References

  1. Hydraulic Resources Republic of Tunisia. Ministry of Agriculture & Fisheries. Available at http://www.onagri.tn/.
  2. P. Ballarini & A. Miller (2006): Model Checking Medium Access Control for Sensor Networks. In: Proceedings of the Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. IEEE Computer Society, Washington, DC, USA, pp. 255–262, doi:10.1109/ISoLA.2006.16.
  3. E.M. Clarke, O. Grumberg & D.A. Peled (2000): Model Checking. The MIT Press, Cambridge, MA 02142-1315 USA.
  4. M. Elleuch, O. Hasan, S. Tahar & M. Abid (2011): Formal Analysis of a Scheduling Algorithm for Wireless Sensor Networks. In: Formal Methods and Software Engineering. Springer-Verlag, Berlin, Heidelberg, pp. 388–403, doi:10.1007/978-3-642-24559-6_27.
  5. M. Elleuch, O. Hasan, S. Tahar & M. Abid (2011): Formal Probabilistic Analysis of the Coverage-based Random Scheduling Algorithm for WSNs. Technical Report. CES-ENIS, Sfax University, Tunisia. Available at http://www.ceslab.org/publications/TR_FPARSAWSN_v1.3.pdf.
  6. Republic of Turkey. Ministry of Environment & General Directorate of Forestry Forestry. Available at http://www.ogm.gov.tr/.
  7. M. J. C. Gordon (1989): Current Trends in Hardware Verification and Automated Theorem Proving, chapter Mechanizing Programming Logics in Higher Order Logic. Springer-Verlag, New York, NY, USA, pp. 387–439, doi:10.1007/978-1-4612-3658-0_10.
  8. A. Gupta (1992): Formal Hardware Verification Methods: a Survey. Formal Methods in System Design 1(2-3), pp. 151–238, doi:10.1007/BF00121125.
  9. O. Hasan (2008): Formal Probabilistic Analysis using Theorem Proving. University of Concordia, Montreal, QC, Canada. Available at http://spectrum.library.concordia.ca/975852/.
  10. O. Hasan, N. Abbasi, B. Akbarpour, S. Tahar & R. Akbarpour (2009): Formal Reasoning about Expectation Properties for Continuous Random Variables. In: Formal Methods. Springer-Verlag, Berlin, Heidelberg, pp. 435–450, doi:10.1007/978-3-642-05089-3_28.
  11. O. Hasan & S. Tahar (2009): Performance Analysis and Functional Verification of the Stop-and-Wait Protocol in HOL. Automated Reasoning 42(1), pp. 1–33, doi:10.1007/s10817-008-9105-6.
  12. O. Hasan & S. Tahar (2009): Probabilistic Analysis of Wireless Systems Using Theorem Proving. Electronic Notes in Theoretical Computer Science 242(2), pp. 43–58, doi:10.1016/j.entcs.2009.06.022.
  13. O. Hasan, S. Tahar & N. Abbasi (2010): Formal Reliability Analysis Using Theorem Proving. IEEE Transactions on Computers 1(2-3), pp. 579–592, doi:10.1109/TC.2009.165.
  14. J. Hurd (2002): Formal Verification of Probabilistic Algorithms. University of Cambridge, Cambridge, UK. Available at http://www.gilith.com/research/papers/thesis.pdf.
  15. J. Hurd (2003): Verification of the Miller-Rabin Probabilistic Primality Test. Logic and Algebraic Programming 50(1-2), pp. 3–21, doi:10.1016/S1567-8326(02)00065-6.
  16. S. Jain & S. Srivastava (2007): A Survey and Classification of Distributed Scheduling Algorithms for Sensor Networks. In: Proceedings of the International Conference on Sensor Technologies and Applications. IEEE Computer Society, Washington, DC, USA, pp. 88–93, doi:10.1109/SENSORCOMM.2007.14.
