\caption{Main characteristics of some coverage approaches in previous literatures.}
\begin{tabular}{@{} cl*{13}c @{}}
& & \multicolumn{10}{c}{Characteristics} \\[2ex]
- & & \mcrot{1}{l}{50}{\footnotesize Distributed} & \mcrot{1}{l}{50}{\footnotesize Centralized} & \mcrot{1}{l}{50}{ \footnotesize Area coverage} & \mcrot{1}{l}{50}{\footnotesize Target coverage} & \mcrot{1}{l}{50}{\footnotesize k-coverage} & \mcrot{1}{l}{50}{\footnotesize Heterogeneous nodes}& \mcrot{1}{l}{50}{\footnotesize Homogeneous nodes} & \mcrot{1}{l}{50}{\footnotesize Disjoint sets} & \mcrot{1}{l}{50}{\footnotesize Non-Disjoint sets} & \mcrot{1}{l}{50}{\footnotesize Energy-Efficient} & \mcrot{1}{l}{50}{\footnotesize Work in Rounds} & \mcrot{1}{l}{50}{\footnotesize Adjustable Radius} \\
+ & & \mcrot{1}{l}{50}{\footnotesize Distributed} & \mcrot{1}{l}{50}{\footnotesize Centralized} & \mcrot{1}{l}{50}{ \footnotesize Area coverage} & \mcrot{1}{l}{50}{\footnotesize Target coverage} & \mcrot{1}{l}{50}{\footnotesize k-coverage} & \mcrot{1}{l}{50}{\footnotesize Heterogeneous nodes}& \mcrot{1}{l}{50}{\footnotesize Homogeneous nodes} & \mcrot{1}{l}{50}{\footnotesize Disjoint sets} & \mcrot{1}{l}{50}{\footnotesize Non-Disjoint sets} & \mcrot{1}{l}{50}{\footnotesize SET K-COVER } & \mcrot{1}{l}{50}{\footnotesize Work in Rounds} & \mcrot{1}{l}{50}{\footnotesize Adjustable Radius} \\
\cmidrule[1pt]{2-14}
-& \tiny Z. Abrams et al. (2004)~\cite{ref114} & & & & & & & & & & & & &\\
+& \tiny Z. Abrams et al. (2004)~\cite{ref114} & \OK &\OK & \OK & & & &\OK & \OK & & \OK & & &\\
-& \tiny M. Cardei and D. Du (2005)~\cite{ref115} & & & & & & & & & & & & &\\
+& \tiny M. Cardei and D. Du (2005)~\cite{ref115} & & \OK & & \OK & & & \OK & \OK & & \OK & & &\\
-& \tiny S. Slijepcevic and M. Potkonjak (2001)~\cite{ref116} & & & & & & & & & & & & &\\
+& \tiny S. Slijepcevic and M. Potkonjak (2001)~\cite{ref116} & & \OK & \OK & & & & \OK & \OK & & \OK & & &\\
-& \tiny Manjun and A. K. Pujari (2011)~\cite{ref117} & & & & & & & & & & & & &\\
+& \tiny Manjun and A. K. Pujari (2011)~\cite{ref117} & & \OK & & \OK & & & \OK & & \OK & & & &\\
-& \tiny M. Yang and J. Liu (2014)~\cite{ref118} & & & & & & & & & & & & &\\
+& \tiny M. Yang and J. Liu (2014)~\cite{ref118} & & \OK & \OK & & & & \OK & & \OK & & & & \\
-& \tiny S. Wang et al. (2010)~\cite{ref144} & & & & & & & & & & & & &\\
+& \tiny S. Wang et al. (2010)~\cite{ref144} & & \OK & \OK & & & & \OK & & \OK & & \OK & & \\
-& \tiny C. Lin et al. (2010)~\cite{ref147} & & & & & & & & & & & & &\\
+& \tiny C. Lin et al. (2010)~\cite{ref147} & & \OK & \OK & & & & \OK & & \OK & & & & \\
-& \tiny S. A. R. Zaidi et al. (2009)~\cite{ref148} & & & & & & & & & & & & &\\
+& \tiny S. A. R. Zaidi et al. (2009)~\cite{ref148} & & \OK & \OK & & & & \OK & & \OK & & & & \\
-& \tiny Y. Li et al. (2011)~\cite{ref142} & & & & & & & & & & & &\\
+& \tiny Y. Li et al. (2011)~\cite{ref142} & & \OK & \OK & & & \OK & \OK & \OK & & \OK & & \OK &\\
-& \tiny H. M. Ammari and S. K. Das (2012)~\cite{ref152} & & & & & & & & & & & & &\\
+& \tiny H. M. Ammari and S. K. Das (2012)~\cite{ref152} & \OK & \OK & \OK & & \OK & & \OK & & \OK & & \OK & &\\
-& \tiny L. Liu et al. (2010)~\cite{ref150} & & & & & & & & & & & & &\\
+& \tiny L. Liu et al. (2010)~\cite{ref150} & & \OK & & \OK & & \OK & & \OK & & \OK & & &\\
-& \tiny H. Cheng et al. (2014)~\cite{ref119} & & & & & & & & & & & & &\\
+& \tiny H. Cheng et al. (2014)~\cite{ref119} & & \OK & \OK & & & & \OK & & \OK & & & &\\
-& \tiny M. Rebai et al. (2014)~\cite{ref141} & & & & & & & & & & & & &\\
+& \tiny M. Rebai et al. (2014)~\cite{ref141} & & \OK & \OK & & & & \OK & & \OK & & & &\\
& \tiny L. Aslanyan et al. (2013)~\cite{ref151} & & & & & & & & & & & & &\\
\select@language {english}
-\contentsline {chapter}{Table of Contents}{vi}{chapter*.1}
+\contentsline {chapter}{Table of Contents}{v}{chapter*.1}
\contentsline {chapter}{List of Figures}{vii}{chapter*.2}
\contentsline {chapter}{List of Tables}{ix}{chapter*.3}
\contentsline {chapter}{List of Algorithms}{xi}{chapter*.4}
\contentsline {part}{I\hspace {1em}Scientific Background}{xiii}{part.1}
-\contentsline {chapter}{\numberline {1}Wireless Sensor Networks}{1}{chapter.1}
+\contentsline {chapter}{\numberline {1}Related Literatures}{1}{chapter.1}
\contentsline {section}{\numberline {1.1}Introduction}{1}{section.1.1}
-\contentsline {section}{\numberline {1.2}Wireless Sensor Network Architecture}{2}{section.1.2}
-\contentsline {section}{\numberline {1.3}Types of Wireless Sensor Networks}{4}{section.1.3}
-\contentsline {section}{\numberline {1.4}Wireless Sensor Network Applications}{6}{section.1.4}
-\contentsline {section}{\numberline {1.5}The Main Challenges in Wireless Sensor Networks}{9}{section.1.5}
-\contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms in Wireless Sensor Networks}{11}{section.1.6}
-\contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing}{11}{subsection.1.6.1}
-\contentsline {subsection}{\numberline {1.6.2}Radio Optimization}{13}{subsection.1.6.2}
-\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes}{13}{subsection.1.6.3}
-\contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes:}{13}{subsubsection.1.6.3.1}
-\contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes:}{16}{subsubsection.1.6.3.2}
-\contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes:}{16}{subsection.1.6.4}
-\contentsline {subsection}{\numberline {1.6.5}Battery Repletion:}{17}{subsection.1.6.5}
-\contentsline {section}{\numberline {1.7}Network Lifetime in Wireless Sensor Networks}{17}{section.1.7}
-\contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{18}{section.1.8}
-\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems}{19}{section.1.9}
-\contentsline {section}{\numberline {1.10}Energy Consumption Models}{20}{section.1.10}
-\contentsline {subsection}{\numberline {1.10.1}Radio Energy Dissipation Model}{21}{subsection.1.10.1}
-\contentsline {subsection}{\numberline {1.10.2}Our Energy Consumption Model}{22}{subsection.1.10.2}
-\contentsline {section}{\numberline {1.11}Conclusion}{23}{section.1.11}
-\contentsline {chapter}{\numberline {2}Related Literatures}{25}{chapter.2}
-\contentsline {section}{\numberline {2.1}Introduction}{25}{section.2.1}
-\contentsline {section}{\numberline {2.2}Coverage Algorithms}{26}{section.2.2}
-\contentsline {subsection}{\numberline {2.2.1}Centralized Algorithms}{27}{subsection.2.2.1}
-\contentsline {subsection}{\numberline {2.2.2}Distributed Algorithms}{29}{subsection.2.2.2}
-\contentsline {section}{\numberline {2.3}Conclusion}{32}{section.2.3}
-\contentsline {part}{II\hspace {1em}Contributions}{35}{part.2}
-\contentsline {part}{III\hspace {1em}Conclusions and Perspectives}{37}{part.3}
-\contentsline {part}{Bibliographie}{47}{chapter*.5}
+\contentsline {section}{\numberline {1.2}Coverage Algorithms}{2}{section.1.2}
+\contentsline {subsection}{\numberline {1.2.1}Centralized Algorithms}{3}{subsection.1.2.1}
+\contentsline {subsection}{\numberline {1.2.2}Distributed Algorithms}{5}{subsection.1.2.2}
+\contentsline {section}{\numberline {1.3}Conclusion}{8}{section.1.3}
+\contentsline {part}{II\hspace {1em}Contributions}{11}{part.2}
+\contentsline {part}{III\hspace {1em}Conclusions and Perspectives}{13}{part.3}
+\contentsline {part}{Bibliographie}{18}{chapter*.5}