- Real-Time Systems Scheduling
- Energy Efficient Wireless Sensor Networks
- Context-Aware Activity Recognition Systems
- Distributed systems and fault tolerance
- Distributed and Parallel Computing Systems
- Embedded Systems Design Techniques
- Mobile Ad Hoc Networks
- Indoor and Outdoor Localization Technologies
- Opportunistic and Delay-Tolerant Networks
- Petri Nets in System Modeling
- Parallel Computing and Optimization Techniques
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Scheduling and Optimization Algorithms
- Transportation and Mobility Innovations
- Software System Performance and Reliability
- Energy Harvesting in Wireless Networks
- Cloud Computing and Resource Management
- Wireless Networks and Protocols
- Music and Audio Processing
- Advanced Software Engineering Methodologies
- Human Mobility and Location-Based Analysis
- Wireless Body Area Networks
- Advanced Database Systems and Queries
- Transportation Planning and Optimization
University of Virginia
2015-2024
Columbia University
2022
Charlottesville Medical Research
2012-2020
University of Pennsylvania
2018
Robert Bosch (United States)
2015-2017
Stony Brook University
2016
University of Minnesota
2014
TU Wien
2012
Urology of Virginia
2010
Intel (United States)
2008
Wireless Sensor Networks have been proposed for a multitude of location-dependent applications. For such systems, the cost and limitations hardware on sensing nodes prevent use range-based localization schemes that depend absolute point-to-point distance estimates. Because coarse accuracy is sufficient most sensor network applications, solutions in range-free are being pursued as cost-effective alternative to more expensive approaches. In this paper, we present APIT, novel algorithm...
Many technical communities are vigorously pursuing research topics that contribute to the Internet of Things (IoT). Nowadays, as sensing, actuation, communication, and control become even more sophisticated ubiquitous, there is a significant overlap in these communities, sometimes from slightly different perspectives. More cooperation between encouraged. To provide basis for discussing open problems IoT, vision how IoT could change world distant future first presented. Then, eight key...
Cyber-physical systems (CPS) are physical and engineered whose operations monitored, coordinated, controlled integrated by a computing communication core. Just as the internet transformed how humans interact with one another, cyber-physical will transform we world around us. Many grand challenges await in economically vital domains of transportation, health-care, manufacturing, agriculture, energy, defense, aerospace buildings. The design, construction verification pose multitude technical...
Sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments, helping to protect and monitor military, environmental, safety-critical, or domestic infrastructures resources, Denial-of-service attacks against such networks, however, may permit real world damage public health safety. Without proper security mechanisms, will be confined limited, controlled negating much they hold. The limited ability individual sensor nodes thwart failure...
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial service, while prompting range fundamental research challenges.
In this paper, we present a real-time communication protocol for sensor networks, called SPEED. The provides three types of services, namely, unicast, area-multicast and area-anycast. SPEED is specifically tailored to be stateless, localized algorithm with minimal control overhead End-to-end soft achieved by maintaining desired delivery speed across the network through novel combination feedback non-deterministic geographic forwarding. highly efficient scalable networks where resources each...
The author defines real-time computing and states dispels the most common misconceptions about it. He discusses fundamental technical issues of computing. examines specification verification, scheduling theory, operating systems, programming languages design methodology, distributed databases, artificial intelligence, fault tolerance, architectures, communication.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
In this paper, we investigate the impact of radio irregularity on communication performance in wireless sensor networks. Radio is a common phenomenon which arises from multiple factors, such as variance RF sending power and different path losses depending direction propagation. From our experiments, discover that received signal strength largely random; however, it exhibits continuous change with incremental changes direction. With empirical data obtained MICA2 platform, establish model for...
The focus of surveillance missions is to acquire and verify information about enemy capabilities positions hostile targets. Such often involve a high element risk for human personnel require degree stealthiness. Hence, the ability deploy unmanned missions, by using wireless sensor networks, great practical importance military. Because energy constraints devices, such systems necessitate an energy-aware design ensure longevity missions. Solutions proposed recently this type system show...
Driven by the confluence between need to collect data about people's physical, physiological, psychological, cognitive, and behavioral processes in spaces ranging from personal urban recent availability of technologies that enable this collection, wireless sensor networks for healthcare have emerged years. In review, we present some representative applications domain describe challenges they introduce due required level trustworthiness ensure privacy security medical data. These are...
Falls are dangerous for the aged population as they can adversely affect health. Therefore, many fall detection systems have been developed. However, prevalent methods only use accelerometers to isolate falls from activities of daily living (ADL). This makes it difficult distinguish real certain fall-like such sitting down quickly and jumping, resulting in false positives. Body orientation is also used a means detecting falls, but not very useful when ending position horizontal, e.g. happen...
Extensive empirical studies presented in this paper confirm that the quality of radio communication between low power sensor devices varies significantly with time and environment. This phenomenon indicates previous topology control solutions, which use static transmission power, range, link quality, might not be effective physical world. To address issue, online adapts to external changes is necessary. presents ATPC, a lightweight algorithm Adaptive Transmission Power Control for wireless...
Large-scale wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from traditional networked systems. This paper presents RAP, architecture for large-scale networks. RAP provides convenient, high-level query and event services distributed micro-sensing applications. Novel location-addressed models are supported by scalable light-weight network stack. We present evaluate packet scheduling policy called velocity...
For many sensor network applications such as military surveillance, it is necessary to provide full sensing coverage a security-sensitive area while at the same time minimizing energy consumption and extending system lifetime by leveraging redundant deployment of nodes. It also preferable for differentiated surveillance service various target areas with different degrees security requirements. In this paper, we propose networks based on an adaptable energy-efficient protocol. protocol, each...
This article describes one of the major efforts in sensor network community to build an integrated system for surveillance missions. The focus this effort is acquire and verify information about enemy capabilities positions hostile targets. Such missions often involve a high element risk human personnel require degree stealthiness. Hence, ability deploy unmanned missions, by using wireless networks, great practical importance military. Because energy constraints devices, such systems...
Heating, ventilation and cooling (HVAC) is the largest source of residential energy consumption. In this paper, we demonstrate how to use cheap simple sensing technology automatically sense occupancy sleep patterns in a home, these save by turning off home's HVAC system. We call approach smart thermostat. evaluate deploying sensors 8 homes comparing expected usage our algorithm against existing approaches. that will achieve 28% saving on average, at cost approximately $25 sensors....
Sensor networks can be considered distributed computing platforms with many severe constraints, including limited CPU speed, memory size, power, and bandwidth. Individual nodes in sensor are typically unreliable the network topology dynamically changes, possibly frequently. also differ because of their tight interaction physical environment via sensors actuators. Because this interaction, we find that very data-centric. Due to all these differences, solutions developed for general ad-hoc...
This paper summarizes the state of real-time field in areas scheduling and operating system kernels. Given vast amount work that has been done by both operations research computer science communities area, we discuss four paradigms underlying approaches present several exemplars each. The are: static table-driven scheduling, priority preemptive dynamic planning-based best effort scheduling. In context, argue most proprietary commercial kernels as well extensions to time-sharing do not fit...
In this article, we investigate the impact of radio irregularity on wireless sensor networks. Radio is a common phenomenon that arises from multiple factors, such as variance in RF sending power and different path losses, depending direction propagation. From our experiments, discover received signal strength largely random; however, it exhibits continuous change with incremental changes direction. With empirical data obtained MICA2 MICAZ platforms, establish model for simulation, called...
Improving the quality of healthcare and prospects "aging in place" using wireless sensor technology requires solving difficult problems scale, energy management, data access, security, privacy. We present AlarmNet, a novel system for assisted living residential monitoring that uses two-way flow analysis between front- back-ends to enable context-aware protocols are tailored residents' individual patterns living. AlarmNet integrates environmental, physiological, activity sensors scalable...
Knowledge of complexity, fundamental limits and performance bounds-well known for many scheduling problems-helps real time designers choose a good design algorithm avoid poor ones. The problem has so dimensions that it no accepted taxonomy. We divide theory between uniprocessor multiprocessor results. In the section, we begin with independent tasks then consider shared resources overload. work static dynamic algorithms.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML"...