Login / Signup

On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment.

Novella BartoliniStefano CiavarellaSimone SilvestriThomas La Porta
Published in: IEEE Trans. Mob. Comput. (2016)
Keyphrases
  • high speed
  • real time
  • data analysis
  • security mechanisms