How many sensors for an acceptable breach detection probability?
Autor: | Onur, Ertan, Ersoy, Cem, Deliç, Hakan |
---|---|
Zdroj: | In Computer Communications 2006 29(2):173-182 |
Databáze: | ScienceDirect |
Externí odkaz: |
Autor: | Onur, Ertan, Ersoy, Cem, Deliç, Hakan |
---|---|
Zdroj: | In Computer Communications 2006 29(2):173-182 |
Databáze: | ScienceDirect |
Externí odkaz: |