Sensor network operations / (Record no. 73758)

000 -LEADER
fixed length control field 12946nam a2201441 i 4500
001 - CONTROL NUMBER
control field 5237066
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220712205609.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151221s2006 njua ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780471784173
-- electronic
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- print
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic
082 04 - CLASSIFICATION NUMBER
Call Number 621.3821
245 00 - TITLE STATEMENT
Title Sensor network operations /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (xix, 724 pages) :
505 0# - FORMATTED CONTENTS NOTE
Remark 2 PREFACE -- CONTRIBUTORS -- I SENSOR NETWORK OPERATIONS OVERVIEW -- 1 Overview of Mission-Oriented Sensor Networks -- 1.1 Introduction -- 1.2 Trends in Sensor Development -- 1.3 Mission-Oriented Sensor Networks: Dynamic Systems Perspective -- References -- II SENSOR NETWORK DESIGN AND OPERATIONS -- 2 Sensor Deployment, Self-Organization, and Localization -- 2.1 Introduction -- 2.2 SCARE: A Scalable Self-Configuration and Adaptive Reconfiguration Scheme for Dense Sensor Networks -- 2.3 Robust Sensor Positioning in Wireless Ad Hoc Sensor Networks -- 2.4 Trigonometric k Clustering (TKC) for Censored Distance Estimation -- 2.5 Sensing Coverage and Breach Paths in Surveillance Wireless Sensor Networks -- References -- 3 Purposeful Mobility and Navigation -- 3.1 Introduction -- 3.2 Controlled Mobility for Efficient Data Gathering in Sensor�Networks with Passively Mobile Nodes -- 3.3 Purposeful Mobility in Tactical Sensor Networks -- 3.4 Formation and Alignment of Distributed Sensing Agents with Double-Integrator Dynamics and Actuator Saturation -- 3.5 Modeling and Enhancing the Data Capacity of Wireless Sensor Networks -- References -- 4 Lower Layer Issues-MAC, Scheduling, and Transmission -- 4.1 Introduction -- 4.2 SS-TDMA: A Self-Stabilizing Medium Access Control (MAC) for Sensor Networks -- 4.3 Comprehensive Performance Study of IEEE 802.15.4 -- 4.4 Providing Energy Efficiency for Wireless Sensor Networks�Through Link Adaptation Techniques -- References -- 5 Network Routing -- 5.1 Introduction -- 5.2 Load-Balanced Query Protocols for Wireless Sensor Networks -- 5.3 Energy-Efficient and MAC-Aware Routing for Data Aggregation in Sensor Networks -- 5.4 LESS: Low-Energy Security Solution for Large-scale Sensor�Networks Based on Tree-Ripple-Zone Routing Scheme -- References -- 6 Power Management -- 6.1 Introduction -- 6.2 Adaptive Sensing and Reporting in Energy-Constrained Sensor Networks -- 6.3 Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 6.4 Algorithms for Maximizing Lifetime of Battery-Powered Wireless Sensor Nodes -- 6.5 Battery Lifetime Estimation and Optimization for Underwater Sensor Networks -- References -- 7 Distributed Sensing and Data Gathering -- 7.1 Introduction -- 7.2 Secure Differential Data Aggregation for Wireless Sensor Networks -- 7.3 Energy-Conserving Data Gathering Strategy Based on Trade-off Between Coverage and Data Reporting Latency in Wireless Sensor Networks -- 7.4 Quality-Driven Information Processing and Aggregation in Distributed Sensor Networks -- 7.5 Progressive Approach to Distributed Multiple-Target Detection in Sensor Networks -- References -- 8 Network Security -- 8.1 Introduction -- 8.2 Energy Cost of Embedded Security for Wireless Sensor Networks -- 8.3 Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks -- 8.4 Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks -- 8.5 Fast and Scalable Key Establishment in Sensor Networks -- 8.6 Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks -- References -- III SENSOR NETWORK APPLICATIONS -- 9 Pursuer-Evader Tracking in Sensor Networks -- 9.1 Introduction -- 9.2 The Problem -- 9.3 Evader-Centric Program -- 9.4 Pursuer-Centric Program -- 9.5 Hybrid Pursuer-Evader Program -- 9.6 Efficient Version of Hybrid Program -- 9.7 Implementation and Simulation Results -- 9.8 Discussion and Related Work -- References -- 10 Embedded Soft Sensing for Anomaly Detection in Mobile Robotic Networks -- 10.1 Introduction -- 10.2 Mobile Robot Simulation Setup -- 10.3 Software Anomalies in Mobile Robotic Networks -- 10.4 Soft Sensor -- 10.5 Software Anomaly Detection Architecture -- 10.6 Anomaly Detection Mechanisms -- 10.7 Test Bed for Software Anomaly Detection in Mobile Robot Application -- 10.8 Results and Discussion -- 10.9 Conclusions and Future Work -- Appendix A -- Appendix B -- References -- 11 Multisensor Network-Based Framework for Video Surveillance: Real-Time Superresolution Imaging.