Recent generations of high-density and high-speed FPGAs provide a sufficient capacity for implementing complete configurable systems on a chip (CSoCs). Hybrid CPUs that combine standard CPU cores with reconfigurable c...
详细信息
A surveillance system is a sort of wireless sensor network to monitor targets, where a scheduling is required for monitoring period of each sensor in order to control the power consumption of sensors. In this network,...
详细信息
A method for optimizing the schedule and allocation of uniform algorithms onto processor arrays is derived. The main results described in the following paper are: (1) single (integer) linear programs are given for the...
A method for optimizing the schedule and allocation of uniform algorithms onto processor arrays is derived. The main results described in the following paper are: (1) single (integer) linear programs are given for the optimal schedule of regular algorithms with and without resource constraints, (2) the class of algorithms is extended by allowing certain non-convex index domains, (3) efficient branch and bound techniques are used such that problems of relevant size can be solved. Moreover, additional constraints such as cache memory, bus bandwidths and access conflicts can be considered also. The results are applied to an example of relevant size.
Commercial, coin-sized iButton temperature logger devices are well-suited for densely instrumenting large outdoor areas. An efficient workflow for deploying and maintaining those devices is necessary when striving to ...
详细信息
ISBN:
(纸本)9781450303446
Commercial, coin-sized iButton temperature logger devices are well-suited for densely instrumenting large outdoor areas. An efficient workflow for deploying and maintaining those devices is necessary when striving to deploy and operate several hundreds of data logger devices. Additionally, a sophisticated data management is required for handling the emerging, large amounts of meta and measurement data. Therefore, we developed iAssist, a solution that integrates the handling of iButton data logger devices together with a GPS receiver and a digital camera for gathering accurate location information. iAssist efficiently supports the whole workflow consisting of deploying, relocating and reading tiny sensing systems. iAssist is especially tailored for outdoor operation asking for as little user interaction as possible. Copyright 2010 ACM.
In order to solve the problems in wireless sensor networks, such as node failures and the key node attack, a secure communication model based on secret sharing is presented to improve the communication success rate. I...
详细信息
In order to solve the problems in wireless sensor networks, such as node failures and the key node attack, a secure communication model based on secret sharing is presented to improve the communication success rate. In this model, the network is divided into a series of logical domains, and each domain is composed of the council nodes, the key node, the gateway nodes and ordinary nodes. Using the secret sharing mechanism, the council nodes can protect the master key of each domain, distribute session keys to the nodes in the domain, and periodically monitor the key node to avoid its failure. This method transforms traditional node-based networks into domain-based networks, and the new networks are more stable than the former ones. This new communication model can maintain a steady network despite instability of the network nodes, so it can raise the communication success rate.
A vast majority of communications in a network occurs between pairs of nodes, each such interaction is termed a call. The job of a call control algorithm is to decide which of a set of calls to accept in the network s...
详细信息
Experiments under controlled radio interference are crucial to assess the robustness of low-power wireless protocols. While tools such as Jamlab augment existing sensornet testbeds with realistic interference, it rema...
详细信息
ISBN:
(纸本)9781450331432
Experiments under controlled radio interference are crucial to assess the robustness of low-power wireless protocols. While tools such as Jamlab augment existing sensornet testbeds with realistic interference, it remains an error-prone and time-consuming task to manually select the set of nodes acting as jammers and their individual transmit powers. We present an automated configuration approach based on simulated annealing to overcome this problem. A preliminary evaluation based on two testbeds shows that our approach can find near-optimal solutions within at most a few hours. We believe our approach can facilitate the widespread adoption of controlled interference experiments by the sensornet community. Copyright 2014 ACM.
Wireless Sensor networks (WSNs) are unique embedded computer systems for distributed sensing of a dispersed phenomenon. As WSNs are deployed in remote locations for longterm unattended operation, assurance of correct ...
详细信息
Safety-critical wireless sensor networks, such as a distributed fire- or burglar-alarm system, require that all sensor nodes are up and functional. If an event is triggered on a node, this information must be forwarde...
详细信息
ISBN:
(纸本)9781605582351
Safety-critical wireless sensor networks, such as a distributed fire- or burglar-alarm system, require that all sensor nodes are up and functional. If an event is triggered on a node, this information must be forwarded immediately to the sink, without setting up a route on demand or having to find an alternate route in case of a node or link failure. Therefore, failures of nodes must be known at all times and in case of a detected failure, an immediate notification must be sent to the network operator. There is usually a bounded time limit, e.g., five minutes, for the system to report network or node failure. This paper presents DiMo, a distributed and scalable solution for monitoring the nodes and the topology, along with a redundant topology for increased robustness. Compared to existing solutions, which traditionally assume a continuous data-flow from all nodes in the network, DiMo observes the nodes and the topology locally. DiMo only reports to the sink if a node is potentially failed, which greatly reduces the message overhead and energy consumption. DiMo timely reports failed nodes and minimizes the false-positive rate and energy consumption compared with other prominent solutions for node monitoring. Copyright 2008 ACM.
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly bas...
详细信息
Ant Colony Optimization (AGO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm. It seems that there is no relationship between cryptography and ACO. Actually, some problems in cryptography are due to optimization grouping problems that could be improved using an evolutionary algorithm. Therefore, this paper presents a new method of solving secure curve selection problems using ACO. We improved Complex Multiplication (CM) by combining Evolutionary Cryptography Theory with Weber polynomial solutions. We found that ACO makes full use of valid information generated from factorization and allocates computing resource reasonably. It greatly increases the performance of Weber polynomial solutions. Compared with traditional CM, which can only search one root once time, our new method searches all roots of the polynomial once, and the average time needed to search for one root reduces rapidly. The more roots are searched, the more ECs are obtained.
暂无评论