Login / Signup
On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment.
Novella Bartolini
Stefano Ciavarella
Simone Silvestri
Thomas La Porta
Published in:
IEEE Trans. Mob. Comput. (2016)
Keyphrases
</>
high speed
real time
data analysis
security mechanisms