首页 > 最新文献

2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

英文 中文
Impact of sniffer deployment on indoor localization 嗅探器部署对室内定位的影响
S. Biaz, Yiming Ji, P. Agrawal
The demand for location based applications including network intrusion detection has grown tremendously lately. However, location determination of indoor mobile users is challenging because of the complexities of the indoor radio propagation characteristics. A radio-frequency (RF) based indoor localization system, like ARIADNE, typically operates by first constructing a lookup table mapping the radio signal strength at different known locations in the building, and then a mobile user's location at an arbitrary point in the building is determined by measuring the signal strength at the location in question and searching the corresponding location from the above lookup table. Usually, the mobile user's signal strength is measured by three or more sniffers mechanically deployed inside the building. Obviously, the sniffers position configuration and the number of available sniffers greatly affect the localization performance. This paper presents experimental results that explore the impact of the sniffers deployment on the localization based on the ARIADNE system. The results demonstrate that the triangular deployment and extra available sniffers generally generate better localization performance
最近,对包括网络入侵检测在内的基于位置的应用程序的需求急剧增长。然而,由于室内无线电传播特性的复杂性,室内移动用户的定位具有挑战性。基于射频(RF)的室内定位系统,如ARIADNE,通常通过首先构建一个查找表来映射建筑物中不同已知位置的无线电信号强度,然后通过测量该位置的信号强度并从上述查找表中搜索相应位置来确定移动用户在建筑物中任意点的位置。通常,移动用户的信号强度是由三个或更多的机械部署在建筑物内的嗅探器测量的。显然,嗅探器的位置配置和可用嗅探器的数量对定位性能有很大影响。本文给出了基于ARIADNE系统的嗅探器部署对定位的影响的实验结果。结果表明,三角形部署和额外可用嗅探器通常会产生更好的定位性能
{"title":"Impact of sniffer deployment on indoor localization","authors":"S. Biaz, Yiming Ji, P. Agrawal","doi":"10.1109/COLCOM.2005.1651223","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651223","url":null,"abstract":"The demand for location based applications including network intrusion detection has grown tremendously lately. However, location determination of indoor mobile users is challenging because of the complexities of the indoor radio propagation characteristics. A radio-frequency (RF) based indoor localization system, like ARIADNE, typically operates by first constructing a lookup table mapping the radio signal strength at different known locations in the building, and then a mobile user's location at an arbitrary point in the building is determined by measuring the signal strength at the location in question and searching the corresponding location from the above lookup table. Usually, the mobile user's signal strength is measured by three or more sniffers mechanically deployed inside the building. Obviously, the sniffers position configuration and the number of available sniffers greatly affect the localization performance. This paper presents experimental results that explore the impact of the sniffers deployment on the localization based on the ARIADNE system. The results demonstrate that the triangular deployment and extra available sniffers generally generate better localization performance","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114302788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Integration of collaborative information system in Internet applications using RiverFish architecture 基于RiverFish架构的互联网应用协同信息系统集成
J. E. Ferreira, Osvaldo Kotaro Takai, C. Pu
Business process integration is a serious challenge in collaborative information systems due to the potential interference among them. This paper describes RiverFish architecture to solving integration problems in collaborative information systems that belong to e-commerce environment. DECA application has been used to show a good example of a non-trivial problem of this integration. DECA application controls the processing application involving several government agencies to illustrate a new application called DECA. Each step of DECA processes various levels of check points and stores the results into associated collaborative information systems. This application has served more than 2 million users since 2000, demonstrating the reliability and support for evolution of RiverFish approach
由于业务流程之间存在潜在的干扰,业务流程集成是协作信息系统中的一个严峻挑战。本文描述了解决电子商务环境下协同信息系统集成问题的RiverFish体系结构。用DECA应用程序展示了一个很好的例子,说明了这种集成的一个重要问题。DECA应用程序控制涉及多个政府机构的处理应用程序,以说明称为DECA的新应用程序。DECA的每个步骤处理不同级别的检查点,并将结果存储到相关的协作信息系统中。自2000年以来,该应用程序已为超过200万用户提供服务,证明了RiverFish方法的可靠性和对发展的支持
