Keyphrases
Vulnerability
100%
Voronoi
100%
Deployment Algorithm
100%
Mobile Sensors Deployment
100%
Mobile Sensors
50%
Operative
50%
Geometric Characterization
50%
Mobile Sensor Networks
50%
Compromised Node
50%
Promising Solutions
50%
Coverage Rate
50%
Human Supervision
50%
Mobile Devices
50%
Voronoi Diagram
50%
Safety-critical
50%
Network Configuration
50%
Device Networks
50%
Deployment Time
50%
Positioning Configuration
50%
Mobile Guide
50%
Network Coverage
50%
Device Positioning
50%
Distributed Deployment Algorithm
50%
Computer Science
Mobile Sensor
100%
Sensor Deployment
100%
mobile sensor network
50%
Compromised Node
50%
Mobile Device
50%
Network Configuration
50%