The distributed workflow is one of the main study fields of collaboration office automation, however, the traditional technique limits its realization. The emergence of Service-oriented Architecture technology provide...
详细信息
ISBN:
(纸本)9781424401109
The distributed workflow is one of the main study fields of collaboration office automation, however, the traditional technique limits its realization. The emergence of Service-oriented Architecture technology provides a frame which can suffice the requirements of different structure, being independent of language and transparent service for distributed applications and overcomes the deficiency of traditional workflow distributing applications solutions. This paper presents a model of secure distributed workflow system and realization based on web service technology which meets the requirements of collaboration office automation between enterprises. The paper concluded with a successful realization in Chongqing electronic power.
The proceedings contain 6 papers. The topics discussed include: caching context information in pervasive systems;supporting arbitrary Boolean subscriptions in distributed publish/subscribe systems;distributed data sto...
详细信息
ISBN:
(纸本)1595934189
The proceedings contain 6 papers. The topics discussed include: caching context information in pervasive systems;supporting arbitrary Boolean subscriptions in distributed publish/subscribe systems;distributed data storage for opportunistic grids;middleware support for transparency and user control in context-aware systems;reconfigurable middleware for sensor based applications;and using logical neighborhoods to enable scoping in wireless sensor networks.
sensor networks opened new opportunities to monitor the environment. In order to retrieve the desired data, sensors are usually organized into a hierarchy and synchronize when transmitting the data towards the base st...
详细信息
ISBN:
(纸本)9781424404988
sensor networks opened new opportunities to monitor the environment. In order to retrieve the desired data, sensors are usually organized into a hierarchy and synchronize when transmitting the data towards the base station. Many scheduling schemes have been proposed with the goal of allowing sensors to sleep as much as possible and ultimately save energy. In this paper, we propose two new scheduling algorithms that assign predefined slots to each sensor. These algorithms are distributed, need very little global information and do not need knowledge about the location of sensors or the network topology. As others, we also assume that loose clock synchronization is available. The experimental results confirm our expectations. They show a significant reduction in the average time awake per node of at least three times compared to more traditional routing protocols like TAG.
LEACH is one of the most popular hierarchical routing algorithms for sensor networks. In LEACH, the cluster number per round takes an important effect on the network lifetime. Thus the goal of the cluster head selecti...
详细信息
ISBN:
(纸本)3540380914
LEACH is one of the most popular hierarchical routing algorithms for sensor networks. In LEACH, the cluster number per round takes an important effect on the network lifetime. Thus the goal of the cluster head selection algorithm is to ensure that the expected number of clusters per round equals a pre-determined optimal value k. However, a slight inaccuracy is spotted in the computation of the node self-selected probability per round. As a result, the number of clusters produced by the algorithm is distributed in a large range around the target value. We propose an improved clustering scheme (I-LEACH) to correct this inaccuracy. The experimental results show that this scheme can ensure a more stable number of clusters.
A prerequisite for secure communication between two sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to set up a session key between communicat...
详细信息
ISBN:
(纸本)3540380914
A prerequisite for secure communication between two sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to set up a session key between communicating nodes, and how to minimize any information about the keys disclosed to the other side during key agreement. Almost schemes one of the existing protocols cannot perfectly solve above problems due to some drawbacks. Accordingly, we propose a strong key pre-distribution scheme having the following merits. First, it supports authentication services. Second, as each node can only find w (=[W/2]) keys of secret keys (i.e. W) that shared with other side, without revealing the unshared key information, it substantially improves resilience of network against node capture. Our scheme is based on the MRS scheme. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.
A distributedsensor network with mobility provides an ideal system platform for surveillance and for search and rescue applications. We consider a system design consisting of a set of autonomous robots communicating ...
详细信息
ISBN:
(纸本)3540380914
A distributedsensor network with mobility provides an ideal system platform for surveillance and for search and rescue applications. We consider a system design consisting of a set of autonomous robots communicating with each other and with a base station to provide image and other sensor data. A robot-mounted sensor which detects interesting information coordinates with other mobile robots in its vicinity to stream its data back to the base station in a robust and energy-efficient manner. The system is partitioned into twin sub-networks in such a way that any transmitting sensor will pair itself with another nearby node to cooperatively transmit its data in a multiple-input, multiple-output (MIMO) fashion. At the same time, other robots in the system will cooperatively position themselves so that the overall link quality is maximized and the total transmission energy in minimized. We efficiently simulate the system's behavior using the Transaction Level Modeling (TLM) capability of SystemC. The simulation results demonstrate the utility of our design and provide insights into performance of the system.
This article presents a role dynamic management algorithm for sensor devices. The network scenario considers a wireless sensor network in which each node can assume different roles. Specifically, attention is focused ...
详细信息
ISBN:
(纸本)9781424404247
This article presents a role dynamic management algorithm for sensor devices. The network scenario considers a wireless sensor network in which each node can assume different roles. Specifically, attention is focused on two different roles: the active and the passive role. When a sensor device assumes an active role it uses a greater amount of energy greater than the passive role, The scope of this work is to introduce a dynamic management strategy to better distribute the energy in the network varying dynamically roles of the nodes under different mobility conditions. This dynamic algorithm is applied to an energy-efficient protocol based on a cross-layered approach (ESR and EMAC) and which ensures a good node lifetime. Two different algorithms have been developed to ensure a dynamic management of the node roles with the ESR and EMAC approach. Both these approaches have been evaluated through a simulation tool OMNeT++ and their performance have been compared with the original ESR and EMAC.
Emerging wireless communication standards and more capable sensors and actuators have pushed further development of wireless sensor networks. Deploying a large number of sensor nodes requires a high-level framework en...
详细信息
In this paper we present a framework to provide dependability through accountability Our proposal exploits the asymmetry present in the majority of sensor data processing to cheaply validate events and processing whic...
详细信息
ISBN:
(纸本)0769525202
In this paper we present a framework to provide dependability through accountability Our proposal exploits the asymmetry present in the majority of sensor data processing to cheaply validate events and processing which occurs at various points in a distributed middleware system. We exemplify our framework with reference to two real-world distributed location middlewares. We adapt one of these to evaluate our framework and present performance results.
The proceedings contain 134 papers. The topics discussed include: OPSENET: a security-enabled routing scheme for a system of optical sensor networks;efficient integration of Web services in ambient-aware sensor networ...
详细信息
ISBN:
(纸本)1424404258
The proceedings contain 134 papers. The topics discussed include: OPSENET: a security-enabled routing scheme for a system of optical sensor networks;efficient integration of Web services in ambient-aware sensor network applications;design and dimensioning of a novel composite-star WDM network with TDM channel partitioning;snapshot: a self-calibration protocol for camera sensor networks;sensor localization and camera calibration in distributed camera sensor networks;restorability analysis of two protection cycles in random mesh networks;QoS oriented contention resolution techniques for optical burst switching networks;evaluation of network distances properties by NDS, the network distance service;SeeMote: in-situ visualization and logging device for wireless sensor networks;and graded channel reservation with path switching in ultra high capacity networks.
暂无评论