{"title":"Integration of collaborative information system in Internet applications using RiverFish architecture","authors":"J. E. Ferreira, Osvaldo Kotaro Takai, C. Pu","doi":"10.1109/COLCOM.2005.1651225","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651225","url":null,"abstract":"Business process integration is a serious challenge in collaborative information systems due to the potential interference among them. This paper describes RiverFish architecture to solving integration problems in collaborative information systems that belong to e-commerce environment. DECA application has been used to show a good example of a non-trivial problem of this integration. DECA application controls the processing application involving several government agencies to illustrate a new application called DECA. Each step of DECA processes various levels of check points and stores the results into associated collaborative information systems. This application has served more than 2 million users since 2000, demonstrating the reliability and support for evolution of RiverFish approach","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130501401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Q-Chain: building reputation based trust chains in decentralized peer-to-peer networks Q-Chain:在去中心化的点对点网络中建立基于信誉的信任链
Praveen Kumar, S. Gopalan, V. Sridhar
Peer-to-peer (P2P) networks are increasingly gaining acceptance over the Internet as they provide an infrastructure for content search and exchange between anonymous peers. The open and anonymous nature of P2P networks exposes a number of security vulnerabilities including the problem of finding reliable trustworthy communication partners. In this paper, we propose Q-Chain which provides a trust computation framework by building reputation based trust chains in decentralized P2P networks. Separate Q-Chains are established to evaluate trustworthiness of a peer for the different content types it provides to other peers in the P2P network. A peer's trust rating value is present across several Q-Chains which makes trust computation and management more fault-tolerant in a highly dynamic P2P environment. We implemented Q-Chain using GnutellaSim simulator and the trust computation results obtained are encouraging and more accurate than some of the existing models
点对点(P2P)网络在Internet上越来越被接受,因为它们为匿名对等点之间的内容搜索和交换提供了基础设施。P2P网络的开放性和匿名性暴露了许多安全漏洞,包括寻找可靠可信的通信伙伴的问题。本文提出了Q-Chain,它通过在去中心化P2P网络中构建基于信誉的信任链来提供一个信任计算框架。建立了单独的q链来评估P2P网络中一个对等点提供给其他对等点的不同内容类型的可信度。在高度动态的P2P环境中,一个对等体的信任评级值跨多个q - chain存在,使得信任计算和管理更具容错性。我们使用GnutellaSim模拟器实现了Q-Chain,得到的信任计算结果令人鼓舞,并且比现有的一些模型更准确
{"title":"Q-Chain: building reputation based trust chains in decentralized peer-to-peer networks","authors":"Praveen Kumar, S. Gopalan, V. Sridhar","doi":"10.1109/COLCOM.2005.1651236","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651236","url":null,"abstract":"Peer-to-peer (P2P) networks are increasingly gaining acceptance over the Internet as they provide an infrastructure for content search and exchange between anonymous peers. The open and anonymous nature of P2P networks exposes a number of security vulnerabilities including the problem of finding reliable trustworthy communication partners. In this paper, we propose Q-Chain which provides a trust computation framework by building reputation based trust chains in decentralized P2P networks. Separate Q-Chains are established to evaluate trustworthiness of a peer for the different content types it provides to other peers in the P2P network. A peer's trust rating value is present across several Q-Chains which makes trust computation and management more fault-tolerant in a highly dynamic P2P environment. We implemented Q-Chain using GnutellaSim simulator and the trust computation results obtained are encouraging and more accurate than some of the existing models","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SLACER: randomness to cooperation in peer-to-peer networks SLACER:点对点网络中合作的随机性
David Hales, Stefano Arteconi, Özalp Babaoglu
Peer-to-peer applications can benefit from human friendship networks (e.g., e-mail contacts or instant message buddy lists). However these are not always available. We propose an algorithm, called SLACER that allows peer nodes to create their own friendship networks, through randomized interactions, producing an artificial social network (ASN) where nodes share high trust with their neighbors
点对点应用程序可以受益于人类友谊网络(例如,电子邮件联系人或即时消息好友列表)。然而,这些并不总是可用的。我们提出了一种称为SLACER的算法,它允许对等节点通过随机交互创建自己的友谊网络,产生一个人工社交网络(ASN),节点与邻居共享高度信任
{"title":"SLACER: randomness to cooperation in peer-to-peer networks","authors":"David Hales, Stefano Arteconi, Özalp Babaoglu","doi":"10.1109/COLCOM.2005.1651264","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651264","url":null,"abstract":"Peer-to-peer applications can benefit from human friendship networks (e.g., e-mail contacts or instant message buddy lists). However these are not always available. We propose an algorithm, called SLACER that allows peer nodes to create their own friendship networks, through randomized interactions, producing an artificial social network (ASN) where nodes share high trust with their neighbors","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125568321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Enabling pervasive execution of workflows 支持工作流的普遍执行
Frederic Montagut, R. Molva
As opposed to existing workflow management systems, the distributed execution of workflows in pervasive environments can not rely on centralized control. The dynamic nature of the pervasive environments on the other hand does not allow a permanent assignment of roles to devices. In this paper, we suggest an architecture supporting distributed execution of workflows in pervasive environments based on a fully decentralized control and dynamic assignment of roles to devices. The architecture is defined in terms of data structures associated with the workflow execution plan and dynamic information, a protocol for the exchange of the workflow data among devices and a new function called role discovery dealing with the dynamic assignment of roles to devices. This architecture is applied in the context of Web services using BPEL as workflow description language
与现有的工作流管理系统相反,在普及环境中分布式执行工作流不能依赖于集中控制。另一方面,普及环境的动态特性不允许向设备永久分配角色。在本文中,我们提出了一种架构,该架构基于完全分散的控制和对设备角色的动态分配,支持在普及环境中分布式执行工作流。该体系结构是根据与工作流执行计划和动态信息相关联的数据结构、用于在设备之间交换工作流数据的协议以及处理角色到设备的动态分配的称为角色发现的新功能来定义的。该体系结构应用于使用BPEL作为工作流描述语言的Web服务上下文中
{"title":"Enabling pervasive execution of workflows","authors":"Frederic Montagut, R. Molva","doi":"10.1109/COLCOM.2005.1651227","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651227","url":null,"abstract":"As opposed to existing workflow management systems, the distributed execution of workflows in pervasive environments can not rely on centralized control. The dynamic nature of the pervasive environments on the other hand does not allow a permanent assignment of roles to devices. In this paper, we suggest an architecture supporting distributed execution of workflows in pervasive environments based on a fully decentralized control and dynamic assignment of roles to devices. The architecture is defined in terms of data structures associated with the workflow execution plan and dynamic information, a protocol for the exchange of the workflow data among devices and a new function called role discovery dealing with the dynamic assignment of roles to devices. This architecture is applied in the context of Web services using BPEL as workflow description language","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133478729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
The P2P MultiRouter: a black box approach to run-time adaptivity for P2P DHTs P2P多路由器:实现P2P dht运行时适应性的黑盒方法
James S. K. Newell, Indranil Gupta
Peer-to-peer distributed hash tables (P2P DHTs) are individually built by their designers with specific performance goals in mind. However, no individual DHT can satisfy an application that requires a "best of all worlds" performance, viz., adaptive behavior at run-time. We propose the MultiRouter, a light-weight solution that provides adaptivity to the application using a DHT-independent approach. By merely making run-time choices to select from among multiple DHT protocols using simple cost functions, we show the MultiRouter is able to provide a best-of-all-DHTs run-time performance with respect to object access times and churn-resistance. In addition, the MultiRouter is not limited to any particular set of DHT implementations since the interaction occurs in a black box manner, i.e., through well-defined interfaces. We present microbenchmark and trace-driven experiments to show that if one fixes bandwidth at each node, the MultiRouter outperforms the component DHTs
点对点分布式哈希表(P2P dht)是由设计者根据特定的性能目标单独构建的。然而,没有一个单独的DHT可以满足需要“最好的”性能的应用程序,即在运行时的自适应行为。我们提出了MultiRouter,这是一个轻量级的解决方案,它使用dht独立的方法提供了对应用程序的适应性。仅通过使用简单的成本函数在多个DHT协议中进行运行时选择,我们就可以看到MultiRouter能够在对象访问时间和阻塞阻力方面提供最佳的DHT运行时性能。此外,MultiRouter并不局限于任何特定的DHT实现集,因为交互是以黑盒方式发生的,即通过定义良好的接口。我们提出了微基准测试和跟踪驱动实验,以表明如果在每个节点上固定带宽,MultiRouter的性能优于组件dht
{"title":"The P2P MultiRouter: a black box approach to run-time adaptivity for P2P DHTs","authors":"James S. K. Newell, Indranil Gupta","doi":"10.1109/COLCOM.2005.1651216","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651216","url":null,"abstract":"Peer-to-peer distributed hash tables (P2P DHTs) are individually built by their designers with specific performance goals in mind. However, no individual DHT can satisfy an application that requires a \"best of all worlds\" performance, viz., adaptive behavior at run-time. We propose the MultiRouter, a light-weight solution that provides adaptivity to the application using a DHT-independent approach. By merely making run-time choices to select from among multiple DHT protocols using simple cost functions, we show the MultiRouter is able to provide a best-of-all-DHTs run-time performance with respect to object access times and churn-resistance. In addition, the MultiRouter is not limited to any particular set of DHT implementations since the interaction occurs in a black box manner, i.e., through well-defined interfaces. We present microbenchmark and trace-driven experiments to show that if one fixes bandwidth at each node, the MultiRouter outperforms the component DHTs","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126468096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing both scale and security through a single core probabilistic protocol 通过单一核心概率协议提供规模和安全性
Ramsés Morales, Indranil Gupta
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper proposes the design of the Folklore persistent distributed storage system, which adopts an alternative design methodology. Folklore's design relies on a single core protocol for providing both probabilistic scalability and untraceability, the latter being a special notion of probabilistic security. The core protocol is a biologically inspired model of endemic replication that migrates replicas of files among all hosts in a continuous and proactive manner. The emergent behavior is chaotic, meaning that the exact number and location of all replicas of any file is changing all the time. This makes it difficult for an attacker to target any file. Yet, the protocol is scalable - it consumes constant per-host bandwidth, and the number of replicas per file stays close to a small self-stabilizing value. The self-stabilizing value is reached even if only one replica survives a massive attack. The simplicity of the core protocol allows augmentation with mechanisms that allow data integrity, availability, and updatability. We describe the internals of the Folklore system, present attack analysis, and give experimental results from a prototype that shows high resilience to large-scale attacks
分布式系统通常首先考虑规模和性能,这使得在不影响原始属性的情况下增加安全性变得困难。本文提出了民俗持久化分布式存储系统的设计,该系统采用了一种替代的设计方法。民俗的设计依赖于一个单一的核心协议来提供概率可扩展性和不可追溯性,后者是概率安全的一个特殊概念。核心协议是一种受生物学启发的地方性复制模型,它以连续和主动的方式在所有主机之间迁移文件副本。紧急行为是混乱的,这意味着任何文件的所有副本的确切数量和位置一直在变化。这使得攻击者难以攻击任何文件。然而,该协议是可扩展的——它消耗每台主机恒定的带宽,并且每个文件的副本数量保持在一个小的自稳定值附近。即使在大规模攻击中只有一个副本存活,也会达到自稳定值。核心协议的简单性允许使用允许数据完整性、可用性和可更新性的机制进行增强。我们描述了民间传说系统的内部,提出了攻击分析,并给出了一个原型的实验结果,该原型显示出对大规模攻击的高弹性
