1. [1] C. Pham, A. Makhoul, and R. Saadi, “Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications,” J. NCA, vol.34, no.2, pp.783-795, March 2011.
2. [2] M. Younis and K. Akkaya, “Strategies and techniques for node placement in wireless sensor networks: A survey,” Ad Hoc Networks, vol.6, no.4, pp.621-655, June 2008.
3. [3] G. Wang, G. Cao, P. Berman, and T.F. La Porta, “Bidding protocols for deploying mobile sensors,” IEEE Trans. Mobile Comput., vol.6, no.5, pp.563-576, May 2007.
4. [4] A. Ghosh, “Estimating coverage holes and enhancing coverage in mixed sensor,” Proc. IEEE 29th Annu. IEEE Int. Conf. Local Computer Networks (IEEE LCN2004), pp.68-76, 2004.
5. [5] R. Wu, J. He, T.J. Li, and H. Shi, “Energy-efficient coverage hole self-repair in mobile sensor networks,” Proc. Int. Conf. New Trends in Information and Service Science (NISS2009), pp.1297-1302, 2009.