By giving vehicles the ability to propagate warning messages to the other ones, the number and the severity of accidents on our streets could likely be reduced. Safety-related applications based on vehicular ad-hoc ne...
详细信息
By giving vehicles the ability to propagate warning messages to the other ones, the number and the severity of accidents on our streets could likely be reduced. Safety-related applications based on vehicular ad-hoc neworks (VANET) are usually dependent on transmitting a message from source to sink within a given time limit. IEEE proposes the standard 802.11p which is an adaption of the well-known Wireless LAN 802.11a for inter-vehicle communication. While many properties have been improved, 802.11p still comes with a contention-based medium access control, only. This leads to an indeterminism and data-dependencies. One deterministic and fairer alternative compared to contention based medium access mechanism would be Time-Divison Multiple Access (TDMA). As a VANET is typically fully self-organizing, the time slots must be assigned autonomously by the nodes of the distributed system. This, however, leads to drawbacks in the performance of the protoctol which are analyzed in this paper.
The radio channel is a limiting resource in vehicular ad-hoc networks. A lot of possible applications in the field of vehicle-to-vehicle and vehicle-to-infrastructure communication will make use of sending messages to...
详细信息
The radio channel is a limiting resource in vehicular ad-hoc networks. A lot of possible applications in the field of vehicle-to-vehicle and vehicle-to-infrastructure communication will make use of sending messages to destination nodes addressed by geographical coordinates. Beam forming, which is the transmission of a message's signal explicitly into a specific spatial area by exploiting a phase-delayed array of antennas, can be seen as an approach to reduce the overall channel load in vehicular ad-hoc networks. Due to the implementation of today's network simulators, the analysis of the advantages and possible drawbacks of beam forming on vehicular ad-hoc network scenarios is hardly possible. In this paper we show a way in which a simulation framework typically used for research on vehicular ad-hoc networks can be extended by a realistic channel simulation and a physical layer simulation which allows studying the beam forming abilities of a smart antenna system.
The Artificial Hormone System (AHS) is a self organizing system which allocates tasks to processing elements. It works in a distributed way, is able to hold real-time conditions and can run in a mixed-signal chip envi...
详细信息
The Artificial Hormone System (AHS) is a self organizing system which allocates tasks to processing elements. It works in a distributed way, is able to hold real-time conditions and can run in a mixed-signal chip environment significantly increasing system reliability. Yet the hormone mechanisms offer new ways for malicious attacks which can affect the correct functioning of the AHS. Such attacks may cause severe damage if the AHS is used in an embedded (maybe real-time) environment. Therefore, this paper deals with analyzing malicious attacks on the AHS. We present several ways of attacking the AHS and resulting detection and defense strategies. We also evaluate these strategies in the paper and demonstrate that they can help to protect the AHS from attacks.
We present a technique to profile the energy consumption of real Wireless Sensor Network (WSN) applications. The introduced method is highly integrated into the system and allows the developer of WSN algorithms to ana...
详细信息
ISBN:
(纸本)9781457720529
We present a technique to profile the energy consumption of real Wireless Sensor Network (WSN) applications. The introduced method is highly integrated into the system and allows the developer of WSN algorithms to analyze the power consumption almost without any additional effort. It can break the power consumption down to any desired level from function-based or thread-based analysis to the evaluation of functional blocks. The required measuring setup relies on a simple circuit using an instrumentation amplifier and a shunt. Energy profiling uses features of the GNU Compiler Collection and benefits from the multi-threading operating system μkleos written in pure C code. Compared to similar approaches in this field the energy profiler does not require any modifications to device drivers or application code. Due to this easily deployable method it is feasible to examine the demand for energy for every single node in the network.
In service-oriented systems, service-level agreements (SLA) are specified as contracts between service providers and service consumers. SLAs stipulate - among other things - the provided services' performance. A s...
