The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a new software development platform specifically designed for wireless health applications. Wireless health applications follow a unique paradigm encompassing body sensor networks. These networks are controlled by a central processing unit (such as a cell phone or PDA) that provides connectivity to health care professionals over a wide area network. With such architectures, health...
This paper presents an emergency communication system that is able to quickly deliver emergency messages over an unreliable and best-effort network such as the Internet. The proposed architecture employs application-layer multicast to rapidly deliver emergency traffic without the support of a dedicated network infrastructure. We introduce a distributed overlay tree construction and maintenance mechanism...
Medical sensor networks allow for pervasive health monitoring in hospitals, at home, or on the way. Each user carries a set of wireless medical sensors that allows caregivers to monitor his health state. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that third parties cannot access confidential information. Additionally, the system also has to be...
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols specifically designed for wireless sensor networks have been proposed in the literature. Besides providing end-to-end reliability, some of those protocols also address the problems of fairness and congestion control, and they...
Recently, researchers and engineers began considering the use of WSN in time-sensitive applications. For effective real-time communications, it is important to solve the problem of contention to the communication medium providing an efficient bandwidth allocation mechanism. In this paper we tackle with the problem of performing timely detection of events by a WSN. We propose a real-time bandwidth...
This paper looks at the scalability problems inherent in the Active Bat system: an outside-in ultrasonic location system. Such systems are typically associated with higher positioning accuracies and longer tag battery lifetimes relative to comparable inside-out systems. However, they are often criticised for a lack of scalability since multiple tags must be addressed in series to prevent interference...
This paper makes the claim that in an ad-hoc wireless sensor network, the node localization obtained using semi-definite programming methods is significantly improved by removing from the problem formulation those nodes that do not have a path to any anchor node. An algorithm is presented to identify and remove these components. Experiments conducted in this study strongly support our claim.
Sensor networks are networks of sensing units that acquire data from the environment and transmit them towards a base station. Depending on the specific nature of the application and its constraints, the communication among units and from units to the base station may rely on wired, wireless or a hybrid technology. In those scenarios where units communicate through a wired technology, e.g., a fieldbus,...
Pervasive computing envisions seamless and distraction-free application support for everyday user tasks. Achieving this requires a high degree of automation. In many scenarios, the basis for automation is context information that can be acquired unobtrusively by means of sensors. Consequently, it is vital to ensure the validity of the context information, especially, in cases where automatic decisions...
Devices in pervasive systems are resource constrained, heterogeneous, mobile and personal. The devices may seek or provide such services as data compression, encryption, image analysis, query processing and other types within a local, but dynamic network. In order to enable sharing of services and resources, it is necessary that the middleware facilitate collaboration amongst devices. Resource and...
ALYZE is a tool for planning and analyzing wireless sensor networks (WSN). The main feature is a new intuitive visualization and handling concept that eases the task to analyze a wireless sensor network. The system localizes sensor nodes that have been attached to a magnetic whiteboard. A video projector shows a real time visualization of the network topology, routing tables, node state, sensor data,...
Wireless sensor networks are expected to operate in an unattended manner for long periods of time. As a result, they should be able to tolerate faults and maintain a reasonable performance level. Therefore, we propose two fault-tolerant clustered De Bruijn based multi layered architectures, a fault-tolerant routing scheme and a distributed fault diagnosis algorithm. The performance of the proposed...
Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as those found in pervasive environments, must be cognizant of the possibility of failures and attacks. In open systems, it is seldom feasible to guarantee the reliability of each node prior to access; however, there may be several possible...
In the Project ??Semantic Product Memory?? we exploit the lessons learned so far for the general design of a Digital Product Memory (DPM). DPMs can be used along their product's life cycle to collect data by different instances. In case of the individualized weekly medicament blister for patients from 7 ?? 4 Pharma not only the collected data but even the product itself is private. If we equip such...
Self-managed communication systems are using self-adaptive algorithms to control the services they offer. It is assumed that autonomy of system operation helps to reduce operational expenses, to increase performance or even to allow the emergence of new functionalities. The comparison and the understanding of operation (jointly termed here ??assessment??) of different self-managed systems require...
This paper explores the architecture and implementation details of SCOPE platform. SCOPE is our prototype for spontaneous P2P social networking. It provides customized social networking application for local use cases. Below the network level, SCOPE relies on 802.11 ad-hoc mode and needs no infrastructure. SCOPE follows the hierarchical P2P model. Some nodes with higher computing capability become...
Decision making through distributed voting can help automate routine-like collaborative tasks. In this paper we concentrate on how distributed voting strategies can be used for scheduling meetings in mobile and pervasive environments. Our work focuses on optimizing the meeting scheduling result for each participant in a mobile team by using user-specific preferences and information available on their...
We propose a model for reliable remote storage founded on contract law. Consumers submit their bits to storage providers in exchange for a chit. A chit is a cryptographically secure, verifiable contract between a consumer and the storage provider. A user can use the chit to request the bits from the provider. In return, the provider must be able to supply the chit's bits to the user according to the...
If we expect the computer to vanish in the background, to make pervasive computing a reality, first we must be able to provide the illusion that all the user's computers, devices, and applications are part of a greater, virtual, computer. In order to build such a virtual computer, resources must be provided with a portable programmatic interface to interact with programs running on top of current...
The Internet is expanding to reach the real world, integrating the physical world into the digital world in what is called the Real World Internet (RWI). Sensor and actuator networks deployed all over the Internet will play the role of collecting sensor data and context information from the physical world and integrating it into the future RWI. In this paper we present the SENSEI architecture approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.