2007 International Conference on Mobile Data Management最新文献

筛选
英文 中文
Scalable Hybrid Routing in Very Large Sensor Networks 超大传感器网络中的可扩展混合路由
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.77
Tao Wu, Fan Yu, S. Biswas
{"title":"Scalable Hybrid Routing in Very Large Sensor Networks","authors":"Tao Wu, Fan Yu, S. Biswas","doi":"10.1109/MDM.2007.77","DOIUrl":"https://doi.org/10.1109/MDM.2007.77","url":null,"abstract":"This paper presents an architectural solution to address the problem of scalable routing for data intensive applications in very large sensor networks. Due to large routing overheads, the control complexity of the existing sensor routing protocols, both node-centric and data-centric, do not scale well in very large networks with potentially thousands of sensor devices. In this paper, we develop a hybrid architectural solution off-network control processing (ONCP) that achieves scalable routing in large networks by shifting certain amount of routing functions to an \"off-network\" routing server. A tiered routing approach is proposed to avoid network-wide control message dissemination. Our experimental results indicate that for large sensor networks with realistic data models, the packet drop, latency, energy performance and bandwidth usage of ONCP can be significantly better than those for completely distributed routing protocols such as directed diffusion.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114155700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Integration of Data Stream Clustering into a Query Processor for Wireless Sensor Networks 无线传感器网络数据流聚类查询处理器集成研究
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.70
Uwe Röhm, Bernhard Scholz, M. Gaber
{"title":"On the Integration of Data Stream Clustering into a Query Processor for Wireless Sensor Networks","authors":"Uwe Röhm, Bernhard Scholz, M. Gaber","doi":"10.1109/MDM.2007.70","DOIUrl":"https://doi.org/10.1109/MDM.2007.70","url":null,"abstract":"We discuss the integration of on-line data stream clustering into a distributed query processor for wireless sensor networks (WSNs). Our approach is to combine an adaptive clustering algorithm with in-network data processing by introducing specialised query operators that implement stateful stream processing. We have implemented a testbed for an on-line clustering algorithm as part of a query processing system for the Sun SPOT sensor network platform. The paper discusses the design alternatives for continuous stream clustering in WSNs and for the integration of the resource-awareness to be able to trade result accuracy for resource consumption.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114737228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MINT Views: Materialized In-Network Top-k Views in Sensor Networks 薄荷视图:物化网络Top-k视图在传感器网络
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.34
D. Zeinalipour-Yazti, P. Andreou, Panos K. Chrysanthis, G. Samaras
{"title":"MINT Views: Materialized In-Network Top-k Views in Sensor Networks","authors":"D. Zeinalipour-Yazti, P. Andreou, Panos K. Chrysanthis, G. Samaras","doi":"10.1109/MDM.2007.34","DOIUrl":"https://doi.org/10.1109/MDM.2007.34","url":null,"abstract":"In this paper we introduce MINT (materialized in-network top-k) Views, a novel framework for optimizing the execution of continuous monitoring queries in sensor networks. A typical materialized view V maintains the complete results of a query Q in order to minimize the cost of future query executions. In a sensor network context, maintaining consistency between V and the underlying and distributed base relation R is very expensive in terms of communication. Thus, our approach focuses on a subset V(sube. V) that unveils only the k highest-ranked answers at the sink for some user defined parameter k. We additionally provide an elaborate description of energy-conscious algorithms for constructing, pruning and maintaining such recursively- defined in-network views. Our trace-driven experimentation with real datasets show that MINT offers significant energy reductions compared to other predominant data acquisition models.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
On Join Location in Sensor Networks 论传感器网络中的联接位置
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.35
Alexandru Coman, M. Nascimento, J. Sander
{"title":"On Join Location in Sensor Networks","authors":"Alexandru Coman, M. Nascimento, J. Sander","doi":"10.1109/MDM.2007.35","DOIUrl":"https://doi.org/10.1109/MDM.2007.35","url":null,"abstract":"We consider the problem of processing join queries in a wireless sensor network, focusing on where (which sensor node(s)) to process the join. We propose four strategies for processing such queries and investigate their performance across several scenarios. Not surprisingly, our experiments show that no single strategy performs best for all scenarios. In order to avoid the potential high cost of using a fixed strategy for processing all queries, we develop a cost-based model that can be used to select the best join strategy for the query at hand. Our experiments confirm that, given a set of queries, selecting the join strategy based on the cost model is always better than using any fixed strategy for all queries.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Group Anti-Entropy - Achieving Eventual Consistency in Mobile Service Environments 群反熵——在移动服务环境中实现最终一致性
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.26
K. Herrmann
{"title":"Group Anti-Entropy - Achieving Eventual Consistency in Mobile Service Environments","authors":"K. Herrmann","doi":"10.1109/MDM.2007.26","DOIUrl":"https://doi.org/10.1109/MDM.2007.26","url":null,"abstract":"Data consistency protocols are vital ingredients of mobile data management systems. Notable research efforts have been spent to find adequate consistency models for allowing mobile and nomadic users to share mutable data. Recently, mobile Ambient Service infrastructures that pose somewhat different requirements have entered the focus of attention. Ambient services are not as loosely coupled as the afore-mentioned systems, but they still need flexible consistency protocols that may adapt to the current dynamics in the system. We propose an extension to the well-known anti-entropy protocol that makes use of the nature of Ambient Service environments to allow for a flexible consistency management among arbitrary groups of mobile service replicas. We will show that our protocol can exploit the concept of group updates to increase its efficiency in terms of bandwidth usage. Furthermore, we prove that it avoids costly state transfers by means of a simple rule that limits the divergence within the overall set of replicas. Finally, we introduce two parameters for adjusting the level of consistency in system, and we present experimental results that show the effectiveness and the efficiency of the protocol.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129710448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Sensed-Point-Oriented Geographic Routing for Camera Networks 面向感知点的摄像机网络地理路由
