Filters








83 Hits in 8.0 sec

Detecting time-related changes in Wireless Sensor Networks using symbol compression and Probabilistic Suffix Trees

YuanYuan Li, M Thomason, L E Parker
2010 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems  
Finally, a Variable Memory Markov (VMM) model in the form of a Probabilistic Suffix Tree (PST) is used to model and detect time-related anomalies in the environment.  ...  Our research focuses on anomaly detection problems in unknown environments using Wireless Sensor Networks (WSN).  ...  The VMM model can be implemented in the form of Probabilistic Suffix Tree (PST) model.  ... 
doi:10.1109/iros.2010.5649660 dblp:conf/iros/LiTP10 fatcat:uwfxqgpoabdq7m4irjnovf6ml4

Sequential Anomaly Detection Using Wireless Sensor Networks in Unknown Environment [chapter]

Yuanyuan Li, Michael Thomason, Lynne E. Parker
2014 Human Behavior Understanding in Networked Sensing  
Anomaly detection is an important problem for environment, fault diagnosis and intruder detection in Wireless Sensor Networks (WSNs).  ...  Next, we use a variable length Markov model in the form of a Probabilistic Suffix Tree (PST) to model the relationship between temporal events.  ...  The system first detects sensory level anomalies using an unsupervised neural network and then detects time-related changes online by using a likelihood-ratio detection scheme.  ... 
doi:10.1007/978-3-319-10807-0_5 fatcat:64w4xspjlrftzjirybgnafn5gy

Efficient Pattern Detection in Extremely Resource-Constrained Devices

Michael Zoumboulakis, George Roussos
2009 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks  
We present a novel approach for the on-line detection of Complex Events in Wireless Sensor Networks.  ...  Complex Event Detection is then performed via four alternative modes: (a.) multiple pattern detection using a suffix array, (b.) distance-based comparison, (c.) unknown pattern detection, and (d.) probabilistic  ...  ACKNOWLEDGMENTS The authors would like to thank Dr Eamonn Keogh who patiently answered our SAX-related questions and provided relevant code and test data.  ... 
doi:10.1109/sahcn.2009.5168929 dblp:conf/secon/ZoumboulakisR09 fatcat:oy3unaj6nbbzlj6rpfugiyalci

Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks

Michael Zoumboulakis, George Roussos
2010 Journal on spesial topics in mobile networks and applications  
Such events are ubiquitous in a wide range of Wireless Sensor Network (WSN) applications, yet there does not exist a common mechanism that addresses both the considerable constraints of WSNs and the specific  ...  To address this, we develop a family of Complex Event Detection (CED) algorithms based on online symbolic conversion of sensor readings.  ...  suffix trees and Suffix Arrays.  ... 
doi:10.1007/s11036-010-0268-0 fatcat:ks6rgyfhazfxdffwz7dv7lx7te

Bugs or anomalies? Sequence mining based debugging in wireless sensor networks

Kefa Lu, Qing Cao, Michael Thomason
2012 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)  
At first, we develop a data structure called the vectorized Probabilistic Suffix Tree (vPST), an elastic model to extract and store sequential information from program runtime traces in compact suffix  ...  In this paper, we propose and develop a flexible and iterative WSN debugging system based on sequence mining techniques.  ...  The work reported in this paper was supported in part by the National Science Foundation grant CNS-0953238 and CNS-1117384.  ... 
doi:10.1109/mass.2012.6502549 dblp:conf/mass/LuCT12 fatcat:dx25bimbkra3tnbs5proh2lbau

The role of prediction algorithms in the MavHome smart home architecture

S.K. Das, D.J. Cook, A. Battacharya, E.O. Heierman, Tze-Yun Lin
2002 IEEE wireless communications  
Wireless terminals are usually integrated in the sensors deployed in a I Figure 1 . MavHome agent architecture. smart home environment and are to be worn by the inhabitants.  ...  His research interests include wireless networks, mobile and pervasive computing, parallel/distributed processing, performance modeling, and simulation.  ... 
doi:10.1109/mwc.2002.1160085 fatcat:ovlwmti25jgs3axbrfabfiflru

Digital investigations for IPv6-based Wireless Sensor Networks

Vijay Kumar, George Oikonomou, Theo Tryfonas, Dan Page, Iain Phillips
2014 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Developments in the field of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) mean that sensor devices can now be uniquely identified using an IPv6 address and, if suitably connected, can  ...  Should an attack take place, post-incident analysis can reveal information about the state of the network at the time of the attack and ultimately provide clues about the tools used to implement it, or  ...  In a slightly different approach, it has been demonstrated that compressed sensing techniques can be employed in order to overhear encrypted wireless transmissions, detect the traffic's periodic components  ... 
doi:10.1016/j.diin.2014.05.005 fatcat:cbloopj6ibhxponlgw6mobuef4

Monitoring the Environmental Impact of TiO$_{\bf 2}$ Nanoparticles Using a Plant-Based Sensor Network