  17. Z. Li, S. Nadon & J. Cihlar (2000): Satellite Detection of Canadian Boreal Forest Fires: Development and Application of the Algorithm. Remote Sensing 21(16), pp. 3057–3069, doi:10.1080/01431160050144956.
  18. J-W. Lin & Y-T. Chen (2008): Improving the Coverage of Randomized Scheduling in Wireless Sensor Networks. IEEE Transactions on Wireless Communications 7(12), pp. 4807–4812, doi:10.1109/T-WC.2008.070933.
  19. C. Liu, K. Wu, Y. Xiao & B. Sun (2006): Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems 17(6), pp. 562–575, doi:10.1109/TPDS.2006.77.
  20. Y. Liu, Y. Gu, G. Chen, Y. Ji & J. Li (2011): A Novel Accurate Forest Fire Detection System Using Wireless Sensor Networks. In: Proceedings of the International Conference on Mobile Ad-hoc and Sensor Networks. IEEE Computer Society, Washington, DC, USA, pp. 52–59, doi:10.1109/MSN.2011.8.
  21. D.J.C. MacKay (1998): Introduction to Monte Carlo Methods. In: Proceedings of the NATO Advanced Study Institute on Learning in Graphical Models. Kluwer Academic Publishers, Norwell, MA, USA, pp. 175–204, doi:10.1007/978-94-011-5014-9_7.
  22. A.K. McIver & A. Fehnker (2006): Formal Techniques for the Analysis of Wireless Networks. In: Proceedings of the International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. IEEE Computer Society, Washington, DC, USA, pp. 263–270, doi:10.1109/ISoLA.2006.51.
  23. National Fire Danger Rating System (NFDRS). Available at http://www.wrh.noaa.gov/sew/fire.php/olm/nfdrs.htm.
  24. P.C. Olveczky & S. Thorvaldsen (2007): Formal Modeling and Analysis of the OGDC Wireless Sensor Network Algorithm in Real-Time Maude. In: Proceedings of the 9th IFIP WG 6.1 International Conference on Formal Methods for Open Object-based Distributed Systems. Springer-Verlag, Berlin, Heidelberg, pp. 122–140, doi:10.1007/978-3-540-72952-5_8.
  25. J. Rutten, M. Kwaiatkowska, G. Normal & D. Parker (2004): Mathematical Techniques for Analyzing Concurrent and Probabilisitc Systems. CRM Monograph Series. American Mathematical Society.
  26. The Real-Time website. Available at http://heim.ifi.uio.no/peterol/RealTimeMaude/.
  27. Y. Xiao, H. Chen, K. Wu, B. Sun, Y. Zhang, X. Sun & C. Liu (2010): Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks. IEEE Transactions on Computers 59(4), pp. 507–521, doi:10.1109/TC.2009.170.
  28. Y. Xiao & Y. Zhang (2009): Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags. In: Proceedings of the 18th International Conference on Computer Communications and Networks. IEEE Computer Society, Washington, DC, USA, pp. 1–6, doi:10.1109/ICCCN.2009.5235295.
  29. Y. Xiao & Y. Zhang (2011): Divide-and Conquer-based Surveillance Framework using Robots, Sensor Nodes, and RFID tags. Wireless Communications and Mobile Computing 11(7), pp. 964–979, doi:10.1002/wcm.863.
  30. J. Yick, B. Mukherjee & D. Ghosal (2008): Wireless Sensor Network Survey. Computer Networks 52(12), pp. 2292–2330, doi:10.1016/j.comnet.2008.04.002.
  31. H. Zayani, K. Barkaoui & R. Ben Ayed (2010): Probabilistic Verification and Evaluation of Backoff Procedure of the WSN ECo-MAC Protocol. Wireless & Mobile Networks 2(2), pp. 156–170, doi:10.5121/ijwmn.2010.2211. Available at http://arxiv.org/abs/1005.2050.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org