The proceedings contain 13 papers. The special focus in this conference is on Mobile Agents. The topics include: Mobile agents and logic programming;empowering mobile software agents;an intrusion detection system for ...
ISBN:
(纸本)3540000852
The proceedings contain 13 papers. The special focus in this conference is on Mobile Agents. The topics include: Mobile agents and logic programming;empowering mobile software agents;an intrusion detection system for aglets;fine-grained interlaced code loading for mobile systems;improving scalability of replicated services in mobile agent systems;toward interoperability of mobile-agent systems;mobile intermediaries supporting information sharing between mobile users;a mobile agent enabled fully distributed mutual exclusion algorithm;using a secure mobile object kernel as operating system on embedded devices to support the dynamic upload of applications;supporting flexible data feeds in dynamic sensor grids through mobile agents and physical mobility and logical mobility in ubiquitous computing environments.
We present a low cost wireless microsensor node architecture for distributed computation and sensing in massively distributed embedded systems. Our design focuses on the development of a versatile, low power device to...
详细信息
We present a low cost wireless microsensor node architecture for distributed computation and sensing in massively distributed embedded systems. Our design focuses on the development of a versatile, low power device to facilitate experimentation and initial deployment of wireless microsensor nodes in deeply embedded systems. This paper provides the details of our architecture and introduces fine-grained node localization as an example application of distributed computation and wireless embedded sensing.
In recent years, large number of cameras have been installed in freeway and road environments. While the use of some of these cameras is being automated through computer vision, few computer vision systems allow for t...
详细信息
In recent years, large number of cameras have been installed in freeway and road environments. While the use of some of these cameras is being automated through computer vision, few computer vision systems allow for true wide-area large scaled automation. This paper describes a distributedcomputing system capable of managing an arbitrarily large sensor network using only common computing and networking platforms. The architecture is capable of handling many common computer vision tasks, as well as the inter-sensor communication necessary for developing new algorithms which employ data from multiple sensors. This system is tested with an algorithm which tracks moving objects through a prototype camera network with non-overlapping fields or view in a college campus environment This algorithm allows the system to maintain the identity of a tracked objects as it leaves and enters the fields of view of individual sensors. Such an algorithm is necessary for applications which require tracking objects over large distances or over long periods of time in an environment without complete sensor coverage.
Localisation and mapping relies on the representation and recognition of features or patterns detected in sensor data. An important aspect is the temporal relationship of observations in sensor data streams. This arti...
详细信息
Localisation and mapping relies on the representation and recognition of features or patterns detected in sensor data. An important aspect is the temporal relationship of observations in sensor data streams. This article proposes a new approach for simultaneous localisation and mapping based on temporal relations in the flow of characteristic events in the sensor data channels. A dynamical system is employed to acquire these correlations between simultaneous and sequential events from different sources, to map causal sequences, while considering time spans, and to recognise previously observed patterns (localisation). While this system is applicable to sensor modalities with different characteristics and timing behaviours, it is especially suitable for distributedcomputing. Mapping and localisation take place simultaneously in an life-long unsupervised distributed online learning process. The dynamical system was implemented as a distributed real-time system with symmetric processes. A real-time clustering network reduces the dimension of raw sensor data. Cluster transitions are used as input for the dynamical mapping system. Results from physical experiments with one sensor modality are presented.
Many distributed manipulation systems are capable of generating planar force fields which act over the entire surface of an object to manipulate it to a stable equilibrium within the field. Passive air flow fields, pr...
详细信息
Many distributed manipulation systems are capable of generating planar force fields which act over the entire surface of an object to manipulate it to a stable equilibrium within the field. Passive air flow fields, previously introduced by the authors generate force fields through the linear superposition of logarithmically varying radial potential fields. The main advantage of these fields Is that they are realizable through very simple actuation. However, they do not lend themselves to analytical prediction of net forces or equilibria. The paper presents an efficient means of numerically computing the net force and moment exerted by such fields on objects composed of multiple simple shapes, as well as efficient means of finding equilibrium points on these fields.
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our netwo...
详细信息
ISBN:
(纸本)0780373715
In computer and network security, standard approaches to intrusion detection and response attempt to detect and prevent individual attacks. However, it is not the attack but rather the attacker against which our networks must be defended. To do this, the information that is being provided by intrusion detection systems (IDS) must be gathered and then divided into its component parts such that the activity of individual attackers is made clear. Our approach to this involves the application of Bayesian methods to data being gathered from distributed IDS. With this we hope to improve the capabilities for early detection of distributed attacks against infrastructure and the detection of the preliminary phases of distributed denial of service attacks.
