首页 > 最新文献

Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)最新文献

英文 中文
Transmission control scheme for fast RFID object identification 传输控制方案,用于快速RFID对象识别
C. Floerkemeier
There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a common class of RFID multiple access schemes. It builds on earlier work on Bayesian broadcast strategies, but has been adapted to address characteristics of the RFID domain. It has been designed for framed ALOHA and it makes no restrictive assumptions about the distribution of the number of tags in the range of the interrogator. Experimental evidence and simulation results are presented showing that the proposed transmission control scheme performs well in practise when compared to existing approaches
有多种方法可以提高识别大量RFID标签的速度。本文针对一类常见的RFID多址方案,提出了一种传输控制策略。它建立在贝叶斯广播策略的早期工作的基础上,但已经适应了RFID领域的特点。它是为框架ALOHA设计的它没有对审讯者范围内标签数量的分布做出限制性假设。实验证据和仿真结果表明,与现有的传输控制方法相比,所提出的传输控制方案在实践中具有良好的性能
{"title":"Transmission control scheme for fast RFID object identification","authors":"C. Floerkemeier","doi":"10.1109/PERCOMW.2006.136","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.136","url":null,"abstract":"There are a variety of approaches to improve the speed at which large RFID tag populations are being identified. In this paper, we present a transmission control strategy for a common class of RFID multiple access schemes. It builds on earlier work on Bayesian broadcast strategies, but has been adapted to address characteristics of the RFID domain. It has been designed for framed ALOHA and it makes no restrictive assumptions about the distribution of the number of tags in the range of the interrogator. Experimental evidence and simulation results are presented showing that the proposed transmission control scheme performs well in practise when compared to existing approaches","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131794401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 125
Efficient data harvesting in mobile sensor platforms 移动传感器平台的高效数据采集
U. Lee, Eugenio Magistretti, Biao Zhou, M. Gerla, P. Bellavista, Antonio Corradi
In this paper we study the use of vehicles as sensors in a "vehicular sensor network" a new network paradigm that is critical for gathering valuable information in urban environments. In a vehicular sensor network, each vehicle is responsible for sensing one or more events, routing messages to other vehicles or infostations and processing sensed data. There are several critical differences between a vehicular sensor network and a "traditional" wireless sensor network, namely: 1) the vehicular network has high computation power; 2) it must provide high storage space; 3) it must have mobile sensor nodes. In addition, due to the sheer amount of data generated, sensed data is carried by each mobile sensor node. Admittedly, retrieving information from mobile sensor nodes is difficult. In this paper, we first identify a set of design choices for building a vehicular sensor network. From this we propose two storage architectures: content-addressed storage (CAS) and mobility-assist storage (MAS). While CAS utilizes infostations by hashing the key of an event to a specific infostation, MAS opportunistically disseminates events by "relaying" or sending events only to one's neighbors. CAS is appropriate for time-critical applications and MAS for delay-tolerant applications only if infrastructure is not available. In this paper, we propose data harvesting protocols for CAS and MAS: infostation-based and mobility-assist data harvesting protocols respectively
在本文中,我们研究了在“车辆传感器网络”中使用车辆作为传感器,这是一种新的网络范式,对于在城市环境中收集有价值的信息至关重要。在车载传感器网络中,每辆车负责感知一个或多个事件,将消息路由到其他车辆或信息站,并处理感知到的数据。车载传感器网络与“传统”无线传感器网络有几个关键区别,即:1)车载网络具有高计算能力;2)必须提供较高的存储空间;3)必须有移动传感器节点。此外,由于产生的数据量庞大,感测数据由每个移动传感器节点承载。不可否认,从移动传感器节点检索信息是困难的。在本文中,我们首先确定了一组用于构建车辆传感器网络的设计选择。由此,我们提出了两种存储架构:内容寻址存储(CAS)和移动辅助存储(MAS)。CAS通过将事件的密钥散列到特定信息站来利用信息站,而MAS则通过“中继”或仅向邻居发送事件来机会地传播事件。只有在基础设施不可用时,CAS才适用于时间关键型应用程序,而MAS则适用于延迟容忍型应用程序。在本文中,我们提出了CAS和MAS的数据收集协议:基于信息站和移动辅助的数据收集协议
{"title":"Efficient data harvesting in mobile sensor platforms","authors":"U. Lee, Eugenio Magistretti, Biao Zhou, M. Gerla, P. Bellavista, Antonio Corradi","doi":"10.1109/PERCOMW.2006.47","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.47","url":null,"abstract":"In this paper we study the use of vehicles as sensors in a \"vehicular sensor network\" a new network paradigm that is critical for gathering valuable information in urban environments. In a vehicular sensor network, each vehicle is responsible for sensing one or more events, routing messages to other vehicles or infostations and processing sensed data. There are several critical differences between a vehicular sensor network and a \"traditional\" wireless sensor network, namely: 1) the vehicular network has high computation power; 2) it must provide high storage space; 3) it must have mobile sensor nodes. In addition, due to the sheer amount of data generated, sensed data is carried by each mobile sensor node. Admittedly, retrieving information from mobile sensor nodes is difficult. In this paper, we first identify a set of design choices for building a vehicular sensor network. From this we propose two storage architectures: content-addressed storage (CAS) and mobility-assist storage (MAS). While CAS utilizes infostations by hashing the key of an event to a specific infostation, MAS opportunistically disseminates events by \"relaying\" or sending events only to one's neighbors. CAS is appropriate for time-critical applications and MAS for delay-tolerant applications only if infrastructure is not available. In this paper, we propose data harvesting protocols for CAS and MAS: infostation-based and mobility-assist data harvesting protocols respectively","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133386229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Groupanizer: a method to correlate multi-users position with daily moments Groupanizer:一种将多用户位置与每日时刻关联起来的方法
Jean Olivier Caron, Y. Kawahara, H. Morikawa, T. Aoyama
Groupanizer is an extension of groupware and constitutes a development platform to integrate user-centric information for the benefit of groupware applications. User-centric context is used in a collaborative manner to positively link and reinforce group member idiosyncrasies. In order to do so, monitoring of the user's daily context is essential, and thus, one aspect we aim at integrating is user physical position. We believe that common visited places and trajectories constitute one user-centric element that should be used to bias transactions - namely tasks or scheduling - in groupware. Although physical location could by itself be integrated in a model, we believe that motion behaviors are intrinsically linked to moments of daily life. We define those moments using three context elements - a time period, an activity and the current day. This definition leverages position mapping to include its implicit nature. Essentially, the aim is for our model to ideally reflect a group's ecology, namely relations between multiple users given their current and future locations. This paper defines the ontology, mapping locations and moments among users, and the hidden Markov model used to derive location patterns. Finally, it describes the experimentation phase and its results
Groupanizer是群件的扩展,它构成了一个开发平台,用于集成以用户为中心的信息,从而使群件应用程序受益。以用户为中心的上下文以协作的方式使用,以积极地联系和加强小组成员的特质。为了做到这一点,监控用户的日常环境是必不可少的,因此,我们的目标之一是整合用户的物理位置。我们认为,共同访问的地点和轨迹构成了一个以用户为中心的元素,应该用来在群件中偏爱事务(即任务或调度)。虽然物理位置本身可以集成到模型中,但我们认为运动行为与日常生活的时刻有着内在的联系。我们使用三个上下文元素来定义这些时刻——时间段、活动和当前。这个定义利用位置映射来包含它的隐式性质。从本质上讲,我们的目标是让我们的模型理想地反映一个群体的生态,即多个用户之间的关系,给定他们当前和未来的位置。定义了本体,映射了用户之间的位置和时刻,并使用隐马尔可夫模型推导了位置模式。最后介绍了实验阶段和实验结果
{"title":"Groupanizer: a method to correlate multi-users position with daily moments","authors":"Jean Olivier Caron, Y. Kawahara, H. Morikawa, T. Aoyama","doi":"10.1109/PERCOMW.2006.61","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.61","url":null,"abstract":"Groupanizer is an extension of groupware and constitutes a development platform to integrate user-centric information for the benefit of groupware applications. User-centric context is used in a collaborative manner to positively link and reinforce group member idiosyncrasies. In order to do so, monitoring of the user's daily context is essential, and thus, one aspect we aim at integrating is user physical position. We believe that common visited places and trajectories