Deployment of sensor networks in real-world settings is a labor-intensive and cumbersome task: environmental influences often trigger problems that are difficult to track down due to limited visibility of the network ...
ISBN:
(纸本)9783540730897
Deployment of sensor networks in real-world settings is a labor-intensive and cumbersome task: environmental influences often trigger problems that are difficult to track down due to limited visibility of the network state. In this paper we present a framework for passive inspection (i.e., no instrumentation of sensor nodes required) of deployed sensor networks and show how this framework can be used to inspect data gathering applications. The basic approach is to temporarily install a distributed network sniffer alongside the inspected sensor network, with overheard messages being analyzed by a data stream processor and network state being displayed in a graphical user interface. Our tool can be flexibly applied to different sensor network operating systems and protocol stacks, and can deal well with incomplete information.
The National Oceanic and Atmospheric Administration39;s (NOAA) Integrated Coral Observing Network (ICON), has been operational since 2000 and works closely with most US Government and many international environmenta...
详细信息
ISBN:
(纸本)9781424415014
The National Oceanic and Atmospheric Administration's (NOAA) Integrated Coral Observing Network (ICON), has been operational since 2000 and works closely with most US Government and many international environmental partners involved in coral reef research. The ICON program has pioneered the use of artificial intelligence techniques to assess near real-time data streams from environment sensor networks such as the SEAKEYS Network (Florida Keys), the Australia Institute of Marine Science Weather Network, NOAA's Coral Reef Ecosystem Division network in the Pacific, and its own Integrated Coral Observing Network (ICON) of stations in the Caribbean. Besides its innovative approach to coral monitoring station deployments, the ICON program recently pioneered techniques for the near real-time integration of satellite, in situ and radar data sources for purposes of ecological forecasting of such events as coral bleaching, coral spawning, upwelling and other marine behavioral or physical oceanographic events. The ICON program has also ushered in the use of Pulse-Amplitude-Modulating fluorometry to measure near real-time physiological recording of response to environmental stress during coral bleaching, thus providing even better ecological forecasting capabilities through artificial intelligence and data integrative techniques. Herewith, we describe these techniques, along with a report on new coral calcification instrumentation augmenting the ICON Network sensor array.
This paper presents the e-SENSE middleware architecture for distributed processing of context information in dynamic wireless sensor networks. At the lower layer, sensor nodes organize into clusters spontaneously base...
详细信息
This paper presents the e-SENSE middleware architecture for distributed processing of context information in dynamic wireless sensor networks. At the lower layer, sensor nodes organize into clusters spontaneously based on shared context. These clusters form the basis for the service-oriented processing layer, where the functionality of the sensor network is expressed using service task graphs supporting distributed execution of applications. The higher layer is responsible for complex context inference and recognition. As a concrete example we evaluate the distributed recognition of human activities in a car assembly process.
Change detection in images is of great interest due to its relevance in applications such as video surveillance. This paper presents the underlying theoretical problem of image change detection using wireless sensor n...
ISBN:
(纸本)9783540730897
Change detection in images is of great interest due to its relevance in applications such as video surveillance. This paper presents the underlying theoretical problem of image change detection using wireless sensor network. The proposed system consists of multiple image sensors which make local decisions independently and send them to the base station which finally makes a global decision and declares whether a significant change has occurred or not.
Personalized services can provide significant user benefits since they adapt their behavior to better support the user. Personalized services use a variety of data related to the user to decide their behavior. Thus pe...
详细信息
ISBN:
(纸本)1424402379
Personalized services can provide significant user benefits since they adapt their behavior to better support the user. Personalized services use a variety of data related to the user to decide their behavior. Thus personalized service needs a provisioning system that can collect the data that impacts service behavior and allows selection of the most appropriate service. However, in the coming ubiquitous environment, some data necessary for determining service behavior might be unavailable due to two possible reasons. One is that the data does not exit. The other is that the data exists but cannot be accessed. For example, users do not want to disclose their personal information, and service providers do not also want to expose data related to their knowhow in services. This paper describes a new service provisioning system for distributed personalization with private data protection. Specifically, the system selects applicable services by assessing how well each candidate service behaves when some data is missing. It then executes those selected services while hiding the users' and providers' private data in a distributed manner. We first summarize the requirements for a personalized service system, and introduce our fundamental policies for the system. The two main components of our system are then described in detail. One component is a service assessment mechanism that can judge if a service can work without data that can be used for adaptation. The second component is a service execution mechanism that can utilize private data while still ensuring privacy. This component divides service logic and executes divided logic where necessary data is available. The paper finally describes our prototype implementation and its performance evaluation results. (C) 2007 Elsevier Inc. All rights reserved.
