The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ad-hoc smart spaces aim at resource-rich mobile devices sharing resource and context data with others near them spontaneously. Thus, a device may, e.g., obtain a more complete context model by utilizing sensor data of its neighbors via wireless communication, such as Bluetooth. The highly dynamic device neighborhood challenges resource discovery, as the devices have to organize themselves autonomously...
The support of distributed atomic transactions in Mobile Ad-hoc Networks (MANET) is a key requirement for many mobile application scenarios. Atomicity is a fundamental property that ensures that all nodes decide a consistent outcome. As MANETs are characterized by frequent perturbations due to network partitioning and the fragility of nodes, providing atomicity is challenging. Existing protocols that...
We introduce a novel strategy for data processing in Wireless Sensor Networks (WSNs) in the case of emergency fire evacuation with stringent delay constraints. Such networks should perform distributed emergency assessment, continuous emergency monitoring, and dynamic selection of optimal evacuation strategies. The obvious complexity of these tasks restricts applying existing WSN optimization solutions...
In this paper, we develop a framework of trajectory search called pattern-aware trajectory search abbreviated as PATS). Given a set of trajectories, potential regions are extracted first and potential regions are viewed as popular regions interested by users. Furthermore, potential regions are organized as a region transition graph where each vertex is a potential region and edges capture sequential...
The progress in mobile devices and wireless communication technologies magnifies the importance of opportunistic networks like Mobile Ad-hoc NETworks (MANETs). In MANETs, information sharing is performed by distributing advertisements and queries. In order not to load the environment with unnecessary traffic, file advertisement and query resolution should be performed according to the interests of...
Advances in data mining, particularly in anytime anywhere data stream mining, make on-board data analysis possible in mobile devices with resource constraints. In this work, we propose a data stream mining service to support knowledge discovery in ubiquitous applications while addressing resource constraints on mobile devices. As the basis for our service we describe a general mechanism, which autonomously...
Mobile application development is more challenging when context-awareness is taken into account. This research introduces the benefit of implementing a Mobile Service Oriented Architecture (SOA). A robust mobile SOA framework is designed for building and operating lightweight and flexible Context-Aware Mobile Application (CAMA). We develop a lightweight and flexible CAMA to show dynamic integration...
The patterns of movement used by Mobile Ad-Hoc networks are application specific, in the sense that networks use nodes which travel in different paths. When these nodes are used in experiments involving social patterns, such as wildlife tracking, algorithms which detect and use these patterns can be used to improve routing efficiency. The intent of this paper is to introduce a routing algorithm which...
Data aggregation is a technique used to conserve battery power in wireless sensor networks (WSN). While providing security in such a scenario it is also important that we minimize the number of security operations as they are computationally expensive, without compromising on the security In this paper we evaluate the performance of such an end to end security algorithm. We provide our results from...
Communication in Wireless Sensor Networks generally is the most energy consuming task. Retrieving query results from deep within the sensor network therefore consumes a lot of energy and hence shortens the network’s lifetime. In this work optimizations for processing queries by using adaptive caching structures are discussed. Results can be retrieved from caches that are placed nearer to the query...
Outlier detection is a well studied problem in various fields. The unique challenges of wireless sensor networks make this problem especially challenging. Sensors can detect outliers for a plethora of reasons and these reasons need to be inferred in real time. Here, we present a new communication technique to find outliers in a wireless sensor network. Communication is minimized through controlling...
VANETs have been envisioned as an infrastructure for deploying Vehicular Information Systems (VIS) that among others provide drivers with an up-to-date view on the prevailing traffic conditions. In this work we evaluate the benefits of caching vehicular information obtained from such VIS through VITP, a location-aware, application-layer communication protocol that we extend to support caching. We...
People’s location histories imply the location correlation that states the relations between geographical locations in the space of human behavior. With the correlation, we can enable many valuable services, such as location recommendation and sales promotion. In this paper, by taking into account a user’s travel experience (knowledge) and the sequentiality that locations have been visited, we learn...
Mobile Ad-hoc Networks (MANETs) enable users in physical proximity to each other to exchange data without the need for expensive communication infrastructures. Each user represents a node in the network, and executes a neighbor discovery Typically, nodes broadcast beacon messages that are received by other participants within the sender’s communication range. Routing strategies are computed on-line...
We address the problem of efficient processing of spatio-temporal range queries for moving objects whose whereabouts in time are not known exactly. The fundamental question tackled by such queries is, given a spatial region and a temporal interval, retrieve the objects that were inside the region during the given interval. As earlier works have demonstrated, when the location, time information is...
We present an optimal distributed algorithm to adapt the placement of a single operator in high communication cost networks, such as a wireless sensor network. Our parameter-free algorithm finds the optimal node to host the operator with minimum communication cost overhead. Three techniques, proposed here, make this feature possible: 1) identifying the special, and most frequent case, where no flooding...
The application of Data Warehousing (DW) and OLAP techniques on conventional data has been extensively studied in the literature. On the other hand, Trajectory Data Warehousing and Trajectory OLAP are relatively new research areas, which have to deal with the spatiotemporal (hence dynamic) nature of such data. In this paper, we present an innovative organization of a trajectory data cube in order...
Motivated by many applications, top-k query is a fundamental operation in modern database systems. Technological advances have enabled the deployment of large-scale sensor networks for environmental monitoring and surveillance purposes, efficient processing of top-k query in such networks poses great challenges due to the unique characteristics of sensors and a vast amount of data generated by sensor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.