首页 > 最新文献

2007 International Conference on Mobile Data Management最新文献

英文 中文
Implementing OMA DRM Using Web Services: An Approach to Integrate OMA DRM and Web Services on Mobile Units 使用Web服务实现OMA DRM:一种在移动设备上集成OMA DRM和Web服务的方法
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.84
Lukas Grittner, Carsten Kleiner, Daniel Kadenbach
In this paper an approach for using Web services to facilitate non-proprietary digital rights management for mobile devices is described. The approach is based on the open mobile alliance's (OMA) DRM specification which is an interoperable industry quasi-standard in the mobile world. To be able to use the OMA-specific license delivery protocol in a more flexible and portable manner, employing Web services seems to be the best solution. This article describes a possible design for such a system and a prototypical implementation that has been developed as proof- of-concept. Along the way the challenges to be solved to obtain the designed system are explained and solved.
本文描述了一种使用Web服务来促进移动设备非专有数字版权管理的方法。该方法基于开放移动联盟(OMA) DRM规范,该规范是移动世界中可互操作的行业准标准。为了能够以更灵活和可移植的方式使用特定于oma的许可交付协议,采用Web服务似乎是最好的解决方案。本文描述了这样一个系统的一个可能的设计和一个原型实现,它已经被开发为概念验证。在此过程中,要解决的挑战,以获得所设计的系统是解释和解决。
{"title":"Implementing OMA DRM Using Web Services: An Approach to Integrate OMA DRM and Web Services on Mobile Units","authors":"Lukas Grittner, Carsten Kleiner, Daniel Kadenbach","doi":"10.1109/MDM.2007.84","DOIUrl":"https://doi.org/10.1109/MDM.2007.84","url":null,"abstract":"In this paper an approach for using Web services to facilitate non-proprietary digital rights management for mobile devices is described. The approach is based on the open mobile alliance's (OMA) DRM specification which is an interoperable industry quasi-standard in the mobile world. To be able to use the OMA-specific license delivery protocol in a more flexible and portable manner, employing Web services seems to be the best solution. This article describes a possible design for such a system and a prototypical implementation that has been developed as proof- of-concept. Along the way the challenges to be solved to obtain the designed system are explained and solved.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Location-Aware Wireless Sensor Networks 位置感知无线传感器网络
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.44
Wang-Chien Lee, Yingqi Xu
There are many studies in the literature addressing various issues concerning network services of wireless sensor networks. However, these existing studies were mostly targeted at general network services in wireless sensor networks and thus failed to explore their spatial properties. The spatial properties of data, queries, and network dynamics open up new research issues. This seminar introduces research issues and the state-of-the-art solutions in location-aware wireless sensor networks. We pay special attention to the aspects on data management and spatial network services. Geographical routing (Geo-routing) protocols make routing decision based on the location information of sensor nodes, relay nodes and routing destination.
关于无线传感器网络中网络服务的各种问题,文献中有很多研究。然而,这些现有研究大多针对无线传感器网络中的一般网络服务,未能探究其空间特性。数据、查询和网络动态的空间属性开辟了新的研究问题。本讲座介绍位置感知无线传感器网络的研究问题和最新的解决方案。我们特别关注数据管理和空间网络服务方面。地理路由(Geo-routing)协议基于传感器节点、中继节点和路由目的地的位置信息进行路由决策。
{"title":"Location-Aware Wireless Sensor Networks","authors":"Wang-Chien Lee, Yingqi Xu","doi":"10.1109/MDM.2007.44","DOIUrl":"https://doi.org/10.1109/MDM.2007.44","url":null,"abstract":"There are many studies in the literature addressing various issues concerning network services of wireless sensor networks. However, these existing studies were mostly targeted at general network services in wireless sensor networks and thus failed to explore their spatial properties. The spatial properties of data, queries, and network dynamics open up new research issues. This seminar introduces research issues and the state-of-the-art solutions in location-aware wireless sensor networks. We pay special attention to the aspects on data management and spatial network services. Geographical routing (Geo-routing) protocols make routing decision based on the location information of sensor nodes, relay nodes and routing destination.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133778566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of Security and Privacy Issues in RFID-Based Reference Point Systems 基于rfid的参考点系统的安全和隐私问题分析
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.57
Oranat Sangratanachaikul, Leping Huang, S. Konomi, K. Sezaki
In this paper, we analyze security and privacy issues in RFID-based reference point systems, which seamlessly provide high resolution location information so as to enable innovative mobile applications. Our preliminary analysis revealed the significance of the labor cost in deploying RFID reference points; therefore, we carefully analyze several system architecture candidates in terms of deployment cost and security/privacy threats. Based on the analysis, we select a scalable architecture to avoid the bottleneck in deployment cost even though it can be less secure. Finally, we briefly discuss potential solutions for critical security and privacy issues in the selected architecture.