{"title":"Providing both scale and security through a single core probabilistic protocol","authors":"Ramsés Morales, Indranil Gupta","doi":"10.1109/COLCOM.2005.1651260","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651260","url":null,"abstract":"Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper proposes the design of the Folklore persistent distributed storage system, which adopts an alternative design methodology. Folklore's design relies on a single core protocol for providing both probabilistic scalability and untraceability, the latter being a special notion of probabilistic security. The core protocol is a biologically inspired model of endemic replication that migrates replicas of files among all hosts in a continuous and proactive manner. The emergent behavior is chaotic, meaning that the exact number and location of all replicas of any file is changing all the time. This makes it difficult for an attacker to target any file. Yet, the protocol is scalable - it consumes constant per-host bandwidth, and the number of replicas per file stays close to a small self-stabilizing value. The self-stabilizing value is reached even if only one replica survives a massive attack. The simplicity of the core protocol allows augmentation with mechanisms that allow data integrity, availability, and updatability. We describe the internals of the Folklore system, present attack analysis, and give experimental results from a prototype that shows high resilience to large-scale attacks","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
StoDiS 2005: 1stWorkshop on Stochasticity in Distributed Systems 2005:分布式系统的随机性研究
{"title":"StoDiS 2005: 1stWorkshop on Stochasticity in Distributed Systems","authors":"","doi":"10.1109/colcom.2005.1651256","DOIUrl":"https://doi.org/10.1109/colcom.2005.1651256","url":null,"abstract":"","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116800244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative sensing using uncontrolled mobile devices 使用不受控制的移动设备的协同传感
S. Madhani, M. Tauil, Zhang Tao
This paper considers how uncontrolled mobiles can be used to collaboratively accomplish sensing tasks. Uncontrolled mobiles are mobile devices whose movements cannot be easily controlled for the purpose of achieving a task. Examples include sensors mounted on mobile vehicles of people to monitor air quality and to detect potential airborne nuclear, biological, or chemical agents. We describe an approach for using uncontrolled mobile devices for collaborative sensing. Considering the potentially large number of mobile sensors that may be required to monitor a large geographical area such as a city, a key issue is how to achieve a proper balance between performance and costs. We present analytical results on the rate of information reporting by uncontrolled mobile sensors needed to cover a given geographical area. We also present results from testbed implementations to demonstrate the feasibility of using existing low-cost software technologies and platforms with existing standard protocols for information reporting and retrieval to support a large system of uncontrolled mobile sensors
本文考虑了如何使用不受控制的移动设备来协同完成传感任务。不受控制的移动设备是移动设备,其运动不容易控制,以实现任务的目的。例如,安装在人们移动车辆上的传感器,用于监测空气质量,探测空气中潜在的核、生物或化学物质。我们描述了一种使用不受控制的移动设备进行协同传感的方法。考虑到可能需要大量的移动传感器来监控一个大的地理区域,比如一个城市,一个关键问题是如何在性能和成本之间取得适当的平衡。我们提出了覆盖给定地理区域所需的不受控制的移动传感器的信息报告率的分析结果。我们还展示了测试平台实现的结果,以证明使用现有的低成本软件技术和平台以及现有的信息报告和检索标准协议来支持大型不受控制的移动传感器系统的可行性
{"title":"Collaborative sensing using uncontrolled mobile devices","authors":"S. Madhani, M. Tauil, Zhang Tao","doi":"10.1109/COLCOM.2005.1651206","DOIUrl":"https://doi.org/10.1109/COLCOM.2005.1651206","url":null,"abstract":"This paper considers how uncontrolled mobiles can be used to collaboratively accomplish sensing tasks. Uncontrolled mobiles are mobile devices whose movements cannot be easily controlled for the purpose of achieving a task. Examples include sensors mounted on mobile vehicles of people to monitor air quality and to detect potential airborne nuclear, biological, or chemical agents. We describe an approach for using uncontrolled mobile devices for collaborative sensing. Considering the potentially large number of mobile sensors that may be required to monitor a large geographical area such as a city, a key issue is how to achieve a proper balance between performance and costs. We present analytical results on the rate of information reporting by uncontrolled mobile sensors needed to cover a given geographical area. We also present results from testbed implementations to demonstrate the feasibility of using existing low-cost software technologies and platforms with existing standard protocols for information reporting and retrieval to support a large system of uncontrolled mobile sensors","PeriodicalId":365186,"journal":{"name":"2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133648862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1