首页 > 最新文献

2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems最新文献

英文 中文
Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks 传感器网络中不确定事件监测的自适应资源分配
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.72
Nan Hu, T. L. Porta, N. Bartolini
Event monitoring is an important application of sensor networks. Multiple parties, with different surveillance targets, can share the same network, with limited sensing resources, to monitor their events of interest simultaneously. Such a system achieves profit by allocating sensing resources to missions to collect event related information (e.g., Videos, photos, electromagnetic signals). We address the problem of dynamically assigning resources to missions so as to achieve maximum profit with uncertainty in event occurrence. We consider time-varying resource demands and profits, and multiple concurrent surveillance missions. We model each mission as a sequence of monitoring attempts, each being allocated with a certain amount of resources, on a specific set of events that occurs as a Markov process. We propose a Self-Adaptive Resource Allocation algorithm (SARA) to adaptively and efficiently allocate resources according to the results of previous observations. By means of simulations we compare SARA to previous solutions and show SARA's potential in finding higher profit in both static and dynamic scenarios.
事件监测是传感器网络的一个重要应用。具有不同监视目标的多方可以在有限的传感资源下共享同一网络,以同时监视其感兴趣的事件。该系统通过将传感资源分配给任务来收集事件相关信息(如视频、照片、电磁信号),从而实现盈利。研究了在事件发生不确定的情况下,如何将资源动态分配给任务,以实现利润最大化的问题。我们考虑时变的资源需求和利润,以及多个并发的监视任务。我们将每个任务建模为一系列监控尝试,每个尝试都被分配一定数量的资源,并以马尔可夫过程的形式出现一组特定的事件。提出了一种自适应资源分配算法(SARA),可以根据已有的观测结果自适应有效地分配资源。通过模拟,我们将SARA与以前的解决方案进行了比较,并展示了SARA在静态和动态场景下寻找更高利润的潜力。
{"title":"Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks","authors":"Nan Hu, T. L. Porta, N. Bartolini","doi":"10.1109/MASS.2015.72","DOIUrl":"https://doi.org/10.1109/MASS.2015.72","url":null,"abstract":"Event monitoring is an important application of sensor networks. Multiple parties, with different surveillance targets, can share the same network, with limited sensing resources, to monitor their events of interest simultaneously. Such a system achieves profit by allocating sensing resources to missions to collect event related information (e.g., Videos, photos, electromagnetic signals). We address the problem of dynamically assigning resources to missions so as to achieve maximum profit with uncertainty in event occurrence. We consider time-varying resource demands and profits, and multiple concurrent surveillance missions. We model each mission as a sequence of monitoring attempts, each being allocated with a certain amount of resources, on a specific set of events that occurs as a Markov process. We propose a Self-Adaptive Resource Allocation algorithm (SARA) to adaptively and efficiently allocate resources according to the results of previous observations. By means of simulations we compare SARA to previous solutions and show SARA's potential in finding higher profit in both static and dynamic scenarios.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ferry Enhanced Improved PRoPHET Routing Protocol 渡口增强改进的先知路由协议
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.60
Ying Vang, Arturo Saavedra, Shuhui Yang
In a Delay Tolerant Network (DTN), where nodes are constantly moving and the connection of nodes are intermittent, messages are delivered by replicating to neighbor nodes in hopes of delivering to the destination in a timely manner. This causes a DTN network to have many duplicates even long after the message has reached its destination. In this paper, we develop a new routing protocol that helps alleviate the amount of unnecessary message duplicates by introducing ferry nodes that have the capability of deleting messages that have already been delivered to the destination nodes in the network. With appropriately designed routes, ferries also help with message delivery. We then analyze the protocol through simulations and verify the performance in terms of message delivery delay, average number of copies created within a network, and message delivery ratio. The experiments show that the proposed protocol has improved performance.
