Hydraulic Resources Republic of Tunisia. Ministry of Agriculture & Fisheries.
Available at http://www.onagri.tn/.
P. Ballarini & A. Miller (2006):
Model Checking Medium Access Control for Sensor Networks.
In: Proceedings of the Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation.
IEEE Computer Society,
Washington, DC, USA,
pp. 255–262,
doi:10.1109/ISoLA.2006.16.
E.M. Clarke, O. Grumberg & D.A. Peled (2000):
Model Checking.
The MIT Press,
Cambridge, MA 02142-1315 USA.
M. Elleuch, O. Hasan, S. Tahar & M. Abid (2011):
Formal Analysis of a Scheduling Algorithm for Wireless Sensor Networks.
In: Formal Methods and Software Engineering.
Springer-Verlag,
Berlin, Heidelberg,
pp. 388–403,
doi:10.1007/978-3-642-24559-6_27.
M. Elleuch, O. Hasan, S. Tahar & M. Abid (2011):
Formal Probabilistic Analysis of the Coverage-based Random Scheduling Algorithm for WSNs.
Technical Report.
CES-ENIS,
Sfax University, Tunisia.
Available at http://www.ceslab.org/publications/TR_FPARSAWSN_v1.3.pdf.
Republic of Turkey. Ministry of Environment & General Directorate of Forestry Forestry.
Available at http://www.ogm.gov.tr/.
M. J. C. Gordon (1989):
Current Trends in Hardware Verification and Automated Theorem Proving, chapter Mechanizing Programming Logics in Higher Order Logic.
Springer-Verlag,
New York, NY, USA,
pp. 387–439,
doi:10.1007/978-1-4612-3658-0_10.
A. Gupta (1992):
Formal Hardware Verification Methods: a Survey.
Formal Methods in System Design 1(2-3),
pp. 151–238,
doi:10.1007/BF00121125.
O. Hasan, N. Abbasi, B. Akbarpour, S. Tahar & R. Akbarpour (2009):
Formal Reasoning about Expectation Properties for Continuous Random Variables.
In: Formal Methods.
Springer-Verlag,
Berlin, Heidelberg,
pp. 435–450,
doi:10.1007/978-3-642-05089-3_28.
O. Hasan & S. Tahar (2009):
Performance Analysis and Functional Verification of the Stop-and-Wait Protocol in HOL.
Automated Reasoning 42(1),
pp. 1–33,
doi:10.1007/s10817-008-9105-6.
O. Hasan & S. Tahar (2009):
Probabilistic Analysis of Wireless Systems Using Theorem Proving.
Electronic Notes in Theoretical Computer Science 242(2),
pp. 43–58,
doi:10.1016/j.entcs.2009.06.022.
O. Hasan, S. Tahar & N. Abbasi (2010):
Formal Reliability Analysis Using Theorem Proving.
IEEE Transactions on Computers 1(2-3),
pp. 579–592,
doi:10.1109/TC.2009.165.
J. Hurd (2003):
Verification of the Miller-Rabin Probabilistic Primality Test.
Logic and Algebraic Programming 50(1-2),
pp. 3–21,
doi:10.1016/S1567-8326(02)00065-6.
S. Jain & S. Srivastava (2007):
A Survey and Classification of Distributed Scheduling Algorithms for Sensor Networks.
In: Proceedings of the International Conference on Sensor Technologies and Applications.
IEEE Computer Society,
Washington, DC, USA,
pp. 88–93,
doi:10.1109/SENSORCOMM.2007.14.
Z. Li, S. Nadon & J. Cihlar (2000):
Satellite Detection of Canadian Boreal Forest Fires: Development and Application of the Algorithm.
Remote Sensing 21(16),
pp. 3057–3069,
doi:10.1080/01431160050144956.
J-W. Lin & Y-T. Chen (2008):
Improving the Coverage of Randomized Scheduling in Wireless Sensor Networks.
IEEE Transactions on Wireless Communications 7(12),
pp. 4807–4812,
doi:10.1109/T-WC.2008.070933.
C. Liu, K. Wu, Y. Xiao & B. Sun (2006):
Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks.
IEEE Transactions on Parallel and Distributed Systems 17(6),
pp. 562–575,
doi:10.1109/TPDS.2006.77.
Y. Liu, Y. Gu, G. Chen, Y. Ji & J. Li (2011):
A Novel Accurate Forest Fire Detection System Using Wireless Sensor Networks.
In: Proceedings of the International Conference on Mobile Ad-hoc and Sensor Networks.
IEEE Computer Society,
Washington, DC, USA,
pp. 52–59,
doi:10.1109/MSN.2011.8.
D.J.C. MacKay (1998):
Introduction to Monte Carlo Methods.
In: Proceedings of the NATO Advanced Study Institute on Learning in Graphical Models.
Kluwer Academic Publishers,
Norwell, MA, USA,
pp. 175–204,
doi:10.1007/978-94-011-5014-9_7.
A.K. McIver & A. Fehnker (2006):
Formal Techniques for the Analysis of Wireless Networks.
In: Proceedings of the International Symposium on Leveraging Applications of Formal Methods, Verification and Validation.
IEEE Computer Society,
Washington, DC, USA,
pp. 263–270,
doi:10.1109/ISoLA.2006.51.
P.C. Olveczky & S. Thorvaldsen (2007):
Formal Modeling and Analysis of the OGDC Wireless Sensor Network Algorithm in Real-Time Maude.
In: Proceedings of the 9th IFIP WG 6.1 International Conference on Formal Methods for Open Object-based Distributed Systems.
Springer-Verlag,
Berlin, Heidelberg,
pp. 122–140,
doi:10.1007/978-3-540-72952-5_8.
J. Rutten, M. Kwaiatkowska, G. Normal & D. Parker (2004):
Mathematical Techniques for Analyzing Concurrent and Probabilisitc Systems.
CRM Monograph Series.
American Mathematical Society.
Y. Xiao, H. Chen, K. Wu, B. Sun, Y. Zhang, X. Sun & C. Liu (2010):
Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks.
IEEE Transactions on Computers 59(4),
pp. 507–521,
doi:10.1109/TC.2009.170.
Y. Xiao & Y. Zhang (2009):
Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags.
In: Proceedings of the 18th International Conference on Computer Communications and Networks.
IEEE Computer Society,
Washington, DC, USA,
pp. 1–6,
doi:10.1109/ICCCN.2009.5235295.
Y. Xiao & Y. Zhang (2011):
Divide-and Conquer-based Surveillance Framework using Robots, Sensor Nodes, and RFID tags.
Wireless Communications and Mobile Computing 11(7),
pp. 964–979,
doi:10.1002/wcm.863.
J. Yick, B. Mukherjee & D. Ghosal (2008):
Wireless Sensor Network Survey.
Computer Networks 52(12),
pp. 2292–2330,
doi:10.1016/j.comnet.2008.04.002.
H. Zayani, K. Barkaoui & R. Ben Ayed (2010):
Probabilistic Verification and Evaluation of Backoff Procedure of the WSN ECo-MAC Protocol.
Wireless & Mobile Networks 2(2),
pp. 156–170,
doi:10.5121/ijwmn.2010.2211.
Available at http://arxiv.org/abs/1005.2050.