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.38
H. Ishizuka, Y. Tobe
{"title":"A Sensed-Point-Oriented Geographic Routing for Camera Networks","authors":"H. Ishizuka, Y. Tobe","doi":"10.1109/MDM.2007.38","DOIUrl":"https://doi.org/10.1109/MDM.2007.38","url":null,"abstract":"Camera networks have been paid much attention in sensor networks since those network are useful to visualize a phenomenon sensed by other sensors for temperature, humidity, and light. When a user selects a point of an area deployed cameras in an application, a geographic routing is best used as a routing of the camera network. In conventional geographic routing, the destination of a message should be the location of a node. However, this is not suitable for sensors that cover a wide or directed sensing area such as cameras. To cope with this problem, we propose a modified geographic routing scheme called SenriGan. SenriGan accommodates specifying a sensed point as a destination instead of using a location of a node. In this demonstration, we show a prototype system of SenriGan.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128724912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy (Regimes) Do Not Threaten Location Technology Development 隐私(制度)不会威胁到定位技术的发展
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.50
B. V. Loenen, J. Zevenbergen
{"title":"Privacy (Regimes) Do Not Threaten Location Technology Development","authors":"B. V. Loenen, J. Zevenbergen","doi":"10.1109/MDM.2007.50","DOIUrl":"https://doi.org/10.1109/MDM.2007.50","url":null,"abstract":"Location technology allows for the tracking and tracing of individuals. Users may increasingly be concerned about the abilities of new technology to keep an eye on ones' private life. There are concerns that the increased privacy awareness among citizens and legislation may hinder the success and further development of these technologies. An analysis of the European legal framework for protecting individual's privacy versus private sector use of location information and public sector use in the intelligence services indicates that individuals should be most aware on intrusions in their privacy by intelligence services. The privacy legislation lets the user be in control of the decision if and when his location information may be used by private sector location based services providers. Users seem often willing to allow this, judging by the increase in available location based services. The privacy legislation is not as protective regarding the use for law enforcement and secret intelligence purposes. Thus the location technology industry is also likely to prosper from the investments of the public intelligence sector.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Adaptive Control Method in the Hybrid Wireless Broadcast Environment 混合无线广播环境下的自适应控制方法
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.21
Jing Cai, T. Terada, T. Hara, S. Nishio
{"title":"An Adaptive Control Method in the Hybrid Wireless Broadcast Environment","authors":"Jing Cai, T. Terada, T. Hara, S. Nishio","doi":"10.1109/MDM.2007.21","DOIUrl":"https://doi.org/10.1109/MDM.2007.21","url":null,"abstract":"In this paper, we investigate adaptive control for broadcast scheduling and base station caching in the hybrid wireless broadcast (HWB) environment. The proposed adaptive method can adapt well to different access conditions and bandwidth capabilities and adequately exploit the three data delivery modes: push-based broadcast, pull- based broadcast, and pull-based point-to-point communication. Simulation studies demonstrated that our proposed method achieves significant performance improvement in average waiting time and success rate.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantifying Network Partitioning in Mobile Ad Hoc Networks 移动Ad Hoc网络中网络划分的量化
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.33
J. Hähner, D. Dudkowski, P. Marrón, K. Rothermel
{"title":"Quantifying Network Partitioning in Mobile Ad Hoc Networks","authors":"J. Hähner, D. Dudkowski, P. Marrón, K. Rothermel","doi":"10.1109/MDM.2007.33","DOIUrl":"https://doi.org/10.1109/MDM.2007.33","url":null,"abstract":"The performance of distributed algorithms in mobile ad hoc networks is strongly influenced by the connectivity of the network. In cases where the connectivity is low, network partitioning occurs. The mobility and the density of network nodes as well as the communication technology are fundamental properties that have a large impact on partitioning. A detailed characterization of this behavior helps to improve the performance of distributed algorithms. In this paper we introduce a set of metrics that characterize partitioning in mobile ad hoc networks. Based on an extensive simulation study we show the impact of node mobility, density and transmission range on the proposed metrics for a wide range of network scenarios.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129108572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Enforcing Data Integrity in Very Large Ad Hoc Networks 在非常大的自组织网络中加强数据完整性
2007 International Conference on Mobile Data Management Pub Date : 2007-05-01 DOI: 10.1109/MDM.2007.20
D. Gavidia, M. Steen
{"title":"Enforcing Data Integrity in Very Large Ad Hoc Networks","authors":"D. Gavidia, M. Steen","doi":"10.1109/MDM.2007.20","DOIUrl":"https://doi.org/10.1109/MDM.2007.20","url":null,"abstract":"Ad hoc networks rely on nodes forwarding each other's packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belong to the same organization and share the same goal (in military scenarios, for example), it can generally be expected that all nodes can be trusted. However, as wireless technology becomes more commonplace, we can foresee the appearance of very large, heterogeneous networks where the intentions of neighboring nodes are unknown. Without any security measures in place, any node is capable of compromising the integrity of the data it forwards. Our goal in this paper is to ensure the integrity of the data being disseminated without resorting to complex and expensive solutions. We achive this by discouraging malicious behavior in two ways: a) enforcing integrity checks close to the source and b) refusing to communicate with obviously malicious nodes. We find that by having nodes sample their traffic for corrupted messages, malicious nodes can be identified with high accuracy, in effect transforming our collection of nodes into a self-policing network.","PeriodicalId":393767,"journal":{"name":"2007 International Conference on Mobile Data Management","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信