Scott C. Lenaghan, Yuanyuan Li, Hao Zhang, Jason N. Burris, C. Neal Stewart, Lynne E. Parker, Mingjun Zhang
2013 IEEE transactions on nanotechnology  
Using the proposed plant sensor network, we were able to examine the toxicity of TiO2 nanoparticles in two systems: algae and terrestrial plants.  ...  The proposed plant-based sensor network could be used for more accurate characterization of the environmental impact of nanomaterials.  ...  ., a probabilistic suffix tree (PST) [45] , was used to model the compressed temporal sequence.  ... 
doi:10.1109/tnano.2013.2242089 pmid:28458617 pmcid:PMC5409134 fatcat:ja2eruegkjhnjedqayhzkzal3q

Exploring Application-Level Semantics for Data Compression

Hsiao-Ping Tsai, De-Nian Yang, Ming-Syan Chen
2011 IEEE Transactions on Knowledge and Data Engineering  
In this paper, we first propose an efficient distributed mining algorithm to jointly identify a group of moving objects and discover their movement patterns in wireless sensor networks.  ...  In the sequence merge phase, we propose a Merge algorithm to merge and compress the location data of a group of moving objects.  ...  ACKNOWLEDGMENTS The work was supported in part by the National Science Council of Taiwan, R.O.C., under Contracts NSC99-2218-E-005-002 and NSC99-2219-E-001-001.  ... 
doi:10.1109/tkde.2010.30 fatcat:m2btythlsnfdppydw277nbjkxm

Probabilistic Threshold Indexing for Uncertain Strings [article]

Sharma V. Thankachan, Manish Patil, Rahul Shah, Sudip Biswas
2015 arXiv   pre-print
Given a construction time probability value τ, our indexes can be constructed in linear space and supports queries in near optimal time for arbitrary values of probability threshold parameter greater than  ...  In this paper we consider two basic problems of string searching, namely substring searching and string listing.  ...  For example sequence data in bioinformatics is often uncertain and probabilistic. Sensor networks and satellites inherently gather noisy information.  ... 
arXiv:1509.08608v1 fatcat:cabx4xtq3vay7kwd6x23qfiizq

A review of novelty detection

Marco A.F. Pimentel, David A. Clifton, Lei Clifton, Lionel Tarassenko
2014 Signal Processing  
This approach has been used in wireless sensor networks [152] and intrusion detection systems [151] .  ...  The similarity measure uses the conditional probability distribution derived from sequences, where a variation of the suffix tree (the probabilistic suffix tree) is used to estimate the distribution.  ... 
doi:10.1016/j.sigpro.2013.12.026 fatcat:ha6kc4bzhbajxbo2mdyh5cw5hu

Intelligent D-Band wireless systems and networks initial designs

Marco Di Renzo, Xuewen Qian, Halid Hrasnica, Nikos Katzouris, Kyriakos Manganaris, Dimitris Selimis, Fotis Lazarakis, Tachporn Sanguanpuak, Heikki Halmetoja, Moamen Ibrahim, Edwin Yaqub, Rachana Desai (+5 others)
2021 Zenodo  
In short, the D4.2 provides results on promising AI and ML based methods along with their limitations and potentials that have been investigated in the ARIADNE project.  ...  This deliverable gives the results of the ARIADNE project's Task 4.2: Machine Learning based network intelligence.  ...  To deal with the ever changing topology and time-varying channel conditions of ultradense mobile wireless networks, in [171] , a deep Q-learning model was presented that uses quantized local AP and UE  ... 
doi:10.5281/zenodo.5718378 fatcat:l3rkacgotzazha564nqm6wchiy

Completely Distributed Particle Filters for Target Tracking in Sensor Networks

Bo Jiang, Binoy Ravindran
2011 2011 IEEE International Parallel & Distributed Processing Symposium  
Despite their remarkable tracking performance and flexibility, PFs require intensive computation and communication, which are strictly constrained in wireless sensor networks (or WSNs).  ...  In this paper, we design a completely distributed particle filter (or CDPF) for target tracking in sensor networks, and further improve it with neighborhood estimation toward minimizing the communication  ...  Among the typical detection models (including instant detection, sampling detection, energy detection [18] , and probabilistic detection [19] ), we consider the instant detection model, i.e., a sensor  ... 
doi:10.1109/ipdps.2011.40 dblp:conf/ipps/JiangR11 fatcat:5f6oul2e2zbupj4mnv3hybj2im

Program book

2010 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)  
, and phenomena detection on sensor networks.  ...  In this paper, we propose the notion of sufficient set for distributed processing of probabilistic Top-k queries in cluster-based wireless sensor networks.  ...  Adaptation of existing approaches in search and advertising to social networks is not straight-forward as well: the standard advertising models used in the context of sponsored search appear to break down  ... 
doi:10.1109/icdew.2010.5452773 fatcat:oyq2tujbvjfpxjlyixux5q57vu

Welcome Message from the General Chair

2006 International Conference on Dependable Systems and Networks (DSN'06)  
We are grateful to all members of these committees for their time and efforts.  ...  This is the third time the conference is visiting, after Montreal (1980) and Vancouver (1992.)  ...  Acknowledgements The contents presented in this document would not have been available to the attendees of the VLDB conference without the contributions of Mike Godfrey (MG) and Dave Wortman (DW), who  ... 
doi:10.1109/dsn.2006.75 dblp:conf/dsn/X06 fatcat:k4duddvbk5glboxkqxkkfsh4p4
« Previous Showing results 1 — 15 out of 83 results