the usage of workflow technology to model and execute business processes is widespread in many enterprises and within the software industry. Withthe growing maturity of sensors, wireless communication, and distribute...
详细信息
ISBN:
(纸本)9781424442362
the usage of workflow technology to model and execute business processes is widespread in many enterprises and within the software industry. Withthe growing maturity of sensors, wireless communication, and distributedcomputing environments, we can enhance this approach to enable smart workflows, which are business processes crossing the boundary to the physical world. Applications for such processes can be found in many application domains, like logistics or in smart factory environments. To realize smart workflows, workflow engines can be coupled with existing context provisioning systems. However, there is a gap between the rather low-level provisioning of context (e.g., sensor data and stock information) and the concepts needed in smart workflows (e.g., "is a spare tool available?"). the main contribution of this paper is to bridge this gap: we show how integration processes can be used to provide context information at different semantical levels for smart workflows.
As a distributedcomputing system, a CNC system needs to be operated reliably, dependably and safely. How to design reliable and dependable software and perform effective verification for CNC systems becomes an import...
详细信息
ISBN:
(纸本)9781424431748
As a distributedcomputing system, a CNC system needs to be operated reliably, dependably and safely. How to design reliable and dependable software and perform effective verification for CNC systems becomes an important research problem. In this paper, we propose a new modeling method called TTM/ATRTTL (Timed Transition Models/All-Time Real-Time Temporal Logics) fir specifying CNC systems. TTM/ATRTTL. provides full supports for specifying hard real-time and feedback that are needed,for modeling CNC systems. We also propose a verification framework with verification rules and theorems and implement it with STeP and SF2STeP. the proposed verification framework can check reliability, dependability and safety of systems specified by our TTM/ATRTTL method. We apply our modeling and verification techniques on an open architecture CNC (OAC) system and conduct comprehensive studies on modeling and verifying a logical controller that is the key part of OAC the results show that our method can effectively model and verify CNC systems and generate CNC software that
An important design challenge in wireless sensor network application development is to provide appropriate middleware service protocols to control the energy consumption according to specific application scenarios. In...
详细信息
the proceedings contain 102 papers. the topics discussed include: computer science as a lens on the sciences;real-time detection of clone attacks in wireless sensor networks;comparing symmetric-key and public-key base...
详细信息
ISBN:
(纸本)9780769531724
the proceedings contain 102 papers. the topics discussed include: computer science as a lens on the sciences;real-time detection of clone attacks in wireless sensor networks;comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access control;securing wireless data networks against eavesdropping using smart antennas;on security vulnerabilities of null data frames in ieee 802.11 based WLANs;identifying frequent items in P2P systems;on the impact of mobile hosts in peer-to-peer data networks;is random scheduling sufficient in P2P video streaming?;circumventing server bottlenecks;indirect large-scale P2P data collection;detecting click fraud in pay-per-click streams of online advertising networks;exploring anti-spam models in large scale VoIP systems;distributed divide-and-conquer techniques for effective DDoS attack defenses;and mobility-assisted spatiotemporal detection in wireless sensor networks.
Genetic algorithms (GAs) are algorithms of exploration based on natural selection and on genetic. they are very flexible tools used to optimise very irregular functions, badly conditioned or complexes to calculate. th...
详细信息
Recent years have seen the emergence of wireless sensor network systemsthat must support the real time query withthe high data rate. sensor top K query plays a critical role for energy efficient of wireless sensor s...
详细信息
ISBN:
(纸本)9781424421077
Recent years have seen the emergence of wireless sensor network systemsthat must support the real time query withthe high data rate. sensor top K query plays a critical role for energy efficient of wireless sensor system. In this paper we present the Filter based Top query monitoring system, which is an efficient and dynamic TOP query processing algorithm for distributedsensor networks. the objective of a top-k query is to find the k highest ranked answers/set to a user defined similarity function. the evaluation of such a query in a sensor network environment is allied withthe transfer of data over an extremely expensive communication medium. Our propose system helps in order to minimize the number of tuples that have to be transferred towards the sink node. Furthermore, this system resolves queries in the network rather than in a centralized fashion, which minimizes even more the consumption of bandwidth and delay increasing the network life time and making the system energy efficient one.
In a wireless sensor network, an adversary may crack legal nodes or deploy malicious nodes to launch various attacks. these nodes are collectively called compromised nodes. In this paper, we define a Data Transmission...
详细信息
Many issues still remain to be addressed in order to achieve acceptable security in Wireless sensor Networks (WSNs). this necessity, together withthe adoption of IPv6 on WSNs being defined at the 6lowpan working grou...
详细信息
ISBN:
(纸本)9781424425747
Many issues still remain to be addressed in order to achieve acceptable security in Wireless sensor Networks (WSNs). this necessity, together withthe adoption of IPv6 on WSNs being defined at the 6lowpan working group of the IETF, motivates our investigation on the feasibility of the application of IPSec on sensor nodes. IPSec is already part of IPv6, which makes it a natural candidate to be directly employed or adapted for WSNs. We discuss results obtained from practical experiments on the usage of cryptographic algorithms typically employed within IPSec in real sensor nodes. We analyze the security and performance tradeoffs involved when employing cryptography measures in WSNs, also in the context of their usage side-by-side with IPv6. the results obtained show that the adoption of a security architecture such as IPSec is viable, and also point towards the successful design and deployment of a security architecture for WSNs.
Wireless networks are vulnerable to sybil attacks, in which a sybil node forges multiple identifications to trick the system and conduct harmful attacks. the traditional approach to address sybil attacks is to employ ...
详细信息
ISBN:
(纸本)9781424425747
Wireless networks are vulnerable to sybil attacks, in which a sybil node forges multiple identifications to trick the system and conduct harmful attacks. the traditional approach to address sybil attacks is to employ cryptographic-related methods. However, conventional security approaches may not always desirable due to their infrastructural overhead. In this paper, we propose to utilize K-means cluster analysis for detecting sybil attacks based on the spatial correlation between the signal strength and physical locations. Our approach requires minimal overhead to wireless devices. We have evaluated our methods through experimentation using both an 802.11 (WiFi) network as well as an 802.15.4 (ZigBee) network in two office buildings. Our results show that the proposed sybil attack detector is highly effective with over 95% detection rates and under 5% false positive rates.
Most existing algorithms for fault-tolerant event region detection only assume that events are spatially correlated, but we argue that events are usually both spatially and temporally correlated. By examining the temp...
详细信息
ISBN:
(纸本)9781424425747
Most existing algorithms for fault-tolerant event region detection only assume that events are spatially correlated, but we argue that events are usually both spatially and temporally correlated. By examining the temporal correlation of sensor measurements, we propose a detection algorithm by applying statistical hypothesis test (SHT). SHT-based algorithm is more accurate in detecting event regions, and is more energy efficient since it avoids measurement exchanges. To improve the capability of fault recognition, we extend SHT-based algorithm by examining both spatial and temporal correlations of sensor measurements. the extended SHT-based algorithm can recognize almost all faults when sensor network is densely deployed.
暂无评论