the proceedings contain 73 papers. the topics discussed include: programming storage-centric sensornetworks with squirrel;slotted programming for sensornetworks;consensus-based distributed linear support vector mach...
ISBN:
(纸本)9781605589886
the proceedings contain 73 papers. the topics discussed include: programming storage-centric sensornetworks with squirrel;slotted programming for sensornetworks;consensus-based distributed linear support vector machines;on-line sensing task optimization for shared sensors;robust uncorrelated bit extraction methodologies for wireless sensors;a system for distributed event detection in wireless sensornetworks;ear-phone: an end-to-end participatory urban noise mapping system;diagnostic powertracing for sensor node failure analysis;LAKON: a middle-ground approach to high-frequency data acquisition and in-network processing in sensornetworks;high-resolution, low-power time synchronization an oxymoron no more;KleeNet: discovering insidious interaction bugs in wireless sensornetworks before deployment;run time assurance of application-level requirements in wireless sensornetworks;and Bayesian optimization for sensor set selection.
In many-to-one sensor network routing, neighbor tables are commonly viewed as the centerpiece of the control plane and are typically used to allow nodes to recover from route breakage. Our results, however, indicate t...
详细信息
Recent work on virtual machines for wireless sensornetworks has demonstrated the benefits of using a Java programming paradigm for resource constrained sensornetworks. Results have shown that a virtual machine appro...
详细信息
We demonstrate low-power IP-based sensornetworks by showing a system that interacts withthe sensor network using a RESTful web service interface. the sensor data is displayed with overlaid 3D graphics on top of a li...
详细信息
We describe the first software tool for the verification of TinyOS 2, MSP430 applications at compile-time. Given assertions upon the state of the sensor node, the tool boundedly explores all program executions and ret...
详细信息
Traffic gatekeeping, typically implemented using firewalls, is an essential functionality in today9;s networked computing systems such as desktop PCs. Traffic gatekeeping provides protection against a variety of ov...
详细信息
Given the limited resources and computational power of current embedded sensor devices memory protection is difficult to achieve and generally unavailable. Hence, the buffer overflow that is used by the worm attacks i...
详细信息
Network Congestion is a highly undesirable situation for every type of network. Especially in low powered Wireless sensornetworks (WSNs), congestion can be proven critical for the network9;s proper operation. In c...
详细信息
In this demo, we present SenPro, a profiling tool that profiles the run-time behaviors of a deployed wireless sensor network (WSN). SenPro runs concurrently withthe WSN application and provides information of system ...
详细信息
暂无评论