在本文中,我们分析了基于rfid的参考点系统中的安全和隐私问题,该系统可以无缝地提供高分辨率的位置信息,从而实现创新的移动应用。我们的初步分析揭示了人工成本在部署RFID参考点中的重要性;因此,我们从部署成本和安全/隐私威胁的角度仔细分析了几种系统架构候选方案。根据分析,我们选择了一种可伸缩的体系结构来避免部署成本的瓶颈,尽管它可能不太安全。最后,我们简要讨论了所选体系结构中关键安全和隐私问题的潜在解决方案。
{"title":"Analysis of Security and Privacy Issues in RFID-Based Reference Point Systems","authors":"Oranat Sangratanachaikul, Leping Huang, S. Konomi, K. Sezaki","doi":"10.1109/MDM.2007.57","DOIUrl":"https://doi.org/10.1109/MDM.2007.57","url":null,"abstract":"In this paper, we analyze security and privacy issues in RFID-based reference point systems, which seamlessly provide high resolution location information so as to enable innovative mobile applications. Our preliminary analysis revealed the significance of the labor cost in deploying RFID reference points; therefore, we carefully analyze several system architecture candidates in terms of deployment cost and security/privacy threats. Based on the analysis, we select a scalable architecture to avoid the bottleneck in deployment cost even though it can be less secure. Finally, we briefly discuss potential solutions for critical security and privacy issues in the selected architecture.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116214872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Image-Identification Methods for Camera-Equipped Mobile Phones 带摄像头移动电话的图像识别方法
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.79
T. Abe, T. Takada, H. Kawamura, T. Yasuno, N. Sonehara
As the availability and distribution of content through the medium of networks is increasing, the need for information-search technology keyed to content for the purposes of marketing, searching, and managing it is also constantly increasing. This paper proposes methods of extracting image features that can be used as content ID information, and of identifying identical images as keys to these features. As a result of experiments done on images, to which noise and lighting effects had been added, results were obtained that demonstrated better identification using our methods than that with existing ones. Further, the possibility of timely, efficient ID was also demonstrated in low-resource environments using mobile phones equipped with a camera.
随着内容通过网络媒介的可获得性和分发性的增加,对信息搜索技术的需求也在不断增加,这些技术以营销、搜索和管理内容为目的。本文提出了提取图像特征作为内容ID信息的方法,以及识别相同图像作为这些特征的关键的方法。通过对添加了噪声和光照效果的图像进行实验,得到了比现有方法更好的识别结果。此外,还展示了在资源匮乏的环境下使用配备摄像头的手机进行及时、高效身份识别的可能性。
{"title":"Image-Identification Methods for Camera-Equipped Mobile Phones","authors":"T. Abe, T. Takada, H. Kawamura, T. Yasuno, N. Sonehara","doi":"10.1109/MDM.2007.79","DOIUrl":"https://doi.org/10.1109/MDM.2007.79","url":null,"abstract":"As the availability and distribution of content through the medium of networks is increasing, the need for information-search technology keyed to content for the purposes of marketing, searching, and managing it is also constantly increasing. This paper proposes methods of extracting image features that can be used as content ID information, and of identifying identical images as keys to these features. As a result of experiments done on images, to which noise and lighting effects had been added, results were obtained that demonstrated better identification using our methods than that with existing ones. Further, the possibility of timely, efficient ID was also demonstrated in low-resource environments using mobile phones equipped with a camera.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exploiting Our Computational Surroundings for Better Mobile Collaboration 利用我们的计算环境来实现更好的移动协作
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.24
J. Barreto, P. Ferreira, M. Shapiro
Mobile collaborative environments, being naturally loosely-coupled, call for optimistic replication solutions in order to attain the requirement of decentralized highly available access to data. However, such connectivity assumptions are also a decisive hindrance to the ability of optimistic replication protocols to rapidly guarantee consistency among the set of loosely-coupled replicas. This paper proposes the extension of conventional optimistic replication protocols to exploit the presence of extraneous nodes surrounding the group of replica nodes in an increasingly ubiquitous computational universe. In particular, we show that using such extra nodes as temporary carriers of lightweight consistency meta-data may significantly improve the efficiency of a replicated system; notably, it reduces commitment delay and conflicts, and allows more network-efficient propagation of updates. We support such a statement with experimental results obtained from a simulated environment.