For a large class of defense problems involving distributed, multisensor, multitarget tracking based on data fusion techniques, there are many factors that can affect the cost-performance tradeoff for the overall syst...
详细信息
ISBN:
(纸本)0972184414
For a large class of defense problems involving distributed, multisensor, multitarget tracking based on data fusion techniques, there are many factors that can affect the cost-performance tradeoff for the overall system. Although the complexity of such problems depends on the overall dimensionality, there is usually sufficient complexity involved that the system design cannot be approached with formal methods. Given this perspective, we have developed an initial version of an analysis and design testbed for large-scale distributed tracking problems that allows the effects of various influencing features to be empirically explored. The initial version of the testbed has been synthesized for a decentralized multiple target tracking system under a distributed multiple sensor environment, with the purpose of studying the effects of tracking algorithms, track fusion algorithms, and topology of internodal connectivity. With the present testbed, we examine the tradeoff between the overall computational load of different large scale distributedsystems and the composite tracking accuracy. Simulation-based results using the testbed will be presented along with the implications for system design.
Measurement and track fusion in decentralised sensor network architectures is investigated. The investigation employs FLAMES/sup TM/, an advanced military scenario generator. This was specifically customised for distr...
详细信息
ISBN:
(纸本)0972184414
Measurement and track fusion in decentralised sensor network architectures is investigated. The investigation employs FLAMES/sup TM/, an advanced military scenario generator. This was specifically customised for distributed data fusion experiments and involves a model of the delays in a realistic communication system. Here the delays were used to modify communication bandwidth and evaluate how this affected the performance of the fusion architectures/algorithms. Under certain scenario conditions, it was found that the decentralised measurement fusion system was severely affected by reduced bandwidth. This is because it does not scale: each node loads its communication buffer with every measurement and consequently some measurements are never transmitted. The decentralised track fusion system is a better performer because it does scale: measurements are fused into tracks prior to transmission and thereby more effective use of bandwidth is made. Moreover, it was found that a partially connected decentralised track fusion system achieved almost optimal fused track performance.
distributed real time systems have recently evolved that are based on commodity computers and networking technologies. In these systems;critical system resources and functionality are distributed over many different c...
详细信息
ISBN:
(纸本)0780370015
distributed real time systems have recently evolved that are based on commodity computers and networking technologies. In these systems;critical system resources and functionality are distributed over many different computers and networks. The operational modes of these systems include the integration of heterogeneous event driven information flows from multiple sensor platforms that dynamically change with the operational scenario. The dynamic and stochastic nature of these systems renders allocating the distributed resources based on a-priori worst case loading and capacity scenarios impossible. This paper first discusses the operational characteristics of these systems that effect the requirements for a messaging based communications system. Appropriate message passing protocols are then discussed. Finally, we conclude with a discussion of the architectural support necessary for efficiently implementing a message passing protocol in a dynamic and stochastic distributed real time system.
Recent advances in miniaturization and low-cost, low-power design have led to active research in large-scale, highly distributedsystems of small, wireless, low-power unattended sensors and actuators. We explore the u...
详细信息
ISBN:
(纸本)0769510779
Recent advances in miniaturization and low-cost, low-power design have led to active research in large-scale, highly distributedsystems of small, wireless, low-power unattended sensors and actuators. We explore the use of Random, Ephemeral TRansaction Identifiers (RETRI) in such systems, and contrast it with the typical design philosophy of using static identifiers in roles such as node addressing or efficient data naming. Instead of using statically assigned identifiers that are guaranteed to be unique, nodes randomly select probabilistically, unique identifiers for each new transaction. We show how this randomized scheme can significantly, improve the system's energy efficiency in contexts where that efficiency is paramount, such as energy-constrained wireless sensor networks. Benefits are realized if the typical data size is small compared to the size of an identifier and the number of transactions seen by an individual node is small compared to the number of nodes that exist in the entire system. Our scheme is designed to scale well: identifier sizes grow with a system's density, not its overall size. We quantify these benefits using an analytic model that predicts our scheme's efficiency. We also describe an implementation as applied to packet fragmentation and an experiment that validates our model.
暂无评论