在容忍延迟网络(Delay tolerance Network, DTN)中,节点是不断移动的,节点之间的连接是断断续续的,报文通过向相邻节点复制的方式传递,希望能及时到达目的地。这导致DTN网络即使在消息到达目的地很久之后仍有许多副本。在本文中,我们开发了一种新的路由协议,通过引入具有删除已经传递到网络中目标节点的消息的能力的轮转节点,有助于减少不必要的消息重复量。有了适当设计的路线,渡轮也有助于传递信息。然后,我们通过模拟分析协议,并在消息传递延迟、网络中创建的平均副本数量和消息传递比率方面验证性能。实验表明,该协议提高了性能。
{"title":"Ferry Enhanced Improved PRoPHET Routing Protocol","authors":"Ying Vang, Arturo Saavedra, Shuhui Yang","doi":"10.1109/MASS.2015.60","DOIUrl":"https://doi.org/10.1109/MASS.2015.60","url":null,"abstract":"In a Delay Tolerant Network (DTN), where nodes are constantly moving and the connection of nodes are intermittent, messages are delivered by replicating to neighbor nodes in hopes of delivering to the destination in a timely manner. This causes a DTN network to have many duplicates even long after the message has reached its destination. In this paper, we develop a new routing protocol that helps alleviate the amount of unnecessary message duplicates by introducing ferry nodes that have the capability of deleting messages that have already been delivered to the destination nodes in the network. With appropriately designed routes, ferries also help with message delivery. We then analyze the protocol through simulations and verify the performance in terms of message delivery delay, average number of copies created within a network, and message delivery ratio. The experiments show that the proposed protocol has improved performance.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115550830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Long-Term Privacy Profiling through Smartphone Sensors 通过智能手机传感器进行长期隐私分析
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.36
Ningning Cheng, Shaxun Chen, P. Pathak, P. Mohapatra
Smartphones are closely coupled with their users and smartphone sensors can perceive users' private information. The existing studies in this area focus on user activity recognition and short-term context detection. In this paper, we show that smartphone sensors are able to profile users' long-term privacy and more sensitive information. We present the techniques of discovering users' spending level by merely using smartphone sensors. We do not access users' contacts, calendar, or call log, so that the profiling is performed in a non-intrusive manner. This paper is an alert towards the public that the privacy leakage could be far worse than imagination by just carrying smartphones.
智能手机与用户紧密结合,智能手机传感器可以感知用户的私人信息。该领域的现有研究主要集中在用户活动识别和短期上下文检测方面。在本文中,我们展示了智能手机传感器能够描述用户的长期隐私和更敏感的信息。我们介绍了仅通过使用智能手机传感器就能发现用户消费水平的技术。我们不访问用户的联系人、日历或通话记录,以便以非侵入性的方式执行分析。这篇文章是对公众的警告,仅仅携带智能手机,隐私泄露可能比想象的要严重得多。
{"title":"Long-Term Privacy Profiling through Smartphone Sensors","authors":"Ningning Cheng, Shaxun Chen, P. Pathak, P. Mohapatra","doi":"10.1109/MASS.2015.36","DOIUrl":"https://doi.org/10.1109/MASS.2015.36","url":null,"abstract":"Smartphones are closely coupled with their users and smartphone sensors can perceive users' private information. The existing studies in this area focus on user activity recognition and short-term context detection. In this paper, we show that smartphone sensors are able to profile users' long-term privacy and more sensitive information. We present the techniques of discovering users' spending level by merely using smartphone sensors. We do not access users' contacts, calendar, or call log, so that the profiling is performed in a non-intrusive manner. This paper is an alert towards the public that the privacy leakage could be far worse than imagination by just carrying smartphones.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132059938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
KCN: Guaranteed Delivery via K-Cooperative-Nodes in Duty-Cycled Sensor Networks KCN:基于k -协同节点的占空比传感器网络的保证传输
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.29
Min Chen, Xianbin Wang, Junfeng Wang, Di Wu, Yong Li
Performance of multihop cooperative sensor networks depends on relaying candidate selection, optimal relay assignment, and cooperative communication. In this paper, we first propose a novel relaying candidate selection scheme (KCN-selection) to choose k-cooperative nodes (KCN) at each hop based on geographic information, while the certain number of k is initially determined based on an on-demand end-to-end (ETE) reliability in the presence of unreliable communication links. However, the pre-assigned KCN cannot ensure an optimal performance due to wireless channel dynamics. To prolong the lifetime of wireless sensor network (WSN), we schedule some part of KCN to sleep while the on-demand ETE reliability still can be guaranteed with wireless channel variations. A probabilistic ETE reliability model is built to compute optimal duty cycle for KCN in an online manner. Furthermore, a KCN based optimal relay assignment and cooperative data delivery (KCN-delivery) scheme is presented, which can provide fully stateless, energy-efficient sensor-to-sink data delivery at a low communication overhead without the help of prior neighborhood knowledge. Simulation results show that our scheme significantly outperforms existing protocols in wireless sensor networks with highly dynamic wireless channel.
多跳协同传感器网络的性能取决于中继候选选择、中继最优分配和协同通信。在本文中,我们首先提出了一种新的中继候选选择方案(KCN-selection),该方案基于地理信息在每一跳上选择k个合作节点(KCN),而在存在不可靠通信链路的情况下,k的数量最初是基于端到端按需可靠性(ETE)确定的。然而,由于无线信道的动态特性,预先分配的KCN不能保证最优的性能。为了延长无线传感器网络(WSN)的寿命,在无线信道变化的情况下,在保证按需传输可靠性的前提下,将部分KCN安排为休眠状态。为了在线计算KCN的最优占空比,建立了一个概率e - e可靠性模型。在此基础上,提出了一种基于KCN的中继最优分配和协同数据传递(KCN-delivery)方案,该方案可以在不需要先验邻域知识的情况下,以较低的通信开销提供完全无状态、节能的传感器到接收器数据传递。仿真结果表明,该方案在具有高动态信道的无线传感器网络中明显优于现有协议。
{"title":"KCN: Guaranteed Delivery via K-Cooperative-Nodes in Duty-Cycled Sensor Networks","authors":"Min Chen, Xianbin Wang, Junfeng Wang, Di Wu, Yong Li","doi":"10.1109/MASS.2015.29","DOIUrl":"https://doi.org/10.1109/MASS.2015.29","url":null,"abstract":"Performance of multihop cooperative sensor networks depends on relaying candidate selection, optimal relay assignment, and cooperative communication. In this paper, we first propose a novel relaying candidate selection scheme (KCN-selection) to choose k-cooperative nodes (KCN) at each hop based on geographic information, while the certain number of k is initially determined based on an on-demand end-to-end (ETE) reliability in the presence of unreliable communication links. However, the pre-assigned KCN cannot ensure an optimal performance due to wireless channel dynamics. To prolong the lifetime of wireless sensor network (WSN), we schedule some part of KCN to sleep while the on-demand ETE reliability still can be guaranteed with wireless channel variations. A probabilistic ETE reliability model is built to compute optimal duty cycle for KCN in an online manner. Furthermore, a KCN based optimal relay assignment and cooperative data delivery (KCN-delivery) scheme is presented, which can provide fully stateless, energy-efficient sensor-to-sink data delivery at a low communication overhead without the help of prior neighborhood knowledge. Simulation results show that our scheme significantly outperforms existing protocols in wireless sensor networks with highly dynamic wireless channel.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"203 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Location-Based Routing for Opportunistic Networks 机会网络的基于位置的路由
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.37
Gianpiero Costantino, R. Maiti, F. Martinelli, P. Santi
We tackle the problem of locality-aware message spreading in a network composed of smart mobile devices, without resorting to any backbone communication infrastructure. The motivations for our work are two-fold. First, recent smart mobile devices are capable of capturing and storing location information (at a significant granularity) by using, e.g., GPS service and storage capacity available in the devices. Second, recent studies have shown that mobility is positively correlated with the building of new social relationships, which are relatively more likely to occur for people who have visited common places in the past [2], [4], [3]. These two factors together show the importance of building proximity based communication networks, and the need of messages spreading among a targeted set of users in a network. We assume that the participating users move in a large geographic area, and a location inside the area can be uniquely identified by any user, for example, using GPS coordinates. Each user independently builds her mobility profile, called Moby Zone, considering her own past mobility traces. The Moby Zone of a user is the set of her most visited places.
