• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 64,051
Next 10 →

Surviving Sensor Network Software Faults

by Yang Chen, Omprakash Gnawali, Maria Kaz, Philip Levis, John Regehr - In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, Big Sky , 2009
"... We describe Neutron, a version of the TinyOS operating system that efficiently recovers from memory safety bugs. Where existing schemes reboot an entire node on an error, Neutron’s compiler and runtime extensions divide programs into recovery units and reboot only the faulting unit. The TinyOS kerne ..."
Abstract - Cited by 26 (1 self) - Add to MetaCart
We describe Neutron, a version of the TinyOS operating system that efficiently recovers from memory safety bugs. