Wireless sensor network (WSN) gives the characteristics of an effective, feasible and fairly reliable monitoring system which shows promise for Structural Health Monitoring (SHM) applications. Monitoring of civil stru...
详细信息
ISBN:
(纸本)0769523005
Wireless sensor network (WSN) gives the characteristics of an effective, feasible and fairly reliable monitoring system which shows promise for Structural Health Monitoring (SHM) applications. Monitoring of civil structures generates a large amount of sensor data that is used for structural anomaly detection. Efficiently dealing with this large amount of data in a resource-constrained WSN is a challenge. This paper proposes a, WSN based, novel framework that triggers smart events from sensor data. These events are useful for both intelligent data recording and video camera control. The operation of this framework consists of active W passive sensing modes. In passive mode, selected nodes can intelligent interpret local sensor data to trigger appropriate events. In active mode, most of the sensing nodes perform high frequency sampling and record useful data. Unnecessary data is suppressed which improves the lifespan of the network and simplifies data management.
This paper formally defines recognition as a new security principle closely related to authentication. Low-power sensor networks with no pre-deployment information require the less authoritative security of recognitio...
详细信息
ISBN:
(纸本)0769523285
This paper formally defines recognition as a new security principle closely related to authentication. Low-power sensor networks with no pre-deployment information require the less authoritative security of recognition. We give general properties of recognition protocols based on the method of key disclosure. We examine previously proposed low-power protocols according to the environment and security model presented. Finally, we give measurements from an implementation of a recognition protocol called Zero Common-Knowledge and discuss how well this proof-of-concept satisfies the properties of the environment.
We consider the problem of estimating vector-valued variables from noisy "relative" measurements. The measurement model can be expressed in terms of a graph, whose nodes correspond to the variables being est...
详细信息
Recently, peer-to-peer infrastructure has been proposed to support massively multiplayer games in the literature. However, when underlying network partitions due to network outages, the game world will partition into ...
详细信息
ISBN:
(纸本)3540281029
Recently, peer-to-peer infrastructure has been proposed to support massively multiplayer games in the literature. However, when underlying network partitions due to network outages, the game world will partition into several parallel game worlds and it is difficult and costly to merge them when the network partitions disappear. Existing approaches resort to a centralized server to arbitrate. Aiming at mitigating the effects brought by network partitions, we propose a fully distributed algorithm based on state-stack matching. Our theoretical analysis and numerical results show that our approach can resolve the merging issue at the least loss of game states with high probability.
A wireless sensor network (WSN), a type of distributed wireless ad-hoc network, is characterized by large amount of sensors and low power supply. In WSN, it is important for sensor nodes to have low transmission delay...
详细信息
Electrical market often demands accurate forecasting of electrical load for planning and operation of the power infrastructure. Current models can forecast load from half hour up to 24 hours and are based on aggregate...
详细信息
The computing power provided by high performance and low cost PC-based clusters and Grid computing platforms are attractive and they are equal or superior to supercomputers and mainframes. In parallel, discussions on ...
详细信息
Process control applications are large distributedsystems containing a vast number of communication links between their fragments. These links may have unique properties with respect to communication mechanisms and r...
详细信息
We propose a lightweight service-oriented middleware infrastructure for supporting robust and efficient peer-to-peer (P2P) computing. This middleware uses a community of proxy agents (located in some peers) which coop...
详细信息
A conference key distribution system can provide a session key of a conference with more than three participants via network. In this paper,we propose an ID-based conference key distribution scheme from pairings. The ...
详细信息
ISBN:
(纸本)3540281029
A conference key distribution system can provide a session key of a conference with more than three participants via network. In this paper,we propose an ID-based conference key distribution scheme from pairings. The proposed scheme provides user anonymity. At the same time, we also show that the proposed scheme is secure against replaying attacks and conspiratorial impersonation attacks.
暂无评论