我们解决了由智能移动设备组成的网络中位置感知消息传播的问题,而不依赖于任何骨干通信基础设施。我们工作的动机是双重的。首先,最近的智能移动设备能够通过使用设备中可用的GPS服务和存储容量来捕获和存储位置信息(以重要的粒度)。其次,最近的研究表明,流动性与新社会关系的建立呈正相关,对于过去去过公共场所的人来说,这相对更有可能发生[2],[4],[3]。这两个因素共同表明了建立基于邻近的通信网络的重要性,以及在网络中目标用户之间传播消息的必要性。我们假设参与的用户在一个很大的地理区域内移动,并且该区域内的位置可以被任何用户唯一地识别,例如使用GPS坐标。每个用户根据自己过去的移动轨迹,独立地建立自己的移动配置文件,称为Moby Zone。用户的Moby Zone是她访问次数最多的地方。
{"title":"Location-Based Routing for Opportunistic Networks","authors":"Gianpiero Costantino, R. Maiti, F. Martinelli, P. Santi","doi":"10.1109/MASS.2015.37","DOIUrl":"https://doi.org/10.1109/MASS.2015.37","url":null,"abstract":"We tackle the problem of locality-aware message spreading in a network composed of smart mobile devices, without resorting to any backbone communication infrastructure. The motivations for our work are two-fold. First, recent smart mobile devices are capable of capturing and storing location information (at a significant granularity) by using, e.g., GPS service and storage capacity available in the devices. Second, recent studies have shown that mobility is positively correlated with the building of new social relationships, which are relatively more likely to occur for people who have visited common places in the past [2], [4], [3]. These two factors together show the importance of building proximity based communication networks, and the need of messages spreading among a targeted set of users in a network. We assume that the participating users move in a large geographic area, and a location inside the area can be uniquely identified by any user, for example, using GPS coordinates. Each user independently builds her mobility profile, called Moby Zone, considering her own past mobility traces. The Moby Zone of a user is the set of her most visited places.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134580058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Energy Efficient and Restricted Tour Construction for Mobile Sink in Wireless Sensor Networks 无线传感器网络中移动Sink的节能受限巡回构造
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.41
Aram Rasul, T. Erlebach
Mobile sinks have been used recently, mainly to minimize energy consumption and to resolve some other issues including data collection from disconnected networks, energy depletion from sensor nodes which are close to the sink, etc. In this paper, we address the problem of finding an optimal path for the mobile sink to traverse through the sensing field, to collect a single packet from each sensor and return back to its initial point (starting point) such that the total energy use is minimized and subject to the length constraint L. We refer to this as the minimum energy cost mobile sink restricted tour problem (MMRTP), and show that this problem is NP-hard. Second, we propose two algorithms. The first algorithm is a heuristic one based on the maximum ratio criteria, while the second algorithm is based on the dynamic programming technique. We consider two scenarios for each algorithm. In the first scenario, there is no restriction on the transmission range of the nodes, whereas in the second scenario, the maximum transmission range is Rmax. Finally, we evaluate the performance of our proposed algorithms based on the MATLAB simulations for two different network sizes and show their effectiveness in terms of energy consumption. Moreover, the simulation results show that our second proposed algorithm has significant impact on energy consumption in comparison with the algorithm of [20] for the same parameters (i.e. Lengths and transmission ranges).
