2007 2nd International Symposium on Wireless Pervasive Computing最新文献

筛选
英文 中文
MSM: A Middleware Architecture for Enhancing Interaction with Mobile Services MSM:用于增强与移动服务交互的中间件体系结构
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342642
Q. Mahmoud, E. Al-Masri
{"title":"MSM: A Middleware Architecture for Enhancing Interaction with Mobile Services","authors":"Q. Mahmoud, E. Al-Masri","doi":"10.1109/ISWPC.2007.342642","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342642","url":null,"abstract":"Mobile services are wireless computing applications and services that can be either pushed to user's handheld wireless devices or downloaded and installed, over the air, on handheld wireless devices. While there are several discovery protocols available, most of them do not address the issue of interacting with downloadable services. In other words, once a service has been discovered and selected to be used, how do users interact with such a service? The worst possible scenario is when a user pays for a service that is unusable, possibly because the device is not capable of running the service. In this paper, we present the mobile service manager (MSM) middleware architecture that enables multiple interaction models suitable for mobile devices, and discuss its components. We argue that supported interaction models should be specified in the service advertisement, and we propose an extension to the Web service description language (WSDL) for describing services and their supported interaction models.","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123176636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementing a Vector RLS Smart Antenna Beamformer Using Xilinx System Generator 利用赛灵思系统发生器实现矢量RLS智能天线波束形成器
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342673
V. Zaharov, A. Gonzalez, J. Acosta, M. Teixeira
{"title":"Implementing a Vector RLS Smart Antenna Beamformer Using Xilinx System Generator","authors":"V. Zaharov, A. Gonzalez, J. Acosta, M. Teixeira","doi":"10.1109/ISWPC.2007.342673","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342673","url":null,"abstract":"The vector RLS (VRLS) beamformer is a promising algorithm for weight vector adjustment in many smart antenna applications because of its linear computational complexity and high convergence rate of SNIR to the optimum solution. The fixed-point numerical performance of the VRLS beamformer is discussed in this paper. The core VRLS beamformer block is being developed and its basic components such as the complex multiplier, the complex vector multiplier and the complex elements multiplier were designed using Xilinx System Generator. The ModelSim tools that includes a complete very high-speed integrated circuit hardware description language (VHDL) simulation and debugging environment was used to stitch the basic components together. The running speed of the core block for four elements antenna array was obtained for the test input data. Some optimizations of the hardware implementation based on FPGA are proposed","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"68 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122802886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance of Parallel Decentralized Sensor Network with Decision Feedback 具有决策反馈的并联分散传感器网络性能研究
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342680
S. Kopparthi, B. Natarajan
{"title":"Performance of Parallel Decentralized Sensor Network with Decision Feedback","authors":"S. Kopparthi, B. Natarajan","doi":"10.1109/ISWPC.2007.342680","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342680","url":null,"abstract":"In most previous studies, distributed sensor networks are typically assumed to be memory less. In this paper, we consider a distributed sensor network with feedback at both the sensor level as well as at the fusion center. Specifically, we analyze (1) a local feedback system (LFS), where the most recent local decision is fed back to its corresponding local sensor; (2) a local and global feedback system 1 (LGFS1) where the most recent local decision is fed back to its corresponding local sensor and the most recent global decision is fed back to the fusion center, and (3) a local and global feedback system 2 (LGFS2), where the most recent global decision is fed back to all the local sensors and to the fusion center in addition to the local decision being fed back to its corresponding local sensor. For all the cases, we derive the decision rule and compare the global probability of error using simulations. We show that in an error-free channel, any form of feedback improves GPE performance relative to no feedback system. However, feeding the global decision back to local sensors not only drains resources but also provides the worst performance among feedback schemes","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129461174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Power Conservation in ZigBee Networks using Temporal Control 采用时序控制的ZigBee网络节能
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342596
A. Viswanathan, T. Boult
{"title":"Power Conservation in ZigBee Networks using Temporal Control","authors":"A. Viswanathan, T. Boult","doi":"10.1109/ISWPC.2007.342596","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342596","url":null,"abstract":"This paper addresses power reduction in wireless sensor networks (WSNs), proposing an application-level solution for the IEEE 802.15.4 compliant ZigBee protocol. ZigBee protocol supports the least power-consuming 'sleep' mode of operation only for end-nodes that do not route packets. This significantly limits ZigBee's WSN applications. This paper presents a ZigBee-based power-conserving network design in which a multi-mode scheduler can be used at the application-level for all network nodes that brings the whole net up and down. This allows all nodes to 'deep sleep', hence increasing the per-node lifetime, leading to an increased overall network lifetime. Results of network simulations with a rate monotonic-based scheduler, schedules operating times for various nodes in the entire network, setting the devices to the lowest power operating mode - sleep mode - for all other times when no operation needs to be performed. When the network wakes up, all nodes necessary for a particular scheduled transmission awake and rebuild the ZigBee network. The paper presents power savings estimates from simulations showing significant advantages over standard ZigBee","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Mobile Sensor Management For Target Tracking 目标跟踪的移动传感器管理
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342656
S. Maheswararajah, S. Halgamuge
{"title":"Mobile Sensor Management For Target Tracking","authors":"S. Maheswararajah, S. Halgamuge","doi":"10.1109/ISWPC.2007.342656","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342656","url":null,"abstract":"In sensor networks, the problem of coverage is a fundamental issue for randomly distributed sensor nodes. In target tracking, it is important to gather a sufficient number of measurements from the sensors to estimate the target trajectory. This paper presents a new approach to improve the tracking accuracy by using mobile sensors with restricted movements. The state of the target and sensors are modeled as a linear Gaussian model and the measurements are assumed non linearly related to the state model and impaired by Gaussian noise. Extended Kalman filtering (EKF) technique is used to estimate the predicted mean square error (MSE) of the estimated target state. We attempt to find the optimal sensor movement and sensor sequence in order to minimize the predicted estimation error subject to satisfying the constraints. Simulation results show that the proposed approach improves the tracking performance","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125397937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Efficient and Secure Multicast in WirelessMAN 无线城域网中高效安全的组播技术
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342638
M. Ginley, Sen Xu, Chin-Tser Huang, M. Matthews
{"title":"Efficient and Secure Multicast in WirelessMAN","authors":"M. Ginley, Sen Xu, Chin-Tser Huang, M. Matthews","doi":"10.1109/ISWPC.2007.342638","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342638","url":null,"abstract":"Multicast delivery of data is a powerful mechanism that has strong potential in next generation networks. The increased efficiency over unicast is a definite advantage, but the use of multicast poses many security risks. Effectively adding security measures to a multicast service is an intriguing problem, especially when the service is deployed in a wireless setting. Next generation IEEE 802.16 standard WirelessMAN networks are a perfect example of this problem, and the latest draft specification of the standard includes a secure protocol solution called multicast and broadcast rekeying algorithm (MBRA). In this paper, we expose the security problems of MBRA, including non-scalability and omission of backward and forward secrecy, and propose a new approach, ELAPSE, to address these problems. We analyze the security property of ELAPSE and use Qualnet simulations to show its efficiency","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128825158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Operational model for Mobile Target Tracking in Wireless Sensor Networks 无线传感器网络中移动目标跟踪的操作模型
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342581
M. Bui, J. Myoupo, I. Sow