The proceedings contain 77 papers. The topics discussed include: device-aware cache replacement algorithm for heterogeneous mobile storage devices;product line based reuse methodology for developing generic ECU;a link...
详细信息
ISBN:
(纸本)3540726845
The proceedings contain 77 papers. The topics discussed include: device-aware cache replacement algorithm for heterogeneous mobile storage devices;product line based reuse methodology for developing generic ECU;a link-load balanced low energy mapping and routing for NoC;memory offset assignment for DSPs;theory and practice of probabilistic timed game for embedded systems;a design method for heterogeneous adders;function inlining in embedded systems with code size limitation;a new type of embedded file system based on SPM;power-aware software prefetching;modeling and implementation of an output-queuing router for networks-on-chips;face detection on embedded systems;user-customized interactive system using both speech and face recognition;speaker recognition using temporal decomposition of LSF for mobile environment;a distributed wearable system based on multimodal fusion;and randomized approach for target coverage scheduling in directional sensor network.
Network operators gradually open their interfaces to formerly hidden services. This fosters the development of a new class of mobile applications that take into account user39;s location and presence information. Ho...
详细信息
ISBN:
(纸本)9780769527758
Network operators gradually open their interfaces to formerly hidden services. This fosters the development of a new class of mobile applications that take into account user's location and presence information. However, this development also raises problems especially the lack of protection of privacy in location-based services. This paper proposes a service architecture that is aimed at overcoming some of the shortages of currently existing context-aware applications that make use of network providers services as well as existing mobile payment systems. We therefore introduce the combination of tickets together with a novel privacy enhancing mechanism that is based on the notion of pseudonyms. Compared to other privacy enhancing solutions our pseudonym mechanism can also be implemented on mobile devices that have some restrictions regarding resources like memory or processing power Due to their flexibility tickets can be used for many different kinds of applications. One important aspect in this respect is the highly postulated pay-as-you-go model. We give an example of a transport ticket application and explain the message interaction patterns for the basic functionalities of the systems, regarding aspects like data and privacy protection. This example further shows how 3rd party application providers can build meaningful mobile applications that are accepted by users.
In this paper, we propose an efficient and fault tolerant topology control algorithm named AWSF for large-scale wireless sensor networks, which introduces the scale-free characteristic of complex networks into the top...
详细信息
In this paper, we propose an efficient and fault tolerant topology control algorithm named AWSF for large-scale wireless sensor networks, which introduces the scale-free characteristic of complex networks into the topology of wireless sensor networks to minimize transmission delay and increase robustness. It is a distributed algorithm, letting each node locally adjust its transmission power and determine its neighbor relationship based on certain arbitrary weights which are random real numbers following a negative power-law probability distribution. The topology constructed under AWSF is proved to be scale-free, strongly connected and bi-directional. Simulation results show that the resulting topology has a small average degree and good network performance in terms of transmission delay and robustness.
sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensure the integrity, availability, and at...
ISBN:
(纸本)9783540730897
sensor networks are often used to sense the physical world and provide observations for various uses. In hostile environments, it is critical to control the network access to ensure the integrity, availability, and at times confidentiality of the sensor data. This paper develops efficient methods for distributed access control in sensor networks. The paper starts with a baseline approach, which provides a more flexible and efficient way to enforce access control when compared with previous solutions. This paper then extends the baseline approach to enable privilege delegation, which allows a user to delegate its privilege to other users without using a trusted server, and broadcast query, which allows a user to access the network at a large scale efficiently. The privilege delegation and broadcast query are very useful in practice; none of the current solutions can achieve these two properties.
We propose and study a class of structured and dynamic information push and pull protocols for wireless sensor networks. For structured information dissemination, our study focuses on the impact of various information...
详细信息
ISBN:
(纸本)9783540730897
We propose and study a class of structured and dynamic information push and pull protocols for wireless sensor networks. For structured information dissemination, our study focuses on the impact of various information demand characteristics on dissemination along some type of backbone structures. Our exploration of dynamic information push and pull focuses on finding optimal strategies in a distributed manner without prior knowledge of information demand characteristics and/or with heterogeneous query distributions. Our theoretical analysis uses a simple grid structure, but the protocol is applicable to arbitrary network topologies. A distributed traffic information system is used as the context of study and the simulation study uses a microscopic traffic simulator to demonstrate some of the ideas discussed in the paper.
暂无评论