最近已经使用了移动接收器,主要是为了最大限度地减少能源消耗,并解决一些其他问题,包括从断开的网络收集数据,靠近接收器的传感器节点的能量消耗等。在本文中,我们解决了寻找移动接收器穿越传感场的最佳路径的问题,从每个传感器收集单个数据包并返回到其初始点(起点),从而使总能量使用最小化并受长度约束l。我们将其称为最小能量成本移动接收器限制巡回问题(MMRTP),并表明该问题是np困难的。其次,我们提出了两种算法。第一种算法是基于最大比率准则的启发式算法,第二种算法是基于动态规划技术的。我们为每个算法考虑两种场景。在第一种场景中,对节点的传输范围没有限制,而在第二种场景中,最大传输范围为Rmax。最后,我们基于两种不同网络规模的MATLAB仿真评估了我们提出的算法的性能,并展示了它们在能耗方面的有效性。此外,仿真结果表明,在相同的参数(即长度和传输范围)下,与[20]的算法相比,我们提出的第二种算法对能耗有显著影响。
{"title":"An Energy Efficient and Restricted Tour Construction for Mobile Sink in Wireless Sensor Networks","authors":"Aram Rasul, T. Erlebach","doi":"10.1109/MASS.2015.41","DOIUrl":"https://doi.org/10.1109/MASS.2015.41","url":null,"abstract":"Mobile sinks have been used recently, mainly to minimize energy consumption and to resolve some other issues including data collection from disconnected networks, energy depletion from sensor nodes which are close to the sink, etc. In this paper, we address the problem of finding an optimal path for the mobile sink to traverse through the sensing field, to collect a single packet from each sensor and return back to its initial point (starting point) such that the total energy use is minimized and subject to the length constraint L. We refer to this as the minimum energy cost mobile sink restricted tour problem (MMRTP), and show that this problem is NP-hard. Second, we propose two algorithms. The first algorithm is a heuristic one based on the maximum ratio criteria, while the second algorithm is based on the dynamic programming technique. We consider two scenarios for each algorithm. In the first scenario, there is no restriction on the transmission range of the nodes, whereas in the second scenario, the maximum transmission range is Rmax. Finally, we evaluate the performance of our proposed algorithms based on the MATLAB simulations for two different network sizes and show their effectiveness in terms of energy consumption. Moreover, the simulation results show that our second proposed algorithm has significant impact on energy consumption in comparison with the algorithm of [20] for the same parameters (i.e. Lengths and transmission ranges).","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114339162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MQCC: Maximum Queue Congestion Control for Multipath Networks with Blockage MQCC:阻塞多路径网络的最大队列拥塞控制
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.13
Scott M. Pudlewski, B. Shrader, L. Herrera, N. M. Jones, A. Worthen
This paper presents a transport layer protocol for multi-path networks with blockage. Using urban SATCOM as an example, we see from data taken from a 2006 measurement campaign that these blockages are generally on the order of 1 -- 5seconds in length and the links are blocked approximately 33%of the time. To compensate for this type of impairment, we have developed a multipath IP overlay routing algorithm, a random linear coding reliability scheme, and a maximum-queue-based (MQCC) congestion control algorithm. MQCC uses average buffer occupancy as a measure of the congestion in a network (as opposed to packet loss or round trip time (RTT)) and updates the transmission rate of each source to avoid network congestion. This allows us to design a congestion control algorithm that is independent of the channel conditions and can be made resilient to channel losses. The reliability scheme uses selective negative acknowledgments (Snacks) to guarantee packet delivery to the destination. We show through simulation that we can approach the optimal benchmark in realistic loss blockage channels.
提出了一种适用于阻塞多径网络的传输层协议。以城市SATCOM为例,我们从2006年测量活动的数据中看到,这些阻塞通常在1 - 5秒的长度上,并且大约33%的时间链路被阻塞。为了弥补这种损害,我们开发了一种多路径IP覆盖路由算法、一种随机线性编码可靠性方案和一种基于最大队列(MQCC)的拥塞控制算法。MQCC使用平均缓冲区占用率作为网络拥塞的度量(而不是数据包丢失或往返时间(RTT)),并更新每个源的传输速率以避免网络拥塞。这使我们能够设计一个独立于信道条件的拥塞控制算法,并且可以对信道损失具有弹性。可靠性方案使用选择性负确认(selective negative acknowledgement,缩写为Snacks)来保证数据包到达目的地。仿真结果表明,在实际的损失阻塞通道中,该方法可以接近最优基准。
{"title":"MQCC: Maximum Queue Congestion Control for Multipath Networks with Blockage","authors":"Scott M. Pudlewski, B. Shrader, L. Herrera, N. M. Jones, A. Worthen","doi":"10.1109/MASS.2015.13","DOIUrl":"https://doi.org/10.1109/MASS.2015.13","url":null,"abstract":"This paper presents a transport layer protocol for multi-path networks with blockage. Using urban SATCOM as an example, we see from data taken from a 2006 measurement campaign that these blockages are generally on the order of 1 -- 5seconds in length and the links are blocked approximately 33%of the time. To compensate for this type of impairment, we have developed a multipath IP overlay routing algorithm, a random linear coding reliability scheme, and a maximum-queue-based (MQCC) congestion control algorithm. MQCC uses average buffer occupancy as a measure of the congestion in a network (as opposed to packet loss or round trip time (RTT)) and updates the transmission rate of each source to avoid network congestion. This allows us to design a congestion control algorithm that is independent of the channel conditions and can be made resilient to channel losses. The reliability scheme uses selective negative acknowledgments (Snacks) to guarantee packet delivery to the destination. We show through simulation that we can approach the optimal benchmark in realistic loss blockage channels.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114342986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study of Hadoop-MapReduce on Google N-Gram Datasets Hadoop-MapReduce在Google N-Gram数据集上的研究
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.105
Satyajit Bhowmick, Suryadip Chakraborty, D. Agrawal
In previous decades, there has been a significant paradigm shift in the domain of computer architecture and processing mechanisms of large-scale data due to the increase of computational power caused by an overwhelming flow of massive amount of data. Hadoop and MapReduce are very powerful concepts which enable the efficient development of scalable and parallel applications required for processing vast amounts of data. In this paper, we investigate the concept of Hadoop and MapReduce and eventually use the programming tool of MapReduce and Apache Pig to solve existing computation problems of very complex and complicated Google Ngrams datasets.
在过去的几十年里,由于大量数据的压倒性流动导致计算能力的提高,在计算机体系结构和大规模数据处理机制领域发生了重大的范式转变。Hadoop和MapReduce是非常强大的概念,它们能够有效地开发处理大量数据所需的可伸缩和并行应用程序。在本文中,我们研究了Hadoop和MapReduce的概念,最终使用MapReduce和Apache Pig的编程工具来解决现有的非常复杂和复杂的Google Ngrams数据集的计算问题。
{"title":"Study of Hadoop-MapReduce on Google N-Gram Datasets","authors":"Satyajit Bhowmick, Suryadip Chakraborty, D. Agrawal","doi":"10.1109/MASS.2015.105","DOIUrl":"https://doi.org/10.1109/MASS.2015.105","url":null,"abstract":"In previous decades, there has been a significant paradigm shift in the domain of computer architecture and processing mechanisms of large-scale data due to the increase of computational power caused by an overwhelming flow of massive amount of data. Hadoop and MapReduce are very powerful concepts which enable the efficient development of scalable and parallel applications required for processing vast amounts of data. In this paper, we investigate the concept of Hadoop and MapReduce and eventually use the programming tool of MapReduce and Apache Pig to solve existing computation problems of very complex and complicated Google Ngrams datasets.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks 数据库驱动的认知无线网络双边效用最大化与位置隐私保护
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.93
Zhikun Zhang, Heng Zhang, Shibo He, Peng Cheng
Database-driven cognitive radio has been well recognized as an efficient way to reduce interference between Primary Users (PUs) and Secondary Users (SUs). In database-driven cognitive radio, PUs and SUs must provide their locations to enable dynamic channel allocation, which raises location privacy breach concern. Previous studies only focus on unilateral privacy preservation, i.e., Only PUs' or SUs' privacy is preserved. In this paper, we propose to protect bilateral location privacy of a PU and an SU. The main challenge lies in how to coordinate the PU and SU to maximize their utility provided that their location privacy is protected. We first introduce a quantitative method to calculate both PU's and SU's location privacy, and then design a novel privacy preserving Utility Maximization protocol (UMax). UMax allows for both PU and SU to adjust their privacy preserving levels and optimize transmit power iteratively to achieve the maximum utility. Through extensive evaluations, we demonstrate that our proposed mechanism can efficiently increase the utility of both PU and SU while preserving their location privacy.
数据库驱动的认知无线电是一种有效的减少主用户(pu)和从用户(SUs)之间干扰的方法。在数据库驱动的认知无线电中,pu和su必须提供其位置以实现动态信道分配,这引起了位置隐私泄露问题。以往的研究只关注单方面的隐私保护,即只保护用户或用户的隐私。在本文中,我们提出保护PU和SU的双边位置隐私,主要挑战在于如何协调PU和SU在保护其位置隐私的前提下最大化其效用。首先引入一种定量计算PU和SU位置隐私的方法,然后设计一种新的保护隐私的效用最大化协议(UMax)。UMax允许PU和SU调整其隐私保护级别并迭代优化传输功率,以实现最大效用。通过广泛的评估,我们证明了我们提出的机制可以有效地提高PU和SU的效用,同时保护它们的位置隐私。
{"title":"Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks","authors":"Zhikun Zhang, Heng Zhang, Shibo He, Peng Cheng","doi":"10.1109/MASS.2015.93","DOIUrl":"https://doi.org/10.1109/MASS.2015.93","url":null,"abstract":"Database-driven cognitive radio has been well recognized as an efficient way to reduce interference between Primary Users (PUs) and Secondary Users (SUs). In database-driven cognitive radio, PUs and SUs must provide their locations to enable dynamic channel allocation, which raises location privacy breach concern. Previous studies only focus on unilateral privacy preservation, i.e., Only PUs' or SUs' privacy is preserved. In this paper, we propose to protect bilateral location privacy of a PU and an SU. The main challenge lies in how to coordinate the PU and SU to maximize their utility provided that their location privacy is protected. We first introduce a quantitative method to calculate both PU's and SU's location privacy, and then design a novel privacy preserving Utility Maximization protocol (UMax). UMax allows for both PU and SU to adjust their privacy preserving levels and optimize transmit power iteratively to achieve the maximum utility. Through extensive evaluations, we demonstrate that our proposed mechanism can efficiently increase the utility of both PU and SU while preserving their location privacy.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125976984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
New Dv-Distance Algorithm Based on Path for Wireless Sensor Network 基于路径的无线传感器网络dv距离新算法
Pub Date : 2015-10-19 DOI: 10.1109/MASS.2015.97
De-gan Zhang, Wen-bin Li, Zhen Ma, Si Liu, J. Song
Wireless location is one of the core technologies of Wireless Sensor Network. In many applications, the accuracy of the location is the precondition of the useful of data information the node collected. Under the premise of cost limits, improving the accuracy of wireless sensor node position has crucial significance. After analyzing reasons of the location weakness of Dv-Distance algorithm due to errors caused by different paths, we propose an estimation algorithm that is based on the distance of different paths between node and the anchor node, thereby balancing the error of different paths to locate the node. This is an improved algorithm which is based on circle focal point positioning.
无线定位是无线传感器网络的核心技术之一。在许多应用中,位置的准确性是节点所采集数据信息有效利用的前提。在成本限制的前提下,提高无线传感器节点定位精度具有至关重要的意义。在分析了不同路径误差导致Dv-Distance算法定位缺陷的原因后,我们提出了一种基于节点与锚节点之间不同路径距离的估计算法,从而平衡不同路径对节点的定位误差。这是一种基于圆焦点定位的改进算法。
{"title":"New Dv-Distance Algorithm Based on Path for Wireless Sensor Network","authors":"De-gan Zhang, Wen-bin Li, Zhen Ma, Si Liu, J. Song","doi":"10.1109/MASS.2015.97","DOIUrl":"https://doi.org/10.1109/MASS.2015.97","url":null,"abstract":"Wireless location is one of the core technologies of Wireless Sensor Network. In many applications, the accuracy of the location is the precondition of the useful of data information the node collected. Under the premise of cost limits, improving the accuracy of wireless sensor node position has crucial significance. After analyzing reasons of the location weakness of Dv-Distance algorithm due to errors caused by different paths, we propose an estimation algorithm that is based on the distance of different paths between node and the anchor node, thereby balancing the error of different paths to locate the node. This is an improved algorithm which is based on circle focal point positioning.","PeriodicalId":436496,"journal":{"name":"2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121711404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1