Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing最新文献

筛选
英文 中文
Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing 第十四届ACM移动自组织网络和计算国际研讨会论文集
A. Chockalingam, D. Manjunath, M. Franceschetti, L. Tassiulas
{"title":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","authors":"A. Chockalingam, D. Manjunath, M. Franceschetti, L. Tassiulas","doi":"10.1145/2491288","DOIUrl":"https://doi.org/10.1145/2491288","url":null,"abstract":"","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128065560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cut-and-sew: a distributed autonomous localization algorithm for 3D surface wireless sensor networks 裁剪缝合:三维表面无线传感器网络的分布式自主定位算法
Yao Zhao, Hongyi Wu, Miao Jin, Yang Yang, Hongyu Zhou, S. Xia
{"title":"Cut-and-sew: a distributed autonomous localization algorithm for 3D surface wireless sensor networks","authors":"Yao Zhao, Hongyi Wu, Miao Jin, Yang Yang, Hongyu Zhou, S. Xia","doi":"10.1145/2491288.2491301","DOIUrl":"https://doi.org/10.1145/2491288.2491301","url":null,"abstract":"Location awareness is imperative for a variety of sensing applications and network operations. Although a diversity of GPS-less and GPS-free solutions have been developed recently for autonomous localization in wireless sensor networks, they primarily target at 2D planar or 3D volumetric settings. There exists unique and fundamental hardness to extend them to 3D surface. The contributions of this work are twofold. First, it proposes a theoretically-proven algorithm for the 3D surface localization problem. Seeing the challenges to localize general 3D surface networks and the solvability of the localization problem on single-value (SV) surface, this work proposes the {em cut-and-sew} algorithm that takes a divide-and-conquer approach by partitioning a general 3D surface network into SV patches, which are localized individually and then merged into a unified coordinates system. The algorithm is optimized by discovering the minimum SV partition, an optimal partition that creates a minimum set of SV patches. Second, it develops practically-viable solutions for real-world sensor network settings where the inputs are often noisy. The proposed algorithm is implemented and evaluated via simulations and experiments in an indoor testbed. The results demonstrate that the proposed cut-and-sew algorithm achieves perfect 100% localization rate and the desired robustness against measurement errors.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Continuous scanning with mobile reader in RFID systems: an experimental study 无线射频识别系统中移动阅读器的连续扫描:实验研究
Lei Xie, Qun A. Li, X. Chen, Sanglu Lu, Daoxu Chen
{"title":"Continuous scanning with mobile reader in RFID systems: an experimental study","authors":"Lei Xie, Qun A. Li, X. Chen, Sanglu Lu, Daoxu Chen","doi":"10.1145/2491288.2491290","DOIUrl":"https://doi.org/10.1145/2491288.2491290","url":null,"abstract":"In this paper, we show the first comprehensive experimental study on mobile RFID reading performance based on a relatively large number of tags. By making a number of observations regarding the tag reading performance, we build a model to depict how various parameters affect the reading performance. Through our model, we have designed very efficient algorithms to maximize the time-efficiency and energy-efficiency by adjusting the reader's power and moving speed. Our experiments show that our algorithms can reduce the total scanning time by 50% and the total energy consumption by 83% compared to the prior solutions.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133830647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Realtime streaming with guaranteed QoS over wireless D2D networks 在无线D2D网络上具有保证QoS的实时流
Navid Abedini, Swetha Sampath, Rajarshi Bhattacharyya, Suman Paul, S. Shakkottai
{"title":"Realtime streaming with guaranteed QoS over wireless D2D networks","authors":"Navid Abedini, Swetha Sampath, Rajarshi Bhattacharyya, Suman Paul, S. Shakkottai","doi":"10.1145/2491288.2491308","DOIUrl":"https://doi.org/10.1145/2491288.2491308","url":null,"abstract":"We consider a group of co-located wireless peer devices that desire to synchronously receive a live content stream. The devices are each equipped with an expensive unicast base-station-to-device (B2D) interface, as well as a broadcast device-to-device (D2D) interface over a shared medium. The stream is divided into blocks, which must be played out soon after their initial creation. If a block is not received within a specific time after its creation, it is rendered useless and dropped. The blocks in turn are divided into random linear coded chunks to facilitate sharing across the devices. We transform the problem into the two questions of (i) deciding which peer should broadcast a chunk on the D2D channel at each time, and (ii) how long B2D transmissions should take place for each block. We analytically develop a provably-minimum-cost algorithm that can ensure that QoS targets can be met for each device. We study its performance via simulations, and present an overview of our implementation on Android phones using the algorithm as a basis.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116112555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Energy-efficient reliable data dissemination in duty-cycled wireless sensor networks 占空比无线传感器网络中节能可靠的数据传播
K. Han, Liu Xiang, Jun Luo, Mingjun Xiao, Liusheng Huang
{"title":"Energy-efficient reliable data dissemination in duty-cycled wireless sensor networks","authors":"K. Han, Liu Xiang, Jun Luo, Mingjun Xiao, Liusheng Huang","doi":"10.1145/2491288.2491326","DOIUrl":"https://doi.org/10.1145/2491288.2491326","url":null,"abstract":"Because data dissemination is crucial to Wireless Sensor Networks (WSNs), its energy-efficiency and reliability are of paramount importance. While achieving these two goals together is highly non-trivial, the situation is exacerbated if WSN nodes are duty-cycled (DC) and their transmission power is adjustable. In this paper, we study the problem of minimizing the expected total transmission power for reliable data dissemination (multicast/broadcast) in DC-WSNs. Due to the NP-hardness of the problem, we design efficient approximation algorithms with provable performance bounds for it.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging 无线传感器网络中RS代码和基于TD的kpd的连接、扩展和保护:确定性合并
Pinaki Sarkar, B. K. Rai, Aritra Dhar
{"title":"Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging","authors":"Pinaki Sarkar, B. K. Rai, Aritra Dhar","doi":"10.1145/2491288.2491329","DOIUrl":"https://doi.org/10.1145/2491288.2491329","url":null,"abstract":"Key management, one of the most challenging problems in Wireless Sensor Network (WSN) has been efficiently addressed using Key Predistribution (KPD) schemes. This paper analyzes a localized KPD based on the Transversal Design (TD) design or Reed Solomon (RS) codes schemes; later two shown to be similar. They lack full direct communications among their constituent nodes and so, rely on multi-hop involving other nodes reducing the overall efficiency of the system. The communication issue for TD or RS and hence the localized KPD gets resolved by Deterministic Merging of exactly two nodes. The weakness of `selective node attack' of the merged designs, similar to their original KPDs, is overcome by invoking the novel trick of Sarkar emph{et al.} Simulation results confirm that the various network parameters of the proposed schemes improves significantly over a random counterpart among other existing schemes.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116664349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Connectivity in obstructed wireless networks: from geometry to percolation 受阻无线网络中的连接:从几何到渗透
Marcelo G. Almiron, Olga Goussevskaia, A. Loureiro, J. Rolim
{"title":"Connectivity in obstructed wireless networks: from geometry to percolation","authors":"Marcelo G. Almiron, Olga Goussevskaia, A. Loureiro, J. Rolim","doi":"10.1145/2491288.2491306","DOIUrl":"https://doi.org/10.1145/2491288.2491306","url":null,"abstract":"In this work, we analyze an alternative model for obstructed wireless networks. The model is based on a grid structure of one-dimensional street segments and two-dimensional street intersections. This structure provides a realistic representation of a variety of network scenarios with obstacles and, at the same time, allows a simple enough analysis, which is partly based on percolation theory and partly based on geometric properties. We propose three different ways of modeling the geometric part of the network and derive analytical bounds for the connectivity probability and the critical transmission range for connectivity in the network. Finally, we present extensive simulations that demonstrate that our analytical results provide good approximations, especially for high density scenarios.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Maximizing network throughput with minimal remote data transfer cost in unreliable wireless sensor networks 在不可靠的无线传感器网络中,以最小的远程数据传输成本最大化网络吞吐量
Xu Xu, W. Liang, X. Jia, Wenzheng Xu
{"title":"Maximizing network throughput with minimal remote data transfer cost in unreliable wireless sensor networks","authors":"Xu Xu, W. Liang, X. Jia, Wenzheng Xu","doi":"10.1145/2491288.2491315","DOIUrl":"https://doi.org/10.1145/2491288.2491315","url":null,"abstract":"In this paper we consider the use of a link-unreliable wireless sensor network for remote monitoring, where the monitoring center is geographically located far away from the region of the deployed sensor network. The sensing data is transferred to the monitoring center by the third party communication service, which incurs service cost. We first formulate a novel optimization problem of maximizing the network throughput with minimal service cost, which is shown to be NP-hard. We then develop approximation algorithms. We finally evaluate the performance of the proposed algorithms by simulations. Experimental results demonstrate that the solutions delivered by proposed algorithms are fractional to the optimum.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Qute: quality-of-monitoring aware sensing and routing strategy in wireless sensor networks 无线传感器网络中监测质量感知感知与路由策略
Shaojie Tang, Jie Wu
{"title":"Qute: quality-of-monitoring aware sensing and routing strategy in wireless sensor networks","authors":"Shaojie Tang, Jie Wu","doi":"10.1145/2491288.2491311","DOIUrl":"https://doi.org/10.1145/2491288.2491311","url":null,"abstract":"Wireless Sensor Networks (WSNs) are widely used to monitor the physical environment. In a highly redundant sensor network, sensor readings from nearby sensors often have high similarity. In this work, we are interested in how to decide an appropriate sensing rate for each sensor node, in order to maximize the overall Quality-of-Monitoring (QoM), while ensuring that all readings can be transmitted to the sink. Note that a feasible sensing rate allocation should satisfy both energy constraint on each sensor node and flow conservation through the network. In order to capture the statistical correlations among sensor readings, we first introduce the concept of correlation graph. The correlation graph is further decomposed into several correlation components, and sensor readings from the same correlation component are highly correlated. For each correlation component, we defined a general utility function to estimate the QoM. The utility function of each correlation component is a non-decreasing submodular function of the total sensing rates allocated to that correlation component. Then we formulate the QoM-aware sensing rate allocation problem as a utility maximization problem under limited power supply on each node. To tackle this problem, we adopted an efficient algorithm, called Qute, by jointly considering both the energy constraint on each node and flow conservation through the network. Under some settings, we analytically show that Qute can find the optimal QoM-aware sensing rate allocation which achieves the maximum total utility. We conducted extensive testbed verifications of our schemes, and experimental results validate our theoretical results.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Characteristic function of connectivity with obstacles 与障碍物连接的特征函数
Yun Wu, Xinbing Wang
{"title":"Characteristic function of connectivity with obstacles","authors":"Yun Wu, Xinbing Wang","doi":"10.1145/2491288.2491314","DOIUrl":"https://doi.org/10.1145/2491288.2491314","url":null,"abstract":"Previous works usually simplify the network area as a disk, a square or a torus without obstacles. However, geometry in practical environment is much more intricate. Rectilinear communication between nodes is often blocked by external surroundings, such as buildings and mountains. Complicated shapes of the obstacles may cause the computation intractable. In this paper, we propose a characteristic function of connectivity to capture the geometric features of an ad-hoc network. The function can be expressed as power series, of which the orders and coefficients is based on the characteristics of the network. We formulate the shapes with fundamental factors and investigate their algebraic impact on connectivity. The critical transmission range is also calculated to mitigate the influence of obstacles.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115452590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信