2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)最新文献

筛选
英文 中文
An estimator model for distributed estimation in heterogenous wireless sensor networks 异构无线传感器网络中分布式估计器模型
Shanying Zhu, Cailian Chen, X. Guan, C. Long
{"title":"An estimator model for distributed estimation in heterogenous wireless sensor networks","authors":"Shanying Zhu, Cailian Chen, X. Guan, C. Long","doi":"10.1109/WOWMOM.2010.5534946","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534946","url":null,"abstract":"In this paper, we deal with distributed estimation using consensus algorithms for heterogenous wireless sensor networks (WSNs). To accommodate with the heterogeneity, we introduce a novel distributed estimator to track the weighted average of the input signals. Different from existing models, we consider a more practical scenario to take account of hierarchical processing abilities of different sensors: type-I sensors with high processing ability and type-II senors with low processing ability for distributed sensor fusion in WSNs. We investigate the properties of our model and illustrate the feasibility of the proposed estimator via a case study where we use the estimator to track the weighted average of a noisy time-varying signal based on the sensors' noisy and distorted measurements. Convergence analysis in this scenario is given as well as the effect of network topology and estimator parameters are also studied. Simulation results are provided to demonstrate the performance and effectiveness of the proposed estimator.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126612385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Streaming H.264 scalable video over data distribution service in a wireless environment 在无线环境中,通过数据分发服务流式传输H.264可伸缩视频
A. Detti, P. Loreti, N. Blefari-Melazzi, F. Fedi
{"title":"Streaming H.264 scalable video over data distribution service in a wireless environment","authors":"A. Detti, P. Loreti, N. Blefari-Melazzi, F. Fedi","doi":"10.1109/WOWMOM.2010.5534937","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534937","url":null,"abstract":"The Data Distribution Service (DDS) middleware is enjoying a rapid adoption in high-performance, mission-critical networks. At the same time, the H.264 Scalable Video Coding (SVC) has been recently standardized and it is deemed to be an effective solution for video streaming over a channel with time-varying bandwidth, like the wireless one. In these conditions, it is critical to adapt the video bit-rate to the actual wireless capacity, and bit-rate adaptation is extremely simple for a H.264 SVC video. In this paper we devise, evaluate and demonstrate a technique for streaming H.264 SVC video over a DDS middleware. The contribution is threefold: i) we design a structure of the DDS data-unit able to carry H.264 SVC video-units; ii) we devise a receiver-driven rate-control mechanism based on our DDS data-unit and exploiting specific DDS functionality; iii) we implement and show the effectiveness of our mechanism in an 802.11 wireless scenario, comparing our proposal with other solutions.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125446543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Statistical modeling of harvestable kinetic energy for wearable medical sensors 可穿戴医疗传感器可采集动能的统计建模
N. Yarkony, K. Sayrafian-Pour, A. Possolo
{"title":"Statistical modeling of harvestable kinetic energy for wearable medical sensors","authors":"N. Yarkony, K. Sayrafian-Pour, A. Possolo","doi":"10.1109/WOWMOM.2010.5534988","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534988","url":null,"abstract":"Energy Harvesting (EH) refers to the process of capturing and storing energy from external sources or ambient environment. Kinetic energy harvested from the human body motion seems to be one of the most convenient and attractive solution for wearable wireless sensors in healthcare applications. Due to their small size, such sensors have a very limited battery power supply, which necessitates frequent recharge or even sensor replacement. Energy harvesting can prolong the battery lifetime of these sensors. This could directly impact their everyday use and significantly help their commercial applications such as remote monitoring. In this paper, our aim is to estimate the amount of harvestable energy from typical human motion. To simplify the measurement process, we focus on the amount of kinetic energy harvested from the human forearm motion. We provide statistical analysis of measurements taken from 40 test subjects over a period of 8 hours during the day. Using this information and knowing the operational architecture of the harvesting device, the distribution of harvestable energy can also be determined. Our objective is to study whether kinetic energy generated by typical human forearm motion could be a promising supplemental energy resource that prolongs the operational lifetime of wearable medical sensors.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127643139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A secure peer-to-peer web framework 安全的点对点web框架
J. Koskela, A. Gurtov