详细信息
The Architecture Analysis and Design Language (AADL) is gaining widespread acceptance in aerospace, automobile and avionics industries for designing dependability-critical systems. The design process of dependable sys...
详细信息
The Architecture Analysis and Design Language (AADL) is gaining widespread acceptance in aerospace, automobile and avionics industries for designing dependability-critical systems. The design process of dependable systems must address both cost and dependability (safety, reliability, availability, maintainability) concerns. This requires translating concepts of the design domain to the dependability analysis domain. We automate such a translation between AADL and the dependability analysis tool HiP-HOPS by using model transformation techniques. A generic primary-standby example system is used to show the mechanics of the transformation and the potential for highlighting problems and assisting design work using this technology.
The initial starting point of each design process usually is given by means of a textual specification provided in a natural language. However, the process of creating an accurate and complete formal representation ha...
详细信息
The initial starting point of each design process usually is given by means of a textual specification provided in a natural language. However, the process of creating an accurate and complete formal representation has always been a bottleneck in the design. Manually generating such a formal description from the specification is expensive, requires significant time, and a large number of well-trained design and verification engineers. Usually, only humans with expert design knowledge are assumed to have the ability to properly interpret the respective specification documents.
Integration of trust in routing mechanisms already prevalent in Wireless Sensor Networks (WSN) has become an interesting research area of late. Several methods exist for the assignment of trust to the nodes present in...
详细信息
Wireless sensor networks and publishing of sensor data on the Internet bear the potential to substantially increase public awareness and involvement in environmental sustainability. Air pollution monitoring in urban a...
Wireless sensor networks and publishing of sensor data on the Internet bear the potential to substantially increase public awareness and involvement in environmental sustainability. Air pollution monitoring in urban areas is a prime example of such an application as common air pollutants have direct effect on the human health. However, bringing the vision of public involvement in environmental monitoring to a reality poses today substantial technical challenges for the communication and information systems infrastructure, to scale up from isolated well controlled systems to an open and scalable infrastructure. In this talk we provide first an overview of the OpenSense project for air pollution monitoring. OpenSense takes a holistic, end-to-end systems perspective. The crucial insight is that in designing open scalable sensing system one has to consider dependencies among many system dimensions both for modelling and control, including sensor behaviour, wireless networks, mobility, environmental models, user needs as well as trust and privacy concerns. In the second part of the talk we will discuss in more detail aspects of sensor data processing relevant to the OpenSense project. We will introduce model-based methods for sensor data cleaning, segmentation and multi-query processing. We will show a framework to extract semantic activity information from trajectory data and finally provide some initial results on studying the tradeoffs between privacy and sensor data accuracy in community sensing settings. Finally we will provide an outlook on some of our next steps we plan to undertake within OpenSense towards realizing a community-based approach for addressing health concerns of urban populations.
In a model-driven service-oriented architecture (SOA), the services are in large parts generated from models. To facilitate monitoring, governance, and self-adaptation the information in these models can be used by se...
详细信息
In a model-driven service-oriented architecture (SOA), the services are in large parts generated from models. To facilitate monitoring, governance, and self-adaptation the information in these models can be used by services that monitor, manage, or adapt the SOA at runtime. If a service for monitoring, management, or adaptation in an SOA is dependent on models, and the metamodel changes, usually the service needs to be manually adapted to work with the new version, recompiled, and redeployed. This manual effort impedes the use of models at runtime. To address this problem, this paper introduces model-aware services that work with models at runtime. These services are supported using a service environment, called Morse. Hiding the complexity of implicit versioning of models from users while respecting the principle of Universally Unique Identifiers (UUIDs), it realizes a novel transparent UUID-based model versioning technique. It uses the model-driven approach to automatically generate and deploy Morse services that are used by the model-aware services to access models in the correct version. In this way, monitoring and adaptation in SOAs can be better supported, and the manual effort to evolve services for monitoring, management, or adaptation, which are based on models at runtime, can be minimized.
暂无评论