constitute one user-centric element that should be used to bias transactions - namely tasks or scheduling - in groupware. Although physical location could by itself be integrated in a model, we believe that motion behaviors are intrinsically linked to moments of daily life. We define those moments using three context elements - a time period, an activity and the current day. This definition leverages position mapping to include its implicit nature. Essentially, the aim is for our model to ideally reflect a group's ecology, namely relations between multiple users given their current and future locations. This paper defines the ontology, mapping locations and moments among users, and the hidden Markov model used to derive location patterns. Finally, it describes the experimentation phase and its results","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129335348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evidence-based nursing care support enhanced by minimally privacy invasive and pervasive sensing technology 微创侵入和普适传感技术增强循证护理支持
T. Hori, Y. Nishida, S. Murakami
This paper introduces a system for nursing homes, where daily activities of elderly persons are monitored by pervasive sensors. In this system, the sensors detect and save position of an elderly person as his life log and these logs are analyzed for obtaining the evidence of his activities of daily living. The collected evidence enables caregivers to provide effective support for the elderly. In our experiment, the system accumulated position data for a month and a half and we analyzed them to obtain his daily activities models, such as the relation between the time of day and the probability of visiting the lavatory. This paper presents the concept and the overview of the system and explains further some experimental results
本文介绍了一种用于养老院的系统,通过无处不在的传感器监测老年人的日常活动。在该系统中,传感器检测并保存老年人的位置作为其生活日志,并对这些日志进行分析,从而获得老年人日常生活活动的证据。收集到的证据使护理人员能够为老年人提供有效的支持。在我们的实验中,系统积累了一个半月的位置数据,我们对这些数据进行分析,得到了他的日常活动模型,比如一天中的时间与上厕所的概率之间的关系。本文介绍了该系统的基本概念和概述,并对部分实验结果作了进一步说明
{"title":"Evidence-based nursing care support enhanced by minimally privacy invasive and pervasive sensing technology","authors":"T. Hori, Y. Nishida, S. Murakami","doi":"10.1109/PERCOMW.2006.51","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.51","url":null,"abstract":"This paper introduces a system for nursing homes, where daily activities of elderly persons are monitored by pervasive sensors. In this system, the sensors detect and save position of an elderly person as his life log and these logs are analyzed for obtaining the evidence of his activities of daily living. The collected evidence enables caregivers to provide effective support for the elderly. In our experiment, the system accumulated position data for a month and a half and we analyzed them to obtain his daily activities models, such as the relation between the time of day and the probability of visiting the lavatory. This paper presents the concept and the overview of the system and explains further some experimental results","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133978980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Limiting the propagation of localization errors in multi-hop wireless network 限制多跳无线网络中定位误差的传播
S. Basagni, Michele Battelli, Moreno Iachizzi, C. Petrioli, M. Salehi
This paper concerns a study of the process of localizing the nodes of a multi-hop wireless networks, i.e., of having the node computing their coordinates with 'respect to a suitable reference system. We consider networks where the nodes perform measurements of distance and angle of arrival from nodes within their transmission radius. We describe a simple localization protocol, termed range-based centroid (RBC), that starting from a single node (the beacon) with given coordinates localizes all the network nodes with reasonable accuracy. We then propose a new localization protocol that achieves greater accuracy by containing the propagation of the localization error as the process progresses away from the beacon. We quantify the improvements of the proposed protocol, termed MEC2 (for minimum enclosing circle containment) by simulations. In the considered scenarios, MEC2 keeps the localization error within 21% of the nodes' transmission radius, with 20-30% improvements over RBC
本文研究了多跳无线网络中节点的定位过程,即让节点相对于一个合适的参考系计算它们的坐标。我们考虑节点在其传输半径内执行距离和到达角测量的网络。我们描述了一种简单的定位协议,称为基于距离的质心(RBC),它从具有给定坐标的单个节点(信标)开始,以合理的精度定位所有网络节点。然后,我们提出了一种新的定位协议,该协议通过包含随着过程远离信标而传播的定位误差来实现更高的精度。我们通过模拟量化提出的协议的改进,称为MEC2(最小封闭圈遏制)。在考虑的场景中,MEC2将定位误差保持在节点传输半径的21%以内,比RBC提高了20-30%
{"title":"Limiting the propagation of localization errors in multi-hop wireless network","authors":"S. Basagni, Michele Battelli, Moreno Iachizzi, C. Petrioli, M. Salehi","doi":"10.1109/PERCOMW.2006.75","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.75","url":null,"abstract":"This paper concerns a study of the process of localizing the nodes of a multi-hop wireless networks, i.e., of having the node computing their coordinates with 'respect to a suitable reference system. We consider networks where the nodes perform measurements of distance and angle of arrival from nodes within their transmission radius. We describe a simple localization protocol, termed range-based centroid (RBC), that starting from a single node (the beacon) with given coordinates localizes all the network nodes with reasonable accuracy. We then propose a new localization protocol that achieves greater accuracy by containing the propagation of the localization error as the process progresses away from the beacon. We quantify the improvements of the proposed protocol, termed MEC2 (for minimum enclosing circle containment) by simulations. In the considered scenarios, MEC2 keeps the localization error within 21% of the nodes' transmission radius, with 20-30% improvements over RBC","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115707984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Composition trust bindings in pervasive computing service composition 普适计算服务组合中的组合信任绑定
J. Buford, Rakesh Kumar, G. Perkins
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition trust binding is a prescriptive set of rules which defines the combination of allowable components for a particular service or application. Composition trust bindings can be used to protect both the service invocation path as well as the content handling path. The subsidiary relationships addressed by a composition trust binding are typically transparent today, but represent potential security exposure in pervasive computing systems because the subsidiary services or components may have security vulnerabilities. We define the composition trust binding and illustrate its use in the context of rights management and distributed search in personal content publishing. We compare this approach to existing authentication and authorization methods in service composition
在普及计算中,设备或对等点可以使用来自其他设备或对等点的服务来实现或组合服务,并且可以使用来自各种来源的组件。组合信任绑定是一组规定性的规则,它定义了特定服务或应用程序允许的组件组合。组合信任绑定可用于保护服务调用路径和内容处理路径。由组合信任绑定处理的附属关系目前通常是透明的,但在普惠计算系统中代表了潜在的安全隐患,因为附属服务或组件可能存在安全漏洞。我们定义了组合信任绑定,并说明了其在个人内容发布中的权限管理和分布式搜索上下文中的使用。我们将此方法与服务组合中的现有身份验证和授权方法进行比较
{"title":"Composition trust bindings in pervasive computing service composition","authors":"J. Buford, Rakesh Kumar, G. Perkins","doi":"10.1109/PERCOMW.2006.31","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.31","url":null,"abstract":"In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition trust binding is a prescriptive set of rules which defines the combination of allowable components for a particular service or application. Composition trust bindings can be used to protect both the service invocation path as well as the content handling path. The subsidiary relationships addressed by a composition trust binding are typically transparent today, but represent potential security exposure in pervasive computing systems because the subsidiary services or components may have security vulnerabilities. We define the composition trust binding and illustrate its use in the context of rights management and distributed search in personal content publishing. We compare this approach to existing authentication and authorization methods in service composition","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"4 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120975393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Managing pervasive systems using role-based obligation policies 使用基于角色的义务策略管理普及系统
C. Shankar, R. Campbell
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for managing these systems. The dynamism of a pervasive system due to mobility of devices and applications makes policy specification and management a difficult problem. Policies need to be modified when devices and applications are added, removed or migrated across pervasive systems. This causes significant policy management overhead and improper management may lead to policy conflicts, cycles and other undesirable system behaviors. In this paper, we present a role-based approach for managing pervasive systems. Roles group related entities and enable logical separation of entities from policies. Policies and entities are assigned to roles and every entity belonging to a role enforces policies assigned to that role. Policies and entities can be independently modified and this flexibility simplifies policy management. Roles are further organized into hierarchies that enable policy reuse. We present our management framework and middleware based on roles that is being developed for managing our prototype pervasive system
普适系统是包含异构和移动设备、服务和应用程序的复杂分布式系统。基于策略的管理是管理这些系统的有效方法。由于设备和应用程序的移动性,普及系统的动态性使得策略规范和管理成为一个难题。在普及系统中添加、删除或迁移设备和应用程序时,需要修改策略。这将导致显著的策略管理开销,管理不当可能导致策略冲突、循环和其他不希望出现的系统行为。在本文中,我们提出了一种基于角色的方法来管理普适系统。角色对相关实体进行分组,并实现实体与策略的逻辑分离。策略和实体被分配给角色,属于某个角色的每个实体都强制执行分配给该角色的策略。策略和实体可以独立修改,这种灵活性简化了策略管理。角色被进一步组织成层次结构,以支持策略重用。我们展示了基于角色的管理框架和中间件,这些角色是为管理我们的原型普及系统而开发的
{"title":"Managing pervasive systems using role-based obligation policies","authors":"C. Shankar, R. Campbell","doi":"10.1109/PERCOMW.2006.77","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.77","url":null,"abstract":"Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for managing these systems. The dynamism of a pervasive system due to mobility of devices and applications makes policy specification and management a difficult problem. Policies need to be modified when devices and applications are added, removed or migrated across pervasive systems. This causes significant policy management overhead and improper management may lead to policy conflicts, cycles and other undesirable system behaviors. In this paper, we present a role-based approach for managing pervasive systems. Roles group related entities and enable logical separation of entities from policies. Policies and entities are assigned to roles and every entity belonging to a role enforces policies assigned to that role. Policies and entities can be independently modified and this flexibility simplifies policy management. Roles are further organized into hierarchies that enable policy reuse. We present our management framework and middleware based on roles that is being developed for managing our prototype pervasive system","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121235949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Meta service discovery 元服务发现
J. Buford, A. Brown, M. Kolberg
Meta service discovery is used to find and select a service discovery mechanism by context. As multiple service discovery mechanisms (SDM) proliferate across various administrative domains, mobile devices will require a way to locate and select the appropriate mechanism according to the context of the mobile device, such as network domain, location, protocol, and application. We define meta service discovery and explain the motivation for it. We describe our results in building a meta service discovery capability on three existing DHTs and integrated into a new broadcast-oriented SDM. Finally, we analyze the sizing and distribution of DHT entries, including hash distribution of SDM entries according to a geographic population-density scheme
元服务发现用于根据上下文查找和选择服务发现机制。随着多个服务发现机制(SDM)在各种管理域中的激增,移动设备将需要一种方法来根据移动设备的上下文(如网络域、位置、协议和应用程序)定位和选择适当的机制。我们定义了元服务发现并解释了它的动机。我们描述了在三个现有dht上构建元服务发现功能并将其集成到一个新的面向广播的SDM中的结果。最后,我们分析了DHT条目的大小和分布,包括SDM条目根据地理人口密度方案的哈希分布
{"title":"Meta service discovery","authors":"J. Buford, A. Brown, M. Kolberg","doi":"10.1109/PERCOMW.2006.93","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.93","url":null,"abstract":"Meta service discovery is used to find and select a service discovery mechanism by context. As multiple service discovery mechanisms (SDM) proliferate across various administrative domains, mobile devices will require a way to locate and select the appropriate mechanism according to the context of the mobile device, such as network domain, location, protocol, and application. We define meta service discovery and explain the motivation for it. We describe our results in building a meta service discovery capability on three existing DHTs and integrated into a new broadcast-oriented SDM. Finally, we analyze the sizing and distribution of DHT entries, including hash distribution of SDM entries according to a geographic population-density scheme","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128607107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Dominating connectivity and reliability of heterogeneous sensor networks 主导异构传感器网络的连通性和可靠性
K. Berman, Fred S. Annexstein, A. Ranganathan
Consider a placement of heterogeneous, wireless sensors that can vary the transmission range by increasing or decreasing power. The problem of determining an optimal assignment of transmission radii, so that the resulting network is strongly-connected and more generally k-connected has been studied in the literature. In traditional k-connectedness, the network is able resist the failure of up to k - 1 nodes anywhere in the network, and still remain strongly-connected. In this paper we introduce a much stronger k-connectedness property, which we show can be implemented efficiently, and without great increase in the radii of transmission needed to simply achieve connectedness. We say that a network is dominating k-connected if, for any simultaneous failure of nodes throughout the network, with at most k - 1 nodes failures occurring in the out-neighborhood any surviving (up) node, the set U of up nodes forms a dominating set and induces a strongly-connected subdigraph. In this paper, we give a simple characterization of the networks that are dominating k-connected and design an associated efficient algorithm for determining the dominating connectivity, i.e., the maximum k such that the network is dominating k-connected. We also present an efficient algorithm for computing an assignment of transmission radii that results in a dominating k-connected network which minimizes the maximum radius. Furthermore, we show that the maximum radius in this assignment is no more than a multiplicative factor of k greater than the percolation radius rhoperc, i.e., the minimum that the maximum transmission radius can be so that the network remains connected. We show through empirical testing that this multiplicative factor can, in practice, be considerably less than k and only slightly greater than that required to achieve traditional k-connectedness. Finally, we show that for sensors placed on the lattice points of a two-dimensional square, we can achieve dominating k-connectedness with a multiplicative factor of at most radic2[radick + .5] greater than rhoperc
考虑放置可以通过增加或减少功率来改变传输范围的异构无线传感器。确定传输半径的最优分配问题,使所得到的网络是强连接的,更一般地说是k连接的,已经在文献中进行了研究。在传统的k-连通性中,网络能够抵抗网络中任何地方多达k- 1个节点的故障,并且仍然保持强连接。在本文中,我们引入了一个更强的k-连通性,我们证明了它可以有效地实现,并且不需要大幅增加传输半径来简单地实现连通。我们说一个网络是支配k连通的,如果对于整个网络中任意节点同时失效,且在其邻域外任意存活的(up)节点中最多有k- 1个节点失效,则up节点的集合U形成一个支配集并归纳出一个强连接子图。本文给出了支配k连通网络的一个简单表征,并设计了一种有效的算法来确定支配连通性,即支配k连通网络的最大k。我们还提出了一种有效的算法来计算传输半径的分配,从而产生一个使最大半径最小化的k连接网络。进一步,我们证明了该分配中的最大半径不大于渗透半径roperc的乘因子k,即使网络保持连接的最大传输半径的最小值。我们通过实证测试表明,在实践中,这个乘法因子可以大大小于k,仅略大于实现传统k连通性所需的系数。最后,我们证明了对于放置在二维正方形晶格点上的传感器,我们可以实现占主导地位的k-连通性,其乘因子最多为radic2[radick + .5]大于roperc
{"title":"Dominating connectivity and reliability of heterogeneous sensor networks","authors":"K. Berman, Fred S. Annexstein, A. Ranganathan","doi":"10.1109/PERCOMW.2006.44","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.44","url":null,"abstract":"Consider a placement of heterogeneous, wireless sensors that can vary the transmission range by increasing or decreasing power. The problem of determining an optimal assignment of transmission radii, so that the resulting network is strongly-connected and more generally k-connected has been studied in the literature. In traditional k-connectedness, the network is able resist the failure of