there are numerous possibilities to assemble a very resource-efficient and power-aware distributed sensor network tailored to a specific application. However, the task of initializing the network has not yet attracted...
详细信息
ISBN:
(纸本)9781595939906
there are numerous possibilities to assemble a very resource-efficient and power-aware distributed sensor network tailored to a specific application. However, the task of initializing the network has not yet attracted much attention. this paper presents the NoSE (Neighbor Search and link Estimation) initialization scheme. NoSE provides all exhaustive neighbor search including a thorough link assessment, leveraging both high reactivity and greatly minimized energy consumption. Based on the information obtained in the initial link assessment phase, a routing protocol earl subsequently set up and use an optimized network topology.
Most debris flow monitoring systems deployed today use indirect means to track information regarding debris flows. In this work, we introduce a novel debris flow monitoring system for in-situ and direct tracking of de...
详细信息
ISBN:
(纸本)9781595939906
Most debris flow monitoring systems deployed today use indirect means to track information regarding debris flows. In this work, we introduce a novel debris flow monitoring system for in-situ and direct tracking of debris flows in real-time. the core idea is to throw wireless sensors into the debris flows and collect flow information as they move along. We will describe the design of the wireless sensors and present some preliminary performance results.
We present KleeNet, a Klee based bug hunting tool for sensor network applications before deployment. KleeNet automatically tests code for all possible inputs, ensures memory safety, and integrates well into TinyOS bas...
详细信息
this paper outlines an efficient variation of the Flooding Time Synchronization Protocol (FTSP) on real hardware with an IEEE 802.15.4 MAC layer. the paper compares the performance of two clock drift estimation techni...
详细信息
ISBN:
(纸本)9781595939906
this paper outlines an efficient variation of the Flooding Time Synchronization Protocol (FTSP) on real hardware with an IEEE 802.15.4 MAC layer. the paper compares the performance of two clock drift estimation techniques: Least;Squares Linear Regression and the Kalman filter. In assessing the viability of time synchronization in an industrial setting, our reliance on real hardware gives confidence for the deployment in future products. the concrete result is a high time synchronization accuracy, with An achievable average error of 0.4 mu s, and a repetition interval of a few seconds, while using a star network topology.
We demonstrate MacroLab, which is a macroprogramming framework that offers a vector programming abstraction Similar to Matlab for cyber-physical systems (CPSs). the user writes a single program for an entire network u...
详细信息
ISBN:
(纸本)9781595939906
We demonstrate MacroLab, which is a macroprogramming framework that offers a vector programming abstraction Similar to Matlab for cyber-physical systems (CPSs). the user writes a single program for an entire network using Matlab-like operations such as addition, find, and max. the framework executes these operations across the network in a distributed fashion, a centralized fashion, or something between the two - whichever is most efficient for the target deployment. We call this approach deployment-specific code decomposition (DSCD). the MacroLab programming framework will facilitate the easy development of applications for CPSs by domain experts such as scientists and engineers with almost no additional overhead to the nodes in terms of message cost, power consumption, memory footprint, or CPU cycles over TinyOS programs.
As the number of wireless devices increase, the frequency spectrum becomes further congested. Deployments of wireless devices in harsh radio environments (i.e. an industrial plant) also motivates the study of alternat...
详细信息
ISBN:
(纸本)9781595939906
As the number of wireless devices increase, the frequency spectrum becomes further congested. Deployments of wireless devices in harsh radio environments (i.e. an industrial plant) also motivates the study of alternate communication protocols that offer enough diversity to overcome interference. this work explores the use of frequency diversity to address this problem and examines its effectiveness in various environmental settings. We also examine the interplay between frequency agility at the MAC layer and route diversity in the network layer and look to understand the cost-tradeoffs in the diversity of choices offered by each layer.
this poster introduces all application-specific trace log compression mechanism targeted for execution on wireless sensor network nodes. Trace logs capture sequences of significant events executed oil a node to provid...
详细信息
ISBN:
(纸本)9781595939906
this poster introduces all application-specific trace log compression mechanism targeted for execution on wireless sensor network nodes. Trace logs capture sequences of significant events executed oil a node to provide visibility into the system. the application-specific compression mechanism exploits static program control flow knowledge to automate insertion of trace statements that capture trace data in a concise form. Initial evaluation reveals that these compressed trace logs, when generated, consume just over a fifth of the space required by standard trace logging techniques.
the Java programming language has potentially significant advantages for wireless sensor nodes but there is currently no feature-rich, open source virtual machine available. In this paper we present Darjeeling, a syst...
详细信息
ISBN:
(纸本)9781595939906
the Java programming language has potentially significant advantages for wireless sensor nodes but there is currently no feature-rich, open source virtual machine available. In this paper we present Darjeeling, a system comprising offline tools and a memory efficient run-time. the offline post-compiler tool analyzes, links and consolidates Java class files into loadable modules. the runtime implements a modified Java VM that supports multithreading and is designed specifically to operate in constrained execution environments such as wireless sensor network nodes and supports inheritance, threads, garbage collection, and loadable modules. We have demonstrated Java running oil AVR128 and MSP430 microcontrollers at speeds of up to 70,000 JVM instructions per second.
We present a macroprogramming framework called MacroLab that offers a vector programming abstraction similar to Matlab for Cyber-Physical systems (CPSs). the user writes a single program for the entire network using M...
详细信息
ISBN:
(纸本)9781595939906
We present a macroprogramming framework called MacroLab that offers a vector programming abstraction similar to Matlab for Cyber-Physical systems (CPSs). the user writes a single program for the entire network using Matlab-like operations such as addition, find, and max. the framework executes these operations across the network in a distributed fashion, a centralized fashion, or something between the two - whichever is most efficient for the target deployment. We call this approach deployment-specific code decomposition (DSCD). MacroLab programs can be executed on mote-class hardware such as the Telos [24] motes. Our results indicate that MacroLab introduces almost no additional overhead in terms of message cost, power consumption, memory footprint, or CPU cycles over TinyOS programs.
this paper will describe current and ongoing developments of wire less-connected RFID reader systems for evaluation of a passive user localization system. A two-tier architecture of different wireless-connected RFID r...
详细信息
ISBN:
(纸本)9781595939906
this paper will describe current and ongoing developments of wire less-connected RFID reader systems for evaluation of a passive user localization system. A two-tier architecture of different wireless-connected RFID readers will be introduced. On the lower level, i.e. the first tier, several wireless technologies can co-exist using different kinds of communication technologies to connect different RFID readers. these technologies are connected through a fully meshed WiFi/WLAN network to bring them into the IP world. this IP infrastructure is the second tier, built up on IEEE 802.11.
暂无评论