Component oriented distributedcomputing uses a collection of different types of components to achieve high performance in solving a problem by identifying each component as an object. The usefulness of the transactio...
详细信息
Wireless sensor networks are emerging as a new computational platform consisting of small, low-power and inexpensive nodes that integrate a modest amount of sensing, computation and wireless communication capabilities...
详细信息
ISBN:
(纸本)3540264221
Wireless sensor networks are emerging as a new computational platform consisting of small, low-power and inexpensive nodes that integrate a modest amount of sensing, computation and wireless communication capabilities. These have found popular applications in a broad set of areas including environmental monitoring, habitat monitoring and disaster recovery. Typically sensor nodes are deployed over a geographical area for the purpose of detecting, tracking and monitoring events of interest. Reports produced upon the observation of specific events are then processed locally at the sensor nodes and transmitted over multiple hops to a centralized sink in order to reach an operations center or to be analyzed further. Since sensor nodes are deployed in a large land region, the objective is to achieve complete coverage of the region, that is, every location in the region lies in the observation field of at least one sensor node. However the initial placement of sensors may not achieve this goal for various reasons: the number of original sensors may have been too low, the original placement may have been random (for example, sensors deployed from the air) leaving parts of the region uncovered, or, some of the sensors have malfunctioned, leaving coverage holes. In this paper we study the coverage restoration problem in sensor networks. The fundamental question is "Given a two-dimensional area, a piece of land for example, and an initial set of sensors, how can we determine the number of sensor nodes required to completely cover the region". Essentially, the coverage restoration problem reflects how well an area is monitored by sensors. In abstract terms, our approach determines uncovered area in the sensor network field and proposes the deployment of nodes to completely cover the area. Our mechanism consists of two steps: (a) estimating the regions uncovered by sensors and (b) identifying the minimum number and location of sensors required to cover this region. The key idea
Some of the algorithms developed within the artificial neural-networks tradition can be easily adopted to wireless sensor network platforms and in the same time they can meet the requirements for sensor networks like:...
详细信息
ISBN:
(纸本)0769522947
Some of the algorithms developed within the artificial neural-networks tradition can be easily adopted to wireless sensor network platforms and in the same time they can meet the requirements for sensor networks like: simple parallel distributed computation, distributedstorage, data robustness and auto-classification of sensor readings. Dimensionality reduction, obtained simply from the outputs of the neural-networks clustering algorithms, leads to lower communication costs and energy savings. Two different data aggregation architectures will be presented, with algorithms which use wavelets for initial data-processing of the sensory inputs and artificial neural-networks which use unsupervised learning methods for categorization of the sensory inputs. They are analyzed on a data obtained from a set of several motes, equipped with several sensors each. Results from deliberately simulated malfunctioning sensors show the data robustness of these architectures.
In this paper, we present a general and comprehensive reputation-based trust model for distributedcomputing. The proposed model is an enhancement over our previous model, TRUMMAR, and aims at achieving a truly unique...
详细信息
Clustering provides an effective way for extending the lifetime of a sensor network. In this paper, we propose a novel Voting-based Clustering Algorithm (VCA) for energy-efficient data dissemination in quasi-stationar...
详细信息
ISBN:
(纸本)0769522947
Clustering provides an effective way for extending the lifetime of a sensor network. In this paper, we propose a novel Voting-based Clustering Algorithm (VCA) for energy-efficient data dissemination in quasi-stationary sensor networks. This new approach lets sensors vote for their neighbors to elect suitable cluster heads. Unlike traditional distributed clustering algorithms, VCA combines load balancing, energy and topology information together by using very simple voting mechanisms. This new approach is completely distributed, location-unaware and independent of network size and topology. Simulation results show that our VCA can reduce the number of clusters by 5-25% and prolong the lifetime of a sensor network by 25-30% over that of existing energy-efficient clustering protocols.
Networks of Workstations (NOWs) based on various operating systems are globally accepted as the standard for computing environments in the IT industry. To harness the tremendous potential for computing capability repr...
详细信息
Wide-spread deployment of sensor networks is emerging and it presents an economical solution to numerous problems. A number of applications are dependent on secure operation of the sensor network, however, and serious...
详细信息
The proceedings contain 50 papers. The topics discussed include: reducing reauthentication delay in wireless networks;providing distributed certificate authority service in mobile ad hoc networks;on improving the perf...
详细信息
ISBN:
(纸本)0769523692
The proceedings contain 50 papers. The topics discussed include: reducing reauthentication delay in wireless networks;providing distributed certificate authority service in mobile ad hoc networks;on improving the performance of role-based cascaded delegation in ubiquitous computing;a privacy preserving reputation system for mobile information dissemination networks;a privacy service for context-aware mobile computing;protecting location privacy through path confusion;a solution for wireless privacy and payments based on e-cash;a level key infrastructure for secure and efficient group communication in wireless sensor networks;a modified secure remote password (SRP) protocol for key initialization and exchange in bluetooth systems;an efficient key management algorithm for hierarchical group communication;and a deterministic pairwise key pre-distribution scheme for mobile sensor networks.
Business rules define or constrain some business [24]. Many different business rules engines exist to capture and manage the rules that comprise ones business. The lack of standards in the business rule area leads to ...
详细信息
ISBN:
(纸本)0769523846
Business rules define or constrain some business [24]. Many different business rules engines exist to capture and manage the rules that comprise ones business. The lack of standards in the business rule area leads to different engine implementations and various rule representation formats. Furthermore, accessing rule-based knowledge in a uniform way from different heterogeneous applications in an enterprise computing environment poses many integration challenges. In this paper we propose the design and implementation of a service-oriented approach on how to integrate different heterogeneous business rule engines by using our Business Rules Broker architecture. Furthermore, we present a method to automatically expose the rule-based business knowledge as Web services by generating the Web service code at design-time.
暂无评论