咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 信息与通信工程
    • 2 篇 计算机科学与技术...
    • 1 篇 软件工程

主题

  • 3 篇 k-coverage confi...
  • 2 篇 wireless sensor ...
  • 1 篇 grouping algorit...
  • 1 篇 decision areas
  • 1 篇 data aggregation
  • 1 篇 eligibility algo...
  • 1 篇 system false pos...
  • 1 篇 sleep scheduling
  • 1 篇 system false neg...
  • 1 篇 quality of surve...

机构

  • 2 篇 yuan ze univ dep...
  • 1 篇 yuan ze univ dep...
  • 1 篇 yuan ze universi...

作者

  • 3 篇 hwang shyh-in
  • 3 篇 wueng meng-chun
  • 1 篇 ho chia-hsuan
  • 1 篇 lin han-pei
  • 1 篇 hwang i-shyan

语言

  • 3 篇 英文
检索条件"主题词=K-coverage configuration"
3 条 记 录,以下是1-10 订阅
排序:
Determination of k-coverage configuration for Meeting Desired Quality of Surveillance on WSNs
收藏 引用
JOURNAL OF INTERNET TECHNOLOGY 2011年 第3期12卷 449-456页
作者: Wueng, Meng-Chun Hwang, Shyh-In Hwang, I-Shyan Yuan Ze Univ Dept Comp Sci & Engn Chungli Taiwan Yuan Ze Univ Dept Comp Engn & Sci Chungli Taiwan
For monitoring critical applications by using wireless sensor networks (WSNs), users usually care about the false positive (false alarm) probability and false negative (detection miss) probability of a WSN, which are ... 详细信息
来源: 评论
Efficient k-coverage Grouping Scheduling in Wireless Sensor Networks
Efficient K-coverage Grouping Scheduling in Wireless Sensor ...
收藏 引用
11th International Conference on Advanced Communication Technology
作者: Wueng, Meng-Chun Lin, Han-Pei Hwang, Shyh-In Yuan Ze Univ Dept Comp Sci & Engn Chungli Taiwan
The k-coverage configuration guarantees that each location in an area is covered by at least k wireless sensors. To prolong the system lifetime, how to design an efficient sleep-scheduling algorithm have been attracte... 详细信息
来源: 评论
AkCE: An Efficient and Accurate k-coverage Eligibility Algorithm in Wireless Sensor Networks
AKCE: An Efficient and Accurate K-Coverage Eligibility Algor...
收藏 引用
16th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
作者: Wueng, Meng-Chun Hwang, Shyh-In Ho, Chia-Hsuan Yuan Ze University Taiwan
For monitoring critical applications, the k-coverage configuration is extensively exploited to ensure that each location is covered by at least k active sensor nodes. The well-known k-coverage eligibility (kE) algorit... 详细信息
来源: 评论