Analyzing foot pressure is helpful in clinical diagnosis. Possible applications include the diagnosis of back injuries, prevention of diabetic foot ulceration, and adaptation of insoles for orthopedic applications. Co...
详细信息
ISBN:
(纸本)9781450306843
Analyzing foot pressure is helpful in clinical diagnosis. Possible applications include the diagnosis of back injuries, prevention of diabetic foot ulceration, and adaptation of insoles for orthopedic applications. Consequently, several approaches to measure foot pressure distributions exist. However, traditional systems exhibit one common drawback: They are non-mobile or at least obtrusive and therewith influence the measurement. In the case of stationary pressure plates, people are only able to measure the foot pressure distribution in an unnatural context. The few available portable systems feature a lot of cables and large data processing computers, which render them unusable for everyday activities or long term measurements. To address these issues we have implemented Planipes, a mobile and versatile foot pressure measurement platform. It consists of a small sensor module that measures foot pressure distribution in real time and a smartphone application that allows to visualize, record, and analyze the data. Both parts are wirelessly connected through Bluetooth. Our system allows to unobtrusively measure foot pressure in real time during everyday activities, and to give feedback to the user. In contrast to existing systems it allows to measure foot pressure of a person over a longer period and in a natural environment, without influencing or impeding the user. Copyright 2011 ACM.
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generalizing the latest results in network and ...
详细信息
ISBN:
(纸本)9781605583013
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generalizing the latest results in network and security research. Anony- mization is a possible solution in this context;however, it is unclear how the sanitization of data preserves characteris- tics important for traffic analysis. In addition, the privacy- preserving property of state-of-the-art IP address anonymi- zation techniques has come into question by recent attacks that successfully identified a large number of hosts in ano- nymized traces. In this paper, we examine the tradeoff between data utility for anomaly detection and the risk of host identification for IP address truncation. Specifically, we analyze three weeks of unsampled and non-anonymized network traces from a medium-sized backbone network to assess data utility. The risk of de-anonymizing individual IP addresses is formally evaluated, using a metric based on conditional entropy. Our results indicate that truncation effectively prevents host identification but degrades the utility of data for anomaly detection. However, the degree of degradation de- pends on the metric used and whether network-internal or external addresses are considered. Entropy metrics are more resistant to truncation than unique counts and the detec- tion quality of anomalies degrades much faster in internal addresses than in external addresses. In particular, the use- fulness of internal address counts is lost even for truncation of only 4 bits whereas utility of external address entropy is virtually unchanged even for truncation of 20 bits.
In this paper we analyze the complexity of scheduling wireless links in the physical interference model with analog network coding capability. We study two models with different definitions of network coding. In one m...
详细信息
ISBN:
(纸本)9781605581491
In this paper we analyze the complexity of scheduling wireless links in the physical interference model with analog network coding capability. We study two models with different definitions of network coding. In one model, we assume that a receiver is able to decode several signals simultaneously, provided that these signals differ in strength significantly. In the second model, we assume that routers are able to forward the interfering signal of a pair of nodes that wish to exchange a message, and nodes are able to decode the "collided" message by subtracting their own contribution from the interfered signal. For each network coding definition, we construct an instance of the scheduling problem in the geometric SINR model, in which nodes are distributed in the Euclidean plane. We present NP-completeness proofs for both scenarios. Copyright 2008 ACM.
We reconsider the problem of geographic routing in wireless ad hoc networks. We are interested in local, memoryless routing algorithms, i.e. each network node bases its routing decision solely on its local view of the...
详细信息
Communication stacks are composed of distinct layers that, in principle, operate independently and interact through well-defined interfaces. However, resource constraints in sensor networks typically necessitate optim...
详细信息
Gaining an overview of host activities is hard when a host is busily exchanging hundreds or thousands of flows over a network. This makes investigating traffic of a suspicious host a tedious task for a security analys...
详细信息
This paper advocates a strict compositional and hybrid approach for obtaining key (performance) metrics of embedded systems. At its core the developed methodology abstracts system components by either flow-oriented an...
详细信息
ISBN:
(纸本)9781605586274
This paper advocates a strict compositional and hybrid approach for obtaining key (performance) metrics of embedded systems. At its core the developed methodology abstracts system components by either flow-oriented and purely analytic descriptions or by state-based models in the form of timed automata. The interaction among the heterogeneous components is modeled by streams of discrete activity-triggers. In total this yields a hybrid framework for the compositional analysis of embedded systems. It supplements contemporary techniques for the following reasons: (a) state space explosion as intrinsic to formal verification is limited to the level of isolated components;(b) computed performance metrics such as buffer sizes, delays and utilization rates are not overly pessimistic, because coarse-grained purely analytic models are used for components only which conform to the stateless model of computation. For demonstrating the usefulness of the presented ideas we implemented a corresponding tool-chain and investigated the performance of a two-staged computing system, where one stage exhibits state-dependent behavior only coarsely coverable by a purely analytic and stateless component abstraction. Copyright 2009 ACM.
The spread of touch screen based smart phones has been constantly increasing over the last few years. However, there are still many open research questions concerning the basic input properties of these devices. We pe...
详细信息
Deployment of Gigabit Ethernets in metropolitan areas creates new opportunities to save costs by converging data and telephone services. The primary question of our study is whether emerging metropolitan networks can ...
详细信息
We consider wireless sensing systems where an event must be rapidly communicated from its source to a remote host. Due to the non-deterministic nature of event arrivals, multi-hop dissemination using state-of-the-art ...
详细信息
暂无评论