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 11.1 Introduction -- 11.2 Basic Model of Distributed Multisensor Surveillance System -- 11.3 Superresolution Imaging -- 11.4 Optical Flow Computation -- 11.5 Superresolution Image Reconstruction -- 11.6 Experimental Results -- 11.7 Conclusion -- References -- 12 Using Information Theory to Design Context-Sensing Wearable Systems -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Theoretical Background -- 12.4 Adaptations -- 12.5 Design Considerations -- 12.6 Case Study -- 12.7 Results -- 12.8 Conclusion -- Appendix -- References -- 13 Multiple Bit Stream Image Transmission over Wireless Sensor Networks -- 13.1 Introduction -- 13.2 System Description -- 13.3 Experimental Results -- 13.4 Summary and Discussion -- References -- 14 Hybrid Sensor Network Test Bed for Reinforced Target Tracking -- 14.1 Introduction -- 14.2 Sensor Network Operational Components -- 14.3 Sensor Network Challenge Problem -- 14.4 Integrated Target Surveillance Experiment -- 14.5 Experimental Results and Evaluation -- 14.6 Conclusion -- References -- 15 Noise-Adaptive Sensor Network for Vehicle Tracking in the Desert -- 15.1 Introduction -- 15.2 Distributed Tracking -- 15.3 Algorithms. 15.4 Experimental Methods -- 15.5 Results and Discussion -- 15.6 Conclusion -- References -- ACKNOWLEDGMENTS -- INDEX -- ABOUT THE EDITORS.
520 ## - SUMMARY, ETC.
Summary, etc This excellent title introduces the concept of mission-oriented sensor networks as distributed dynamic systems of interacting sensing devices that are networked to jointly execute complex real-time missions under uncertainity. It provides the latest, yet unpublished results on the main technical and application challenges of mission-oriented sensor networks. The authors of each chapter are research leaders from multiple disciplines who are presenting their latest innovations on the issues. Together, the editors have compiled a comprehensive treatment of the subject that flows smoothly from chapter to chapter. This interdisciplinary approach significantly enhances the science and technology knowledge base and influences the military and civilian applications of this field. Author Information: Dr. Shashi Phoha is the Guest Editor of IEEE Transactions in Mobile Computing, Special Issue on Mission-Oriented Sensor Networks. She is the Head of the Information Sciences and Technology Division of ARL and Professor of Electrical and Computer Engineering at Pennsylvania State University. She has led major research programs of multimillion dollars for military sensor networks in industry as well as in academia. In addition to more than a hundred journal articles, she authored or co-authored several books in related areas. Dr. Thomas La Porta is the Editor of the IEEE Transactions on Mobile Computing. He received his B.S.E.E. and M.S.E.E. degrees from The Cooper Union, New York, NY and his Ph.D. degree in Electrical Engineering from Columbia University, New York, NY. He joined the Computer Science and Engineering Department at Penn State in 2002 as a Full Professor. He is Director of the Networking Research Center at Penn State. Prior to joining Penn State, Dr. LaPorta was with Bell Laboratories since 1986. He was the Director of the Mobile Networking Research Department Bell Laboratories, Lucent Technologies, where he led various projects in wireless and mobile networking. He is an IEEE Fellow, Bell Labs Fellow, received the Bell Labs Distinguished Technical Staff Award, and an Eta Kappa Nu Outstanding Young Electrical Engineer Award. He has published over 50 technical papers and holds over 20 patents. Christopher Griffin holds a Masters degree in Mathematics from Penn State and is currently pursuing his Ph.D. there. Mr. Griffin has worked as a research engineer at the Penn State Applied Research Laboratory for the last six years on several DARPA and or Army Research Laboratory sponsored programs, including: the Emergent Surveillance Plexus (ESP) program as a lead engineer; the DARPA sponsored Semantic Information Fusion program under the SensIT initiative, where he co-developed a distributed target tracking system and managed the development of a target classification algorithm using Level 1 sensor fusion techniques; as a co-principal software architect for the DARPA Joint Force Component Controller (JFACC) initiative, an adaptive C2 program aimed at improving Air Force response times; and he was the principal software architect for the Boeing/ARFL Insertion of Embedding Infosphere Technology (IEIST) program. His areas of research expertise are distributed tracking systems, mission oriented control, and system modeling.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
Subject Sensor networks.
