Skip to main navigation
Skip to search
Skip to main content
New Jersey Institute of Technology Home
Help & FAQ
Home
Profiles
Research units
Facilities
Federal Grants
Research output
Press/Media
Search by expertise, name or affiliation
Coverage breach problems in bandwidth-constrained sensor networks
Maggie X. Cheng, Lu Ruan, Weili Wu
Research output
:
Contribution to journal
›
Article
›
peer-review
28
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Coverage breach problems in bandwidth-constrained sensor networks'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Sensor Networks
100%
Bandwidth-constrained
100%
Network Lifetime
100%
Wireless Sensor Networks
66%
Bandwidth Limitation
66%
Sensor Coverage
66%
Channel Bandwidth
66%
Low Power Mode
33%
Sensor Node
33%
Network Resources
33%
Number of Sensors
33%
Cardinality
33%
Base Station
33%
Low Power Operation
33%
Heuristic-based
33%
Relaxation Method
33%
LP Relaxation
33%
Greedy Approximation Algorithm
33%
Channel Access
33%
Network Coverage
33%
Optimal Arrangement
33%
Mutually Exclusive
33%
Active Sensor
33%
Integer Linear Programming Model
33%
Constraint Network
33%
Engineering
Sensor Network
100%
Network Lifetime
60%
Wireless Sensor Network
40%
Channel Bandwidth
40%
Basestation
20%
Energy Engineering
20%
Programming Model
20%
Sensor Node
20%
Network Resource
20%
Mode Operation
20%
Low Power Operation
20%
Send Data
20%
Cardinality
20%
Contention
20%
Linear Programming
20%
Power Mode
20%
Computer Science
Sensor Networks
100%
Network Lifetime
60%
Wireless Sensor Network
40%
Channel Bandwidth
40%
Sensor Node
20%
Network Resource
20%
Programming Model
20%
Cardinality
20%
Channel Access
20%
Integer-Linear Programming
20%
Relaxation Method
20%
Approximation Algorithms
20%
Constraint Network
20%