireless Ad-Hoc sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
The coverage problem in a wireless sensor network
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Integrated coverage and connectivity configuration in wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Minimal and maximal exposure path algorithms for wireless embedded sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
On deriving the upper bound of α-lifetime for large sensor networks
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
Power conservation and quality of surveillance in target tracking sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
On k-coverage in a mostly sleeping sensor network
Proceedings of the 10th annual international conference on Mobile computing and networking
ExScal: Elements of an Extreme Scale Wireless Sensor Network
RTCSA '05 Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
Introduction to Probability Models, Ninth Edition
Introduction to Probability Models, Ninth Edition
Optimal Movement of Mobile Sensors for Barrier Coverage of a Planar Region
COCOA 2008 Proceedings of the 2nd international conference on Combinatorial Optimization and Applications
On the lifetime of wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Priority-based target coverage in directional sensor networks using a genetic algorithm
Computers & Mathematics with Applications
On Minimizing the Maximum Sensor Movement for Barrier Coverage of a Line Segment
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
Optimal movement of mobile sensors for barrier coverage of a planar region
Theoretical Computer Science
A distributed self-deployment algorithm for the coverage of mobile wireless sensor networks
IEEE Communications Letters
Surveillance with wireless sensor networks in obstruction: Breach paths as watershed contours
Computer Networks: The International Journal of Computer and Telecommunications Networking
On perimeter coverage scheduling in wireless sensor networks
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Accumulation point model for barrier coverage
INSS'09 Proceedings of the 6th international conference on Networked sensing systems
New algorithms for barrier coverage with mobile sensors
FAW'10 Proceedings of the 4th international conference on Frontiers in algorithmics
On minimizing the sum ofensor movements for barrier coverage of a line segment
ADHOC-NOW'10 Proceedings of the 9th international conference on Ad-hoc, mobile and wireless networks
EURASIP Journal on Wireless Communications and Networking - Special issue on theoretical and algorithmic foundations of wireless ad hoc and sensor networks
Decentralized control of multi-agent systems for swarming with a given geometric pattern
Computers & Mathematics with Applications
Coverage problems in sensor networks: A survey
ACM Computing Surveys (CSUR)
Decentralized control of a group of mobile robots for deployment in sweep coverage
Robotics and Autonomous Systems
Review: A survey on coverage and connectivity issues in wireless sensor networks
Journal of Network and Computer Applications
Optimal sensor networks for area monitoring using rotating and beam sensors
FUN'12 Proceedings of the 6th international conference on Fun with Algorithms
Algorithms on minimizing the maximum sensor movement for barrier coverage of a linear domain
SWAT'12 Proceedings of the 13th Scandinavian conference on Algorithm Theory
Design of wireless sensor networks for mobile target detection
IEEE/ACM Transactions on Networking (TON)
Brief announcement: set it and forget it - approximating the set once strip cover problem
Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures
Journal of Network and Computer Applications
Hi-index | 0.00 |
When a sensor network is deployed to detect objects penetrating a protected region, it is not necessary to have every point in the deployment region covered by a sensor. It is enough if the penetrating objects are detected at some point in their trajectory. If a sensor network guarantees that every penetrating object will be detected by at least k distinct sensors before it crosses the barrier of wireless sensors, we say the network provides k-barrier coverage. In this paper, we develop theoretical foundations for k-barrier coverage. We propose efficient algorithms using which one can quickly determine, after deploying the sensors, whether the deployment region is k-barrier covered. Next, we establish the optimal deployment pattern to achieve k-barrier coverage when deploying sensors deterministically. Finally, we consider barrier coverage with high probability when sensors are deployed randomly. The major challenge, when dealing with probabilistic barrier coverage, is to derive critical conditions using which one can compute the minimum number of sensors needed to ensure barrier coverage with high probability. Deriving critical conditions for k-barrier coverage is, however, still an open problem. We derive critical conditions for a weaker notion of barrier coverage, called weak k-barrier coverage.