The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. Other...
The 8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2012) is taking place in Hangzhou, China, from Wednesday, May 16, to Friday, May 18, 2012. Previous editions have taken place in Barcelona, Spain (2011), Santa Barbara, USA (2010), Los Angeles, USA (2009), Santorini Island, Greece (2008), Santa Fe, USA (2007), San Francisco, USA (2006), and Marina del Rey, USA...
As sensor mobility becomes more and more universal, Wireless Sensor Network (WSN) configurations that utilize such mobility will become the norm. We consider the problem of maximizing the lifetime of a wireless connection between a transmitter and a receiver using mobile relays. Initially, all relays are positioned arbitrarily on the line between the transmitter and the receiver and have arbitrary...
In this paper we investigate the network lifetime maximization problem in a delay-tolerant wireless sensor network with a mobile sink by exploiting a nontrivial tradeoff between the network lifetime and the data delivery delay. We formulate the problem as a joint optimization problem that consists of finding a trajectory for the mobile sink and designing an energy-efficient routing protocol to route...
For smaller scale wireless sensor networks (WSN) it has been clearly shown that a single mobile sink can be very beneficial with respect to the network lifetime. Yet, how to plan the trajectories of many mobile sinks in very large WSNs in order to simultaneously achieve lifetime and delay goals has not been treated so far. In this paper, we delve into this difficult problem and propose a heuristic...
The main task of most deployed wireless sensor networks is data collection. While a number of solutions have been designed for static networks, there are currently no widely used data collection algorithms for mobile sensor networks. In this paper, we concentrate on scenarios where many nodes, both data sources and sinks, move along a certain track in one direction, a scenario that is common in sports...
We study a data dissemination scenario in which data items are to be transmitted to mobile clients via one of the stationary data access points (APs) that the clients pass by en route to their destinations. The scheduler dedicates sequences of consecutive timeslots of an AP to downloading a data item to a client during the time window in which it is in range, which corresponds to assigning a job (the...
Coverage estimation is one of the fundamental issues in many applications of sensor networks. Coverage estimation in visual sensor networks (VSNs) is more challenging than in conventional 1-D scalar sensor networks (SSNs) due to the directional sensing characteristic of cameras and the existence of visual occlusions in crowded environments. Moreover, deployment of heterogeneous visual sensors and...
In Wireless Multimedia Sensor Networks (WMSNs), data fusion and collaborative in-network processing operations often require effective multimedia synchronization control. Extensive researches have been done in the traditional networks. Most of these works assume that there exists a powerful synchronization controller in the network. However, for WMSNs, the in-network processing of the multimedia content...
The Internet of Things (IoT) integrates wireless sensors to provide online and real-time access to the state of things and places. However, many interesting real-world states are difficult to detect with traditional scalar sensors. Tiny wireless camera sensor nodes are an interesting alternative as a single camera can observe a large area in great detail. However, low image resolution, poor image...
We solve the problem of localizing and tracking household objects using a depth-camera sensor network. We design and implement Kin sight that tracks household objects indirectly -- by tracking human figures, and detecting and recognizing objects from human-object interactions. We devise two novel algorithms: (1) Depth Sweep -- that uses depth information to efficiently extract objects from an image,...
In social swarming applications, participants equipped with 3G and WiFi-capable smart phones are tasked to provide reports (possibly voluminous ones that include full-motion video) about their immediate environment to a central coordinator. In this paper, we consider the problem of timely delivery of these reports: each report has an associated deadline and the goal of the system is to retrieve as...
We consider the problem of detecting clones in wireless mobile ad-hoc networks. We assume that one of the devices of the network has been cloned. Everything, including saved passwords, certificates and secret keys. We propose a solution in networks of mobile devices carried by individuals -- composedby nodes that can communicate by short-range technology like bluetooth or Wi-Fi, and links appear and...
Location privacy is one critical factor concerned by mobile users of Location Based Service (LBS). Location privacy of mobile users includes two parts: current position information and trajectory information. The problem of position anonymity in Ad Hoc & sensor networks has been widely studied during past years. Nevertheless, most of existing privacy preserving solutions either need a third part...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.