{"title":"A secure peer-to-peer web framework","authors":"J. Koskela, A. Gurtov","doi":"10.1109/WOWMOM.2010.5534942","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534942","url":null,"abstract":"We present the design and evaluation of a secure peer-to-peer HTTP middleware framework that enables a multitude of web applications without relying on service providers. The framework is designed to be deployed in existing network environments, allowing ordinary users to create private services without investing in network infrastructure. Compared to previous work, scalability, NAT/firewall traversal and peer mobility is achieved without the need for maintaining dedicated servers by utilizing new network protocols and re-using existing network resources.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132025174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attribute-aware data aggregation using dynamic routing in wireless sensor networks 无线传感器网络中基于动态路由的属性感知数据聚合
Jiao Zhang, Fengyuan Ren, Tao He, Chuang Lin
{"title":"Attribute-aware data aggregation using dynamic routing in wireless sensor networks","authors":"Jiao Zhang, Fengyuan Ren, Tao He, Chuang Lin","doi":"10.1109/WOWMOM.2010.5534896","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534896","url":null,"abstract":"Data aggregation has been widely recognized as an efficient method to reduce energy consumption in wireless sensor networks, which can support a wide range of applications such as monitoring temperature, humidity, level, speed etc. The data sampled by the same kind of sensors have much redundancy since the sensor nodes are usually quite dense in wireless sensor networks. To make data aggregation more efficient, the packets with the same attribute, defined as the identifier of different data sampled by different sensors such as temperature sensors, humidity sensors, etc., should be gathered together. However, to the best of our knowledge, present data aggregation mechanisms did not take packet attribute into consideration. In this paper, we take the lead in introducing packet attribute into data aggregation and propose an Attribute-aware Data Aggregation mechanism using Dynamic Routing (ADADR) which can make packets with the same attribute convergent as much as possible and therefore improve the efficiency of data aggregation. This goal cannot be achieved by present static routing schemes employed in most of data aggregation mechanisms since they construct routes before transmitting the sampled data and thus can not dynamically forward packets in response to the variation of packets at intermediate nodes. Hence, we present a potential-based dynamic routing scheme which employs the concept of potential in physics and pheromone in ant colony to achieve our goal. The results of simulations in series of scenarios show that ADADR indeed conserve energy by reducing the average number of transmissions each packet needs to reach the sink and is scalable with regard to the network size.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132145157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
SHARC: Community-based partitioning for mobile ad hoc networks using neighborhood similarity SHARC:基于社区的基于邻域相似性的移动自组织网络分区
Guillaume-Jean Herbiet, P. Bouvry
{"title":"SHARC: Community-based partitioning for mobile ad hoc networks using neighborhood similarity","authors":"Guillaume-Jean Herbiet, P. Bouvry","doi":"10.1109/WOWMOM.2010.5534915","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534915","url":null,"abstract":"In this contribution, we present SHARC, a Sharper Heuristic for Assignment of Robust Communities. This algorithm performs distributed network partitioning into communities using epidemic propagation of community labels and the computation of a neighborhood similarity metric. Due to its decentralized nature, SHARC is scalable and well suited for networks where no global knowledge nor node coordination exist, like ad hoc networks. Besides, SHARC is computationally efficient and does not depend on configuration parameters. We validated our approach and compared it to alternative solutions using static and dynamic networks. Results show that SHARC provides a sharper and more robust community assignment and prevents the domination of a single community in both static and dynamic networks.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"2 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133080431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
TTN: A time-to-network approach to data reporting in mobile ad hoc networks TTN:移动自组织网络中数据报告的时间到网络方法
P. Sitbon, W. Feng, N. Bulusu