up to k - 1 nodes anywhere in the network, and still remain strongly-connected. In this paper we introduce a much stronger k-connectedness property, which we show can be implemented efficiently, and without great increase in the radii of transmission needed to simply achieve connectedness. We say that a network is dominating k-connected if, for any simultaneous failure of nodes throughout the network, with at most k - 1 nodes failures occurring in the out-neighborhood any surviving (up) node, the set U of up nodes forms a dominating set and induces a strongly-connected subdigraph. In this paper, we give a simple characterization of the networks that are dominating k-connected and design an associated efficient algorithm for determining the dominating connectivity, i.e., the maximum k such that the network is dominating k-connected. We also present an efficient algorithm for computing an assignment of transmission radii that results in a dominating k-connected network which minimizes the maximum radius. Furthermore, we show that the maximum radius in this assignment is no more than a multiplicative factor of k greater than the percolation radius rhoperc, i.e., the minimum that the maximum transmission radius can be so that the network remains connected. We show through empirical testing that this multiplicative factor can, in practice, be considerably less than k and only slightly greater than that required to achieve traditional k-connectedness. Finally, we show that for sensors placed on the lattice points of a two-dimensional square, we can achieve dominating k-connectedness with a multiplicative factor of at most radic2[radick + .5] greater than rhoperc","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126297571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework for integration of different WLAN technologies at UMTS radio access level 在UMTS无线接入级别集成不同WLAN技术的框架
N. Vulic, S. Groot, I. Niemegeers
Complementary characteristics of the WLAN and WWAN networks have led to the current research efforts towards their integration. The integration can be done at different levels in the network, resulting in interworking architectures of different capabilities and with different degrees of complexity. We concentrate here on the WLAN integration at the UMTS radio access level. Due to diversity of the existing as well emerging higher-capacity WLAN technologies, their gradual integration into the future integrated mobile network, while keeping the operators' investments protected, becomes an important issue. In this paper, we address such an interworking architecture and discuss necessary modifications, aiming at defining a framework that would require as minimal modifications as possible for any new type of the WLAN technology that is to be embedded
WLAN和WWAN网络的互补特性导致了当前对其集成的研究努力。这种集成可以在网络的不同层次上完成,从而产生具有不同功能和不同复杂程度的互连体系结构。我们在这里集中讨论UMTS无线接入级别的WLAN集成。由于现有和新兴的高容量无线局域网技术的多样性,它们逐渐融入未来的综合移动网络,同时保护运营商的投资,成为一个重要的问题。在本文中,我们讨论了这样一个互连体系结构,并讨论了必要的修改,旨在定义一个框架,该框架需要尽可能少的修改,以适应任何新型的嵌入式WLAN技术
{"title":"A framework for integration of different WLAN technologies at UMTS radio access level","authors":"N. Vulic, S. Groot, I. Niemegeers","doi":"10.1109/PERCOMW.2006.7","DOIUrl":"https://doi.org/10.1109/PERCOMW.2006.7","url":null,"abstract":"Complementary characteristics of the WLAN and WWAN networks have led to the current research efforts towards their integration. The integration can be done at different levels in the network, resulting in interworking architectures of different capabilities and with different degrees of complexity. We concentrate here on the WLAN integration at the UMTS radio access level. Due to diversity of the existing as well emerging higher-capacity WLAN technologies, their gradual integration into the future integrated mobile network, while keeping the operators' investments protected, becomes an important issue. In this paper, we address such an interworking architecture and discuss necessary modifications, aiming at defining a framework that would require as minimal modifications as possible for any new type of the WLAN technology that is to be embedded","PeriodicalId":250624,"journal":{"name":"Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1