移动协作环境天生是松耦合的,因此需要乐观的复制解决方案,以达到分散的高可用性数据访问的要求。然而,这种连通性假设也是乐观复制协议快速保证松散耦合副本集之间一致性的决定性障碍。本文提出了传统乐观复制协议的扩展,以利用在日益普遍的计算宇宙中围绕复制节点组的外部节点的存在。特别是,我们表明,使用这些额外的节点作为轻量级一致性元数据的临时载体可能会显著提高复制系统的效率;值得注意的是,它减少了提交延迟和冲突,并允许更有效的网络更新传播。我们用从模拟环境中获得的实验结果来支持这种说法。
{"title":"Exploiting Our Computational Surroundings for Better Mobile Collaboration","authors":"J. Barreto, P. Ferreira, M. Shapiro","doi":"10.1109/MDM.2007.24","DOIUrl":"https://doi.org/10.1109/MDM.2007.24","url":null,"abstract":"Mobile collaborative environments, being naturally loosely-coupled, call for optimistic replication solutions in order to attain the requirement of decentralized highly available access to data. However, such connectivity assumptions are also a decisive hindrance to the ability of optimistic replication protocols to rapidly guarantee consistency among the set of loosely-coupled replicas. This paper proposes the extension of conventional optimistic replication protocols to exploit the presence of extraneous nodes surrounding the group of replica nodes in an increasingly ubiquitous computational universe. In particular, we show that using such extra nodes as temporary carriers of lightweight consistency meta-data may significantly improve the efficiency of a replicated system; notably, it reduces commitment delay and conflicts, and allows more network-efficient propagation of updates. We support such a statement with experimental results obtained from a simulated environment.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multi-Resolution Data Management for Opportunistic Networking 机会网络的多分辨率数据管理
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.23
Iacopo Carreras, D. Tacconi, D. Miorandi, I. Chlamtac
In this work, we present a multi-resolution data management scheme for efficiently storing and diffusing information, which is originating from sensors and augmenting mobile applications. The proposed mechanism exploits the discrete wavelet transform properties for providing a location-dependent data management scheme, which alleviates the constraints on the storage resources needed for running context-aware mobile applications. The data management scheme has been implemented and evaluated by means of numerical simulations.
在这项工作中,我们提出了一种多分辨率数据管理方案,用于有效地存储和扩散来自传感器和增强移动应用程序的信息。该机制利用离散小波变换特性提供位置相关的数据管理方案,减轻了运行上下文感知移动应用程序所需的存储资源限制。对数据管理方案进行了实现,并通过数值模拟对其进行了评价。
{"title":"Multi-Resolution Data Management for Opportunistic Networking","authors":"Iacopo Carreras, D. Tacconi, D. Miorandi, I. Chlamtac","doi":"10.1109/MDM.2007.23","DOIUrl":"https://doi.org/10.1109/MDM.2007.23","url":null,"abstract":"In this work, we present a multi-resolution data management scheme for efficiently storing and diffusing information, which is originating from sensors and augmenting mobile applications. The proposed mechanism exploits the discrete wavelet transform properties for providing a location-dependent data management scheme, which alleviates the constraints on the storage resources needed for running context-aware mobile applications. The data management scheme has been implemented and evaluated by means of numerical simulations.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125248339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures 基于超分布式rfid标签基础设施的安全本地化存储
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.49
Marc Langheinrich
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols - whom we meet, or what we say or do - cheap and easy. However, controlling access to this data will become cumbersome if traditional forms of access control are to be used: overly restrictive rules might deny the potential of data sharing, while a lack of control could easily lead to Orwellian surveillance scenarios. This paper presents FragDB, a storage concept based on localized access control, where data storage and retrieval are bound to a specific place, rather than the knowledge of a particular password or certificate. FragDB uses tiny RFID tags embedded in the environment to compute a local key that is used to encrypt and decrypt data in a global storage system. We describe the design and implementation of an initial prototype.
