Intelligent Environments most commonly take a physical form such as homes, offices, hotels, restaurants, shops, that are equipped with advanced networked computer based systems, which enable better or new lifestyles f...
详细信息
Node deployment is a fundamental issue to be solved in Wireless Sensor networks (WSNs). A proper node deployment scheme can reduce the complexity of problems in WSNs as, for example, routing, data fusion, communicatio...
详细信息
ISBN:
(纸本)9781605586144
Node deployment is a fundamental issue to be solved in Wireless Sensor networks (WSNs). A proper node deployment scheme can reduce the complexity of problems in WSNs as, for example, routing, data fusion, communication, etc. Furthermore, it can extend the lifetime of WSNs by minimizing energy consumption. In this paper, we investigate random and deterministic node deployments for large-scale WSNs under the following performance metrics: coverage, energy consumption, and message transfer delay. We consider three competitors: a uniform random, a square grid, and a pattern-based Tri-Hexagon Tiling (THT) node deployment. A simple energy model is formulated to study energy consumption for each deployment strategy. Using basic geometry we propose a novel strategy for calculating the relative frequency of exactly k-covered points, which uses k-coverage maps, for both a square grid and THT. To model and consequently control the worst-case delay of a given WSN we build upon the so-called sensor network calculus (a recent methodology introduced in [7]). Finally, we analyze tradeoffs between these performance metrics for each deployment strategy to show which strategy is preferable under what factors, e.g., the number of nodes. Copyright 2009 ACM.
Wireless Sensor networks (WSN) comprise a large number of sensor nodes that possess scarce energy supplies. To minimize energy consumption and to consequently extend the lifetime of WSNs, we propose a local search tec...
详细信息
ISBN:
(纸本)9781605586144
Wireless Sensor networks (WSN) comprise a large number of sensor nodes that possess scarce energy supplies. To minimize energy consumption and to consequently extend the lifetime of WSNs, we propose a local search technique for sink placement in WSNs. In addition, a proper sink placement plays a vital role in performance-sensitive WSN applications. Since it is not feasible for a sink to use global information, especially for large-scale WSNs, we introduce a self-organized sink placement (SOSP) strategy that combines the advantages of our previous works [7] and [8]. Besides, this paper is a substantial extension of [9]. The goal of this research is to provide a better sink placement strategy with a lower communication overhead. Avoiding the costly design of using the nodes' location information, each sink sets up its own group by communicating to its n-hop distance neighbors. While keeping the locally optimal placement, SOSP exhibits a better solution quality with respect to communication overhead and computational effort than previous solutions. To analyze performance issues, especially the worst-case delay of a given WSN, we use a methodology called sensor network calculus [10]. Copyright 2009 ACM.
Security in wireless networks is a notorious problem, suffering from the following dilemma: On the one hand, wireless medium access puts the attacker into a much better position, on the other hand wireless devices mos...
详细信息
ISBN:
(纸本)9781605586144
Security in wireless networks is a notorious problem, suffering from the following dilemma: On the one hand, wireless medium access puts the attacker into a much better position, on the other hand wireless devices most often have resource deficiencies (processing, memory, energy) which make conventional attack countermeasures based on cryptographic solutions impractical. Though, there have been many approaches towards lightweight security for wireless networks, this dilemma always persists, at least for the low-cost sector, say, for example, sensor networks or RFIDs. So far the overwhelming majority of wireless security approaches followed a conventional security paradigm which abstracts the physical communication as a logical channel. We depart from this paradigm, and try to leverage from the physical characteristics of wireless communications as much as possible, thus bringing us again in equality of arms with the attacker. This we coined the security by wireless principle. In the talk, several incarnations of the security by wireless principle are presented. These are taken from WLAN as well as wireless sensor network scenarios and show for different security goals that security by wireless designs can lead to interesting security solutions. Copyright 2009 ACM.
The ability to ask specific question to the internet using natural language and receiving answers instead of documents is highly desired. Recent advancements in semantic web technologies make it possible to support su...
详细信息
ISBN:
(纸本)9781605581668
The ability to ask specific question to the internet using natural language and receiving answers instead of documents is highly desired. Recent advancements in semantic web technologies make it possible to support such capability with more accuracy compared to existing non-semantic techniques. Using our expertise in ontology building and semantic search and discovery we designed an ontology-driven question answering system that extracts answers from web documents. This system processes natural language queries using a background ontology and finds possible answer(s) to the question from web documents. Copyright 2009 ACM.
In this paper, we propose a novel method to measure the distance between two Gaussian Mixture Models. The proposed distance measure is based on the minimum cost that must paid to transform from one Gaussian Mixture Mo...
详细信息
ISBN:
(纸本)9781605588407
In this paper, we propose a novel method to measure the distance between two Gaussian Mixture Models. The proposed distance measure is based on the minimum cost that must paid to transform from one Gaussian Mixture Model into the other. We parameterize the components of a Gaussian Mixture Model which are Gaussian probability density functions (pdf) as positive definite lower triangular transformation matrices. Then we identify that Gaussian pdfs form a Lie group. Based on Lie group theory, the geodesic length can be used to measure the minimum cost that must paid to transform from one Gaussian pdf into the other. Combining geodesic length with the earth mover's distance, we propose the Lie group earth mover's distance for Gaussian Mixture Models. We test our distance measure in image retrieval. The experimental results indicate that our distance measure is more effective than other measures including the Kullback-Liebler divergence. Copyright 2009 ACM.
In this talk, the theory of network calculus is discussed from the point of view: (1) how powerful it is in applications as well as (2) what fundamental challenges it still faces before it can be considered a similarl...
详细信息
ISBN:
(纸本)9781605581279
In this talk, the theory of network calculus is discussed from the point of view: (1) how powerful it is in applications as well as (2) what fundamental challenges it still faces before it can be considered a similarly mature theory as the well-known classical queueing theory. To this end, we briefly review the basic concepts and mathematical foundations of network calculus, before we then show its applicability for the example of wireless sensor networks. The latter work culminated in the so-called sensor network calculus which is a customized and adequately extended set of methods based on the fundamental network calculus results enriched by the requirements stemming from the specific nature of wireless sensor networks. The lessons learned from this exercise are: on the one hand, network calculus provides already a rich and useful set of methods, but on the other hand, substantial work was still necessary to apply it to the particular context of wireless sensor networks (and to some degree still remains). Hence, in the second part of this talk, we outline some of the fundamental open issues with respect to the foundations of network calculus. We discuss current efforts to address these, although some of them are still completely open and thus constitute good opportunities for future research. Copyright 2008 ACM.
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints, it is ...
详细信息
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints of sens...
详细信息
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints of sensors, it is usually impractical to directly monitor each node or link in wireless sensor network. We consider the problem of inferring the internal link loss characteristics from passive end-to-end measurement in this paper. Specifically, the link loss performance inference during the data aggregation is considered. Under the assumptions that the link losses are mutually independent, we elab.rate a bias corrected link loss Cumulant Generating Function (CGF) algorithm. The simulation results show that the internal link loss CGF can be inferred accurately comparable to the sampled internal link loss CGF. At the end of this paper, we apply the result of internal link loss CGF inference to identify the lossy link in sensor network.
暂无评论