700 1# - AUTHOR 2
Author 2 Phoha, Shashi,
700 1# - AUTHOR 2
Author 2 La Porta, Thomas F.
700 1# - AUTHOR 2
Author 2 Griffin, Christopher,
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5237066
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Piscataway, New Jersey :
-- IEEE Press,
-- c2006.
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2006]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
588 ## -
-- Description based on PDF viewed 12/21/2015.
695 ## -
-- Routing protocols
695 ## -
-- Sections
695 ## -
-- Security
695 ## -
-- Sensor fusion
695 ## -
-- Sensors
695 ## -
-- Signal processing algorithms
695 ## -
-- Signal to noise ratio
695 ## -
-- Software
695 ## -
-- Streaming media
695 ## -
-- Surveillance
695 ## -
-- Switches
695 ## -
-- Synchronization
695 ## -
-- Target tracking
695 ## -
-- Testing
695 ## -
-- Three dimensional displays
695 ## -
-- Time division multiple access
695 ## -
-- Topology
695 ## -
-- Transducers
695 ## -
-- Transient analysis
695 ## -
-- Vehicle dynamics
695 ## -
-- Vehicles
695 ## -
-- Video surveillance
695 ## -
-- Wireless sensor networks
695 ## -
-- Ad hoc networks
695 ## -
-- Adaptive systems
695 ## -
-- Analytical models
695 ## -
-- Array signal processing
695 ## -
-- Base stations
695 ## -
-- Biographies
695 ## -
-- Cameras
695 ## -
-- Computational modeling
695 ## -
-- Computer architecture
695 ## -
-- Context
695 ## -
-- Data communication
695 ## -
-- Decoding
695 ## -
-- Distributed databases
695 ## -
-- Elliptic curves
695 ## -
-- Encoding
695 ## -
-- Encryption
695 ## -
-- Energy consumption
695 ## -
-- Entropy
695 ## -
-- Error correction codes
695 ## -
-- Estimation
695 ## -
-- Fault tolerance
695 ## -
-- Fault tolerant systems
695 ## -
-- Global Positioning System
695 ## -
-- Hardware
695 ## -
-- Heuristic algorithms
695 ## -
-- Histograms
695 ## -
-- Image coding
695 ## -
-- Image communication
695 ## -
-- Indexes
695 ## -
-- Interference
695 ## -
-- Joints
695 ## -
-- Load modeling
695 ## -
-- Markov processes
695 ## -
-- Media Access Protocol
695 ## -
-- Memory management
695 ## -
-- Mobile communication
695 ## -
-- Mobile computing
695 ## -
-- Mobile robots
695 ## -
-- Monitoring
695 ## -
-- Mutual information
695 ## -
-- Network topology
695 ## -
-- Operating systems
695 ## -
-- Peer to peer computing
695 ## -
-- Power demand
695 ## -
-- Protocols
695 ## -
-- Public key
695 ## -
-- Quality of service
695 ## -
-- Random access memory
695 ## -
-- Random variables
695 ## -
-- Relays
695 ## -
-- Robot kinematics
695 ## -
-- Robot sensing systems
695 ## -
-- Routing

No items available.