Results 1 -
9 of
9
Techniques for Improving Opportunistic Sensor Networking Performance
"... Abstract. A number of recently proposed mobile sensor network architectures rely on uncontrolled, or weakly-controlled mobility to achieve sensing coverage over time at low cost, an opportunistic sensor networking approach. However, this reliance on mobility also introduces a number of challenges. I ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
(Show Context)
Abstract. A number of recently proposed mobile sensor network architectures rely on uncontrolled, or weakly-controlled mobility to achieve sensing coverage over time at low cost, an opportunistic sensor networking approach. However, this reliance on mobility also introduces a number of challenges. In this paper, we discuss the challenges inherent in this networking paradigm, and describe two composable techniques, sensor sharing and substitution, to make the system more robust in terms of data fidelity and delay. We present a numerical analysis of these techniques, separately and in combination, based on a simple Markov model of an opportunistic sensor network.
People-Centric Mobile Sensing Networks
, 2008
"... This thesis contributes a new system in support of large scale people-centric sensing applications. Over the last decade, wireless sensor networking has developed into ar-guably the most active area in networking research. The state of the art largely follows an application-specific philosophy, wher ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
This thesis contributes a new system in support of large scale people-centric sensing applications. Over the last decade, wireless sensor networking has developed into ar-guably the most active area in networking research. The state of the art largely follows an application-specific philosophy, where modest numbers of static wirelessly-connected sensor nodes are placed in the target environment in support of a single application. In a properly engineered network, sensor nodes are well-equipped and well-positioned to best provide the connectivity and sensing required by the application. Such networks are ill-suited, however, to the demands of a new class of applications focused on providing sensor information about people, their daily lives, and their environments. These people-centric applications require the ability to both sample very detailed information on the individual scale, and to provide a view of the urban landscape- a very large scale challenge. A new approach is required. Therefore, we propose the novel MetroSense architecture in support of people-centric sensing. While incorporating static infrastructure elements, to get large scale sensing cover-age the architecture primarily makes use of devices with embedded sensors, such as mobile
Improving Dependability of Service Oriented Architectures for Pervasive Computing
, 2003
"... Service Oriented Programming - which combines Distributed Object Computing, Component Based and webbased concepts - has recently emerged as a promising approach to develop dynamic and heterogeneous service provision environments. Such systems are referenced in literature as Service Oriented Architec ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Service Oriented Programming - which combines Distributed Object Computing, Component Based and webbased concepts - has recently emerged as a promising approach to develop dynamic and heterogeneous service provision environments. Such systems are referenced in literature as Service Oriented Architectures. Classic strategies to address dependability in Distributed Object Computing middleware may not be straightforwardly applied to Service Oriented Architectures (SOAs) for pervasive computing, since they operate in quite different contexts compared to traditional DOC middleware. In this paper focus is on dependability issues of SOAs. In particular, we identify dependability requirements of such systems during their life cycle showing how these requirements may change depending on the time phase (discovery, lookup, setup, delivery). We also explore the suitability of Jini technology as an enabling infrastructure to improve availability and reliability, describing both the benefits and drawbacks of a Jini-based solution in the context of a case study application, namely PRINCEPS.
A Novel Resource Dissemination and Discovery Model for Pervasive Environments Using Mobile Agents
"... Abstract. Pervasive computing has been the new buzz word in the distributed computing field. Vast range of heterogeneous resources including different de-vices, computational resources and services world wide are virtually summoned under agreed conditions to form a single computational system image ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract. Pervasive computing has been the new buzz word in the distributed computing field. Vast range of heterogeneous resources including different de-vices, computational resources and services world wide are virtually summoned under agreed conditions to form a single computational system image [1].In this approach a central controller is needed to coordinate the resources which is called the resource management system (RMS).A typical RMS is responsible for three main jobs including matching, scheduling and executing received re-quests based on suitable and available resources. Regarding the matching mod-ule, resource dissemination and discovery forms the main part. In this article we introduce two new approaches to tackle this problem using the mobile agents. The different strategies are dividend into hierarchical and non-hierarchical models. The performed simulations show a better performance for the hierar-chical approach compared with the other model.
Manuscrit auteur, publié dans "UbiMob'04, Nice: France (2004)" Dissémination asynchrone d’information en mode peer-to-peer dans les réseaux ad hoc
, 2008
"... Cet article présente un modèle permettant d’assurer la dissémination asynchrone en mode peer-to-peer d’information dans les réseaux ad hoc. Ce modèle s’appuie sur la mise en œuvre d’un mécanisme de « mémoire collective » auquel chaque station contribue en fonction de ses capacités propres. Cette app ..."
Abstract
- Add to MetaCart
(Show Context)
Cet article présente un modèle permettant d’assurer la dissémination asynchrone en mode peer-to-peer d’information dans les réseaux ad hoc. Ce modèle s’appuie sur la mise en œuvre d’un mécanisme de « mémoire collective » auquel chaque station contribue en fonction de ses capacités propres. Cette approche permet de compenser la volatilité des stations, en permettant notamment des échanges asynchrones entre des stations qui ne sont pas nécessairement présentes simultanément dans le réseau. En outre, elle permet la dissémination de l’information lorsque le réseau est fractionné en îlots, en mettant à profit la mobilité des stations elles-mêmes. Une station mobile peut ainsi faire bénéficier les stations d’un îlot des informations récoltées dans les îlots qu’elle aura traversé précédemment. This paper presents a model for peer-to-peer, asynchronous data dissemination in ad hoc networks. This model relies on a “collective memory ” all stations contribute to implement, according to their capacity. This approach helps tackle station volatility and network fragmentation. Information exchange can be performed asynchronously by stations that are not nessarily active simultaneously in the network. Moreover in a fragmented network a station roaming between network islands can provide its neighbours with information it has gathered while visiting another part of the network. Mots-clés Réseaux ad hoc, mobilité, peer-to-peer, composants logiciels
A Peer-to-Peer Approach to Asynchronous Data Dissemination in Ad Hoc Networks
, 2008
"... Abstract—This paper presents a model for the dissemination of information in highly dynamic ad hoc networks, such as those composed of mobile communicating devices. This model relies on an asynchronous, peer-to-peer propagation scheme. This approach is expected to help do with station volatility, as ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—This paper presents a model for the dissemination of information in highly dynamic ad hoc networks, such as those composed of mobile communicating devices. This model relies on an asynchronous, peer-to-peer propagation scheme. This approach is expected to help do with station volatility, as it allows communication between devices that are never –or only rarely – active simultaneously in the network. It is also expected to help transport information in a fragmented network, as a station roaming between network islands can provide its neighbors with information it has gathered previously while visiting another part of the network. I.
Dissmination Asynchrone D'information
"... This paper presents a model for peer-to-peer, asynchronous data dissemination in ad hoc networks. This model relies on a "collective memory" all stations contribute to implement, according to their capacity. This approach helps tackle station volatility and network fragmentation. Informati ..."
Abstract
- Add to MetaCart
This paper presents a model for peer-to-peer, asynchronous data dissemination in ad hoc networks. This model relies on a "collective memory" all stations contribute to implement, according to their capacity. This approach helps tackle station volatility and network fragmentation. Information exchange can be performed asynchronously by stations that are not nessarily active simultaneously in the network. Moreover in a fragmented network a station roaming between network islands can provide its neighbours with information it has gathered while visiting another part of the network.
Service Discovery in Ad Hoc Networks
"... Abstract — Service advertisement and discovery is an important component for ad hoc communications and collaboration in ubiquitous computing environments. However, the nature of ad hoc networks pose additional problems – caused by highly dynamic network topology and nodes ’ limited power sources-com ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract — Service advertisement and discovery is an important component for ad hoc communications and collaboration in ubiquitous computing environments. However, the nature of ad hoc networks pose additional problems – caused by highly dynamic network topology and nodes ’ limited power sources-compared to wireless networks with infrastructure, even if the infrastructure is just services that stay continuously available most of the time, like a network printer. Service discovery protocols have been designed specifically for ad hoc networks, e.g. JESA, DEAPspace, and Konark, but they also fail to solve all the problems. Index Terms—ad hoc networks, service discovery, ubiquitous computing I.
LIBRARIES Activity Recognition with End-User Sensor Installation in the Home
"... During the past several years, researchers have demonstrated that when new wireless sensors are placed in the home environment, data collected from them can be used by software to automatically infer context, such as the activities of daily living. This context-inference can then be exploited in nov ..."
Abstract
- Add to MetaCart
(Show Context)
During the past several years, researchers have demonstrated that when new wireless sensors are placed in the home environment, data collected from them can be used by software to automatically infer context, such as the activities of daily living. This context-inference can then be exploited in novel applications for healthcare, communication, education, and entertainment. Prior work on automatic context-inference has cleared the way to a reduction in costs associated with manufacturing the sensor technologies and computing resources required by these systems. However, this prior work does not specifically address another major expense of wide-scale deployment of the proposed systems: the expense of expert installation of the sensor devices. To date, most of the context-detection algorithms proposed assume that an expert carefully installs the home sensors and that an expert is involved in acquiring the necessary training examples. End-user sensor installation may offer several advantages over professional sensor installations: 1.) It may greatly reduces the high cost of time required for an expert installation, especially if large numbers of sensors are required for an application, 2.) The