{"title":"TTN: A time-to-network approach to data reporting in mobile ad hoc networks","authors":"P. Sitbon, W. Feng, N. Bulusu","doi":"10.1109/WOWMOM.2010.5534990","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534990","url":null,"abstract":"For many applications in mobile wireless ad hoc networks (MANETs), forming an end-to-end data path is not always necessary; instead, the primary routing goal is often data collection or dissemination where only a data source is known. Routing algorithms must be carefully chosen in order to suit the needs of applications employing them. Our focus is on data collection applications in MANETs where limited mobility information is required to route data in a scalable manner. To address this goal, we employ the concepts of delay-tolerant networking (DTN) in which data makes progress toward a destination with high latency expectations and little knowledge of routing topology. Specifically, we present time-to-network (TTN) forwarding, a method of forwarding data generated by mobile nodes to a network endpoint in such a way that delivery latency is lowered without high networking cost. By segmenting mobility patterns into trips, we are able to apply TTN to a vehicular network using only an estimated destination arrival time for each vehicle. We evaluate TTN using mobility data from the TRANSIMS simulator for a real road network. Results show that our algorithm produces collection-to-network latencies similar to more generic algorithms but at a lower cost and with higher efficiency. Furthermore, we establish a lower bound for delivery latency in our experiments and compare it to TTN. This also helps normalize the interpretation of results specific to our mobility model.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133712469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of the true risks to the protection of confidential information in the wireless home and office environment 评估在无线家庭和办公环境中保护机密信息的真实风险
M. Barbeau
{"title":"Assessment of the true risks to the protection of confidential information in the wireless home and office environment","authors":"M. Barbeau","doi":"10.1109/WOWMOM.2010.5534940","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534940","url":null,"abstract":"The ubiquity of wireless communications, in the home and office environment, introduces information security risks specific to WLANs and handheld devices. It is crucial to continuously monitor their evolution but every threat must be examined in terms of potential impact and likelihood. Only when both conditions are present, it does need to be mitigated. This paper shows how the problem can be addressed in a methodological manner. By conducting a proper risk assessment we can identify the threats, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related to the protection of confidential information, in the wireless home and office environment, are used to illustrate the point.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"45 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113956436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automatic planning of UMTS release 4.0 networks using realistic traffic 根据实际流量自动规划UMTS release 4.0网络
Mohammad Reza Pasandideh, M. St-Hilaire
{"title":"Automatic planning of UMTS release 4.0 networks using realistic traffic","authors":"Mohammad Reza Pasandideh, M. St-Hilaire","doi":"10.1109/WOWMOM.2010.5534923","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534923","url":null,"abstract":"Since Universal Mobile Telecommunications System (UMTS) networks are very expensive to deploy, network optimization is an important issue for service providers to remain competitive. As a result, this paper proposes a new mathematical programming model in order to plan UMTS Release 4.0 networks. Given realistic traffic profile as input, the model simultaneously considers voice and data services as well as network signaling. More precisely, the model finds the number, the type and the location of the network elements (NE), selects the number and the type of links and interfaces and finally designs the network topology. The objective of the model is to minimize network cost. An illustrative example of the model is described and a set of randomly generated problems are solved using a commercial implementation of the branch-and-bound algorithm.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127934486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Rope ladder routing: Position-based multipath routing for wireless mesh networks 绳梯路由:无线网状网络的基于位置的多路径路由
J. Lessmann, M. Schöller, Frank A. Zdarsky
{"title":"Rope ladder routing: Position-based multipath routing for wireless mesh networks","authors":"J. Lessmann, M. Schöller, Frank A. Zdarsky","doi":"10.1109/WOWMOM.2010.5534994","DOIUrl":"https://doi.org/10.1109/WOWMOM.2010.5534994","url":null,"abstract":"In this paper, we present a novel multipath structure called rope-ladder which combines the advantages of path, node and link protection schemes. We also propose a position-based multipath routing protocol in order to efficiently construct rope-ladders in wireless networks. By design, the paths which are constructed by our protocol are closely together which allows to quickly switch back and forth between them in cases of node or link failures. Hence, the size of loss gaps (i.e. the number of consecutively lost packets) can be minimized. Previous works mostly confine themselves to overall packet loss comparisons. However, the loss gap size is crucial to ensure high quality for gap-sensitive traffic like voice flows. Our multipath structure can also tolerate failures of multiple consecutive nodes on the primary path, and has a superior path diversity and path lifetime compared to even perfect braids. We evaluate the performance of our protocol using analysis and simulations1.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129096563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信