Medical delivery drones take flight in east africa, IEEE Spectrum, vol.55, issue.1, pp.34-35, 2018. ,
The space complexity of approximating the frequency moments, Proceedings of the 28th ACM Symposium on Theory of computing (STOC), pp.20-29, 1996. ,
Deviation estimation between distributed data streams, Proceedings of the 10th European Dependable Computing Conference, pp.35-45, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00998702
A distributed information divergence estimation over data streams, IEEE Transaction on Parallel and Distributed System, vol.25, issue.2, pp.478-487, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00998708
On the Fly Detection of the Top-k Items in the Distributed Sliding Window Model, NCA 2018 -17th IEEE International Symposium on Network Computing and Applications, pp.1-8, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01888298
Uniform and Ergodic Sampling in Unstructured Peer-to-Peer Systems with Malicious Nodes, Proceedings of the 14th International Conference on Principles of Distributed Systems (OPODIS), vol.6490, pp.64-78, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00554219
Ankle: Detecting attacks in large scale systems via information divergence, Proceedings of the 9th European Dependable Computing Conference (EDCC), 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00677077
Identifying global icebergs in distributed streams, Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems (SRDS), pp.266-275, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01141829
Counting distinct elements in a data stream, Proceedings of the 6th International Workshop on Randomization and Approximation Techniques (RANDOM), pp.1-10, 2002. ,
GCP: Gossipbased code propagation for large-scale mobile wireless sensor networks, 1st International Conference on Autonomic Computing and Communication Systems (Autonomics '07), p.11, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00554253
VESPA: Constrained target coverage by distributed deployment of connected UAVs. Research report, Inria, vol.3, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02125359
Optimization of mobile sensor coverage with UAVs, 11th International Workshop on Wireless Sensor, Robot and UAV Networks (WiSARN) in conjunction with IEEE INFOCOM, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01850442
Efficient Data Collection and Tracking with Flying Drones, vol.89, pp.35-46, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02043136
Efficient deployment of connected unmanned aerial vehicles for optimal target coverage, 8th Global Information Infrastructure and Networking Symposium (GIIS). IEEE, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01575618
Recharging wireless sensor networks using drones and wireless power transfer, IEEE PIMRC 2018 ,
URL : https://hal.archives-ouvertes.fr/hal-01850446
Optimal placement of drones for fast sensor energy replenishment using wireless power transfer, Wireless Days, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02043123
A near-optimal algorithm for computing the entropy of a stream, Proceedings of the 18th ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.328-335, 2007. ,
Anomaly detection: A survey, ACM Computing Surveys, vol.41, issue.3, pp.1-58, 2009. ,
Finding frequent items in data streams, Theoretical Computer Science, vol.312, issue.1, pp.3-15, 2004. ,
Epidemic Algorithms for Replicated Database Maintenance, Proc. of the 6th Annual Symposium on Principles of Distributed Computing (PODC), pp.1-12, 1987. ,
Epidemic information dissemination in distributed systems, IEEE Computer, vol.37, issue.5, pp.60-67, 2004. ,
Lightweight probabilistic broadcast, ACM Transactions on Computer Systems, vol.21, issue.4, pp.341-374, 2003. ,
Probabilistic counting algorithms for data base applications, Journal of Computer and System Sciences, vol.31, issue.2, pp.182-209, 1985. ,
URL : https://hal.archives-ouvertes.fr/inria-00076244
Epidemic-style monitoring in large-scale wireless sensor networks, 2005. ,
Survey of important issues in uav communication networks, IEEE Communications Surveys Tutorials, vol.18, issue.2, pp.1123-1152, 2016. ,
T-man: Gossip-based overlay topology management, Lecture Notes in Computer Science, vol.3910, pp.1-15, 2006. ,
Ordered slicing of very large-scale overlay networks, Peer-to-Peer Computing, pp.117-124, 2006. ,
Gossip-based peer sampling, ACM Trans. Comput. Syst, vol.25, issue.3, 2007. ,
An optimal algorithm for the distinct element problem, Proceedings of the 29th ACM Symposium on Principles of Database Systems (PODS), 2010. ,
Detecting malicious network traffic using inverse distribution of packet contents, Proceedings of the 1st Workshop on Mining Network Data (MineNet), 2005. ,
Sketch-based change detection: Methods, evaluation, and applications, Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference (IMC), pp.234-247, 2003. ,
A survey on the design, applications, and enhancements of application-layer overlay networks, ACM Comput. Surv, vol.43, p.34, 2010. ,
Mining anomalies using traffic feature distributions, Proceedings of the 28th ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2005. ,
Data streaming algorithms for estimating entropy of network traffic, Proceedings of the 27th joint International conference on Measurement and modeling of computer systems (SIGMETRICS), 2006. ,
A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Communications Surveys and Tutorials, vol.7, pp.72-93, 2005. ,
Unmanned Aerial Vehicles for Disaster Management, vol.08, pp.83-107, 2019. ,
Efficient computation of frequent and top-k elements in data streams, Proceedings of the 10th International Conference on Database Theory (ICDT), 2005. ,
Open problem: Energy-and time-efficient dynamic drone path planning for post-disaster network servicing, ODS 2018 -International Conference on Optimization and Decision Science, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01826657
Opportunistic Disaster Recovery, Internet Technology Letters, pp.1-5, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01691285
Finding repeated elements, Science of Computer Programming, vol.2, issue.2, pp.143-152, 1982. ,
Data Streams: Algorithms and Applications, 2005. ,
Rechercher parmi ses pairs ou quand le hasard ne fait pas si bien les choses, tutoriel, 3ème MAnifestation des JEunes Chercheur francophones dans les domaines des STIC (MajecSTIC '05), 2005. ,
Performance evaluation of LoRa radio solution for PRED-NET wildlife animal tracking project, LPWAN 2016, 2016. ,
Power-aware epidemics, 21th IEEE Symposium on Reliable Distributed Systems (SRDS '02), pp.358-361, 2002. ,
Cyclon: Inexpensive membership management for unstructured p2p overlays, Journal of Network System Management, vol.13, issue.2, pp.197-217, 2005. ,
A network architecture for high volume data collection in agricultural applications, 1st International Workshop on Wireless sensors and Drones in Internet of Things (Wi-DroIT), in conjunction with DCOSS, 2019. ,