The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A stream processing flow can be represented as a directed graph that describes how streaming data is obtained from one or more sources, processed by one or more components, and finally sent to one or more sinks. In this paper, we show how stream processing flows can be used to support location based services for a variety of end-users. In particular, we show how these flows can be customized for specific...
In a mobile ad hoc network (MANET), mobile hosts basically run with battery and their battery capacity is limited. Data transmissions are one of the main factors of the power consumption of mobile hosts. Therefore energy efficient data access is one of the most important research issues in MANETs. In this paper, we introduce our recent work addressing issues of energy efficient data access in MANETs...
Processing spatio-temporal queries pertaining to the whereabouts of a large number of mobile entities has traditionally been the topic of the Moving Objects Databases (MOD)research. More recently, due to the advances in sensing and communication technologies, part of the Wireless Sensor Networks(WSN) applications have focused on tracking of mobile objects. These two observations are enough of to warrant...
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts to disclose physical locations of sensors in the network. The adversary accomplishes this by physically moving in the network while eavesdropping on communication messages exchanged by sensors, and measuring raw physical...
Data-based agreement is increasingly used to implement traceable coordination across mobile entities such as ad-hoc networked (autonomous) vehicles. In our work, we focus on data-based agreement using database transactions where mobile entities agree on a set of coordinated tasks that need to be performed by them in an atomic way. Atomicity means that all transaction participants agree on a set of...
We present the novel boomerang protocol to efficiently retain information at a particular geographic location in a sparse network of highly mobile nodes without use of infrastructure networks. Our proof-of-concept implementation revealed the main challenge in implementing the Boomerang protocol is to accurately detect whether a node is divergent from a recorded trajectory and then followed up with...
Wireless sensor networks have today emerged as a feasible infrastructure for healthcare applications. This paper addresses the non-trivial performance problems in contention based wireless networks. We present a method for admission control in contention-based networks, implemented as a component of a performance management system. The test results show that admission control can improve the predictability...
Geographical contour lines are often used for the analysis of the sensor data distribution on wide area. In this paper, we propose a method to reconstruct contour lines by collecting sensor data from widely distributed sensors. In this case, it is redundant to collect all sensors from wide area since geographically closed sensors sense similar data. We propose a sensor data collection method for peer-to-peer...
Distributed stream processing engines (DSPEs) have recently been studied to meet the needs of continuous query processing. Because they are built on the cooperation of several stream processing engines (SPEs), node failures cause the whole system to fail. This paper proposes a new high-availability scheme called Adaptive Semi-Active Standby (A-SAS). A-SAS enables adaptive tradeoff between bandwidth...
This paper shows the use of data warehouse as an alternative for managing data collected by Wireless Sensor Networks that monitor bees. The scientific research that uses Wireless Sensor Network for habitat or animal monitor used to produce a large amount of data that need to be analyzed and normalized, so as to help researchers and other people interested in the information. These data managed and...
Context-awareness is a critical aspect of safe navigation especially for the blind and visually impaired in unfamiliar environments. Existing mobile devices for context-aware navigation fall short in many cases due to their dependence on specific infrastructure requirements as well as having limited access to resources that could provide a wealth of contextual clues. In this paper, we propose a mobile-cloud...
Location information is necessarily uncertain when objects are constantly moving. The cost can be high to maintain precise locations at the application server for all the objects while many applications may not need all the costly precision that is technically possible. An interesting question is how to reduce the cost associated with obtaining precise locations while satisfying user requirements...
Data replication can improve data availability in mobile networks; but due to typical resource limitations in such environments, specific replication mechanisms are needed. In this paper, we propose CReaM, user-Centric REplicAtion Model for mobile environment. This model puts users at the centre by letting them determine the amount of resources they are willing to share. CReaM is suitable for dynamic...
A mobility-enabled architecture is usually required to facilitate the access of enterprise systems from mobile devices. Typically, mobility enabled architectures are separated in online architectures and offline architectures. The online architectures enable mobile clients to use the online model in which mobile clients access business logic and data located on backend systems using remote invocations...
In order to provide context aware, adaptive, and anticipatory services, data mining services are required to provide them with intelligence. The data mining could be either executed in a central server or locally. In either case, adaptability to the changing environment is required. In the stream mining scenario, some solutions have been proposed to provide mechanisms to adapt the execution to available...
Assessing the quality of sensor-originated information is key for the effective and predictable operation sensor-enabled computerized applications. However, with increasing uncertainties due to alternative deployment scenarios, operational realities, and sensing resource use, it becomes very challenging in designing replicable software solutions that can be easily reused in a number of occasions with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.