Learn More
Intrusion detection is a significant application in wireless sensor networks (WSNs). S. Kumar et al have introduced the concept of barrier coverage, which deploys sensors in a narrow belt region to guarantee that any intrusion across the region is to be detected. However, the practical issues have not been investigated such as scheduling sensors(More)
In this paper, we study deployment patterns to achieve full coverage and k-connectivity (k ≤ 6) under different ratios of the sensor communication range (denoted by Rc) to the sensing range (denoted by Rs) for homogeneous wireless sensor networks (WSNs). In particular, we propose new patterns for 3and 5-connectivity. We also discover that there exists a(More)
In this paper, we study deployment patterns to achieve full coverage and <i>k</i> -connectivity <i>(k</i> &#x2264; 6) under different ratios of the sensor communication range (denoted by <i>R</i><sub>c</sub>) to the sensing range (denoted by <i>R</i><sub>s</sub>) for homogeneous wireless sensor networks (WSNs). In particular, we propose new patterns for 3-(More)
In this paper, we study deployment patterns to achieve full coverage and -connectivity under different ratios of the sensor communication range (denoted by ) to the sensing range (denoted by ) for homogeneous wireless sensor networks (WSNs). In particular, we propose new patterns for 3and 5-connectivity. We also discover that there exists a hexagon-based(More)
Power is always a major concern for mobile devices. To save precious energy, mobile devices choose to stay in a low power mode by turning off their transceivers when it is not involved with transmission. However, they need to wake up to allow packets originated from them sent and those coming to them received. This presents a challenge in the distributed(More)
Edge-chasing is the basis of many deadlock detection algorithms. This method detects a deadlock by propagating special messages called probes along dependency edges. When the initiator of a probe receives the probe back, it knows the existence of a deadlock. Once a deadlock is detected, a special message called token is sent to clean up those probes in the(More)