{"title":"An Operational model for Mobile Target Tracking in Wireless Sensor Networks","authors":"M. Bui, J. Myoupo, I. Sow","doi":"10.1109/ISWPC.2007.342581","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342581","url":null,"abstract":"The wireless sensor network is an emerging technology that may greatly facilitate human life by providing ubiquitous sensing, computing, monitoring and communication capability, through which people can more closely interact with the environment wherever he/she goes. To be context-aware, one of the central issues in sensor networks is location tracking, whose goal is to monitor the roaming path of a moving target. Its application is observed in several fields such as the meteorology, the chemistry, the road traffic, the battle field and so on... When a sensor detects a target in its transmission range it informs all other sensors by a short message (yes/no) in order to monitor least movements of the target. According to the strategy used several architectures were proposed in the literature. In this paper we propose a hexagonal architecture as follows; we assign coordinates in 2D plane to each node (memorized in its memory) and an unique identify number ID before the random deployment in any geographical area in order to form a hexagonal network. After the random deployment, a collaborative work initiated by the sensor which have coordinates (0, 0), allows each sensor to be able to find its position. We finally use the hexagonal network properties to define our tracking algorithm","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127510874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
DCT-based Channel Estimation Method for MIMO-OFDM Systems Using Phase Shifted Pilot Sequences 基于dct的移相导频MIMO-OFDM系统信道估计方法
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342565
Shaopeng Feng, Weilin Wu
{"title":"DCT-based Channel Estimation Method for MIMO-OFDM Systems Using Phase Shifted Pilot Sequences","authors":"Shaopeng Feng, Weilin Wu","doi":"10.1109/ISWPC.2007.342565","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342565","url":null,"abstract":"In this paper, we propose a channel estimation method based on the discrete cosine transform (DCT) using phase shifted pilot sequences for MIMO-OFDM systems. By exploiting the properties of DCT, the proposed method mitigates the aliasing effect introduced in DFT-based channel estimation method. With reasonable design and phase shifted pilot sequences for each transmitter antenna, the DCT-based channel estimation method can achieve highly efficient and accurate estimation without sacrificing much system overhead. Further more, no matrix reverse is required for channel estimation, so the computation complexity is largely simplified. The computer simulation results demonstrate effectiveness of the proposed DCT-based channel estimation method using phase shifted pilot sequences","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127718720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Countermeasure against Frequent Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks 基于blom方案的Ad Hoc传感器网络高频攻击对策
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342593
Shiuh-Jeng Wang, Yuh-Ren Tsai, Jhoong-Wei Chan
{"title":"A Countermeasure against Frequent Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks","authors":"Shiuh-Jeng Wang, Yuh-Ren Tsai, Jhoong-Wei Chan","doi":"10.1109/ISWPC.2007.342593","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342593","url":null,"abstract":"This paper gives a new solution based on the varied Blom scheme to resist attacks in the ad hoc network systems. Our scheme can efficiently set up the reliable communication links among all the nodes in any ad hoc systems","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127922761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
QoS Dashboard: Translation of User Inputs to Networking Strategies QoS仪表板:用户输入到网络策略的转换
2007 2nd International Symposium on Wireless Pervasive Computing Pub Date : 2007-04-16 DOI: 10.1109/ISWPC.2007.342567
Wenjing Wang, M. Chatterjee, K. Kwiat
{"title":"QoS Dashboard: Translation of User Inputs to Networking Strategies","authors":"Wenjing Wang, M. Chatterjee, K. Kwiat","doi":"10.1109/ISWPC.2007.342567","DOIUrl":"https://doi.org/10.1109/ISWPC.2007.342567","url":null,"abstract":"Quality-of-service (QoS) metrics are usually defined in terms of technical parameters like delay, jitter and bandwidth. However, the use or the interpretation of these QoS parameters are rather subjective when it comes to the end user. Oftentimes, the end user finds it difficult to express his desired QoS in such technical parameters though he has a fair idea of what QoS he desires. In this paper, we propose a simple interface, called QoS dashboard, that translates the user inputs to networking parameters that are used by various layers of the protocol stack. The QoS dashboard is primarily meant for tactical network implementation within a military setting of network-centric warfare. We borrow concepts from pricing to show that there is always a cost associated when better QoS is desired. We conduct a case study where we consider the routing strategies in an ad hoc network environment. We show how the user's preferences or priorities translate to network parameters at the routing layer. Depending on the user inputs, the most suitable routing strategy is selected so as to deliver the desired QoS. Ns-2 based simulation results demonstrate how delay, throughput, and network lifetime are affected when the routing strategy is changed","PeriodicalId":403213,"journal":{"name":"2007 2nd International Symposium on Wireless Pervasive Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121190730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信