智能环境和可穿戴设备将使数字化多媒体日记和会议协议的存储和随后的共享——我们见了谁,我们说了什么或做了什么——变得既便宜又容易。然而,如果使用传统形式的访问控制,控制对这些数据的访问将变得麻烦:过度限制的规则可能会否认数据共享的潜力,而缺乏控制很容易导致奥威尔式的监视场景。本文介绍了FragDB,这是一种基于本地化访问控制的存储概念,其中数据存储和检索绑定到特定位置,而不是特定密码或证书的知识。FragDB使用嵌入环境中的微小RFID标签来计算本地密钥,用于加密和解密全局存储系统中的数据。我们描述了一个初始原型的设计和实现。
{"title":"FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures","authors":"Marc Langheinrich","doi":"10.1109/MDM.2007.49","DOIUrl":"https://doi.org/10.1109/MDM.2007.49","url":null,"abstract":"Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols - whom we meet, or what we say or do - cheap and easy. However, controlling access to this data will become cumbersome if traditional forms of access control are to be used: overly restrictive rules might deny the potential of data sharing, while a lack of control could easily lead to Orwellian surveillance scenarios. This paper presents FragDB, a storage concept based on localized access control, where data storage and retrieval are bound to a specific place, rather than the knowledge of a particular password or certificate. FragDB uses tiny RFID tags embedded in the environment to compute a local key that is used to encrypt and decrypt data in a global storage system. We describe the design and implementation of an initial prototype.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132280582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protecting Moving Trajectories with Dummies 用假人保护移动轨迹
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.58
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike trajectories, shows that location privacy of mobile users can be preserved. However, by monitoring long-term movement patterns of users, the trajectories of mobile users can still be exposed. We argue that, once the trajectory of a user is identified, locations of the user is exposed. Thus, it's critical to protect the moving trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in a long run. Guided by three parameters in user specified privacy profile, namely, short- term disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. A preliminary performance study shows that our approach is more effective than existing work in protecting moving trajectories of mobile users and their location privacy.
基于假人的匿名化技术保护移动用户的位置隐私已经在文献中提出。通过生成在人类轨迹上移动的假人,表明移动用户的位置隐私可以得到保护。然而,通过监测用户的长期移动模式,移动用户的轨迹仍然可以暴露出来。我们认为,一旦用户的轨迹被识别,用户的位置就会暴露出来。因此,保护移动用户的移动轨迹是保护用户位置隐私的关键。我们提出了两种方案,以产生长期一致的运动模式。该方案以用户指定隐私配置文件中的三个参数为指导,即短期公开、长期公开和距离偏差,推导出假人的运动轨迹。一项初步的性能研究表明,我们的方法在保护移动用户的移动轨迹及其位置隐私方面比现有的工作更有效。
{"title":"Protecting Moving Trajectories with Dummies","authors":"Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee","doi":"10.1109/MDM.2007.58","DOIUrl":"https://doi.org/10.1109/MDM.2007.58","url":null,"abstract":"Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike trajectories, shows that location privacy of mobile users can be preserved. However, by monitoring long-term movement patterns of users, the trajectories of mobile users can still be exposed. We argue that, once the trajectory of a user is identified, locations of the user is exposed. Thus, it's critical to protect the moving trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in a long run. Guided by three parameters in user specified privacy profile, namely, short- term disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. A preliminary performance study shows that our approach is more effective than existing work in protecting moving trajectories of mobile users and their location privacy.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 211
Optimizing Energy-Efficient Query Processing in Wireless Sensor Networks 无线传感器网络中节能查询处理的优化
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.13
R. Rosemark, Wang-Chien Lee, B. Urgaonkar
This paper studies the issues of energy-efficient query optimization for wireless sensor networks. Different from existing query optimization techniques that consider only query plans for extracting data from sensors at individual nodes, our approach takes into account both of the sensing and communication cost in query plans. Central to our study is a cost-based analysis, based on which the energy cost of candidate plans for a given query are estimated to determine a query plan that is likely to consume the least energy for execution. Simulation results show that the query plan chosen in our approach consumes significantly less energy than an approach that optimizes on sensing cost only.
