Figure 4From: Energy-efficient border intrusion detection using wireless sensors networkCoverage Graph. In coverage graph, the V has two virtual nodes, m and t that correspond to the left and right boundaries.Back to article page