Learn More
As the next generation of computing architecture, cloud computing provides a variety of cloud services and has been used by more and more customers. As the access to the server is increasing, centralized computing architecture will produce bottlenecks, affect the quality of cloud computing services and bring the much inconvenience to users. This paper(More)
For barrier coverage issue of wireless sensor network, we propose a deployment scheme of sensor nodes for intrusion objects whose trajectory could be predicted. We provide the theoretical foundations for our scheme, and then analyze availability and reasonableness of our proposal from the perspective of the algorithm. This program only needs to activate(More)
  • 1