研究了无线传感器网络的节能查询优化问题。现有的查询优化技术只考虑从单个节点的传感器提取数据的查询计划,与之不同的是,我们的方法同时考虑了查询计划中的感知和通信成本。我们研究的核心是基于成本的分析,在此基础上估计给定查询的候选计划的能源成本,以确定执行时可能消耗最少能源的查询计划。仿真结果表明,该方法所选择的查询计划比仅基于感知成本优化的查询计划消耗的能量要少得多。
{"title":"Optimizing Energy-Efficient Query Processing in Wireless Sensor Networks","authors":"R. Rosemark, Wang-Chien Lee, B. Urgaonkar","doi":"10.1109/MDM.2007.13","DOIUrl":"https://doi.org/10.1109/MDM.2007.13","url":null,"abstract":"This paper studies the issues of energy-efficient query optimization for wireless sensor networks. Different from existing query optimization techniques that consider only query plans for extracting data from sensors at individual nodes, our approach takes into account both of the sensing and communication cost in query plans. Central to our study is a cost-based analysis, based on which the energy cost of candidate plans for a given query are estimated to determine a query plan that is likely to consume the least energy for execution. Simulation results show that the query plan chosen in our approach consumes significantly less energy than an approach that optimizes on sensing cost only.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Parallelized Simulated Annealing for Model Updating in Ad-Hoc Wireless Sensing Networks Ad-Hoc无线传感网络模型更新的并行模拟退火
Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.72
A. Zimmerman, J. Lynch
The engineering community has recently begun to adopt wireless sensing technologies for use in many sensing applications. These low-cost sensors provide an optimal setting for dense sensing networks, and can make large amounts of sensor data available. Also, the computational power embedded within each sensing node allows a wireless network to interrogate data within the network and in real-time. In a monitoring situation, these capabilities can be leveraged to detect and locate changes in system properties that could be an early indication of malfunction within a complex physical system. In this paper, a distributed model updating technique is embedded within the computational core of a wireless sensing network. Using a novel distributed implementation of the simulated annealing method, an ad-hoc network of wireless sensing units can determine updated system properties by iteratively matching data derived from an analytical model of the system with collected sensor data. By comparing updated system properties with those obtained in a baseline state, a wireless sensing network can detect and locate changes in the system. Experimental verification of this technique is provided on a network of wireless sensor prototypes using simulated results from a Navy ship-board chilled water system monitored with a wireless sensor network.
工程界最近开始采用无线传感技术用于许多传感应用。这些低成本传感器为密集传感网络提供了最佳设置,并可以提供大量传感器数据。此外,每个传感节点内嵌入的计算能力允许无线网络在网络内实时查询数据。在监视情况下,可以利用这些功能来检测和定位系统属性中的变化,这些变化可能是复杂物理系统中故障的早期指示。本文将分布式模型更新技术嵌入到无线传感网络的计算核心中。利用模拟退火方法的一种新颖的分布式实现,无线传感单元的自组织网络可以通过迭代匹配从系统分析模型中获得的数据与收集的传感器数据来确定更新的系统属性。通过将更新后的系统属性与基线状态下的系统属性进行比较,无线传感网络可以检测和定位系统的变化。该技术在无线传感器原型网络上进行了实验验证,使用了由无线传感器网络监测的海军舰载冷冻水系统的模拟结果。
{"title":"Parallelized Simulated Annealing for Model Updating in Ad-Hoc Wireless Sensing Networks","authors":"A. Zimmerman, J. Lynch","doi":"10.1109/MDM.2007.72","DOIUrl":"https://doi.org/10.1109/MDM.2007.72","url":null,"abstract":"The engineering community has recently begun to adopt wireless sensing technologies for use in many sensing applications. These low-cost sensors provide an optimal setting for dense sensing networks, and can make large amounts of sensor data available. Also, the computational power embedded within each sensing node allows a wireless network to interrogate data within the network and in real-time. In a monitoring situation, these capabilities can be leveraged to detect and locate changes in system properties that could be an early indication of malfunction within a complex physical system. In this paper, a distributed model updating technique is embedded within the computational core of a wireless sensing network. Using a novel distributed implementation of the simulated annealing method, an ad-hoc network of wireless sensing units can determine updated system properties by iteratively matching data derived from an analytical model of the system with collected sensor data. By comparing updated system properties with those obtained in a baseline state, a wireless sensing network can detect and locate changes in the system. Experimental verification of this technique is provided on a network of wireless sensor prototypes using simulated results from a Navy ship-board chilled water system monitored with a wireless sensor network.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128072371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2007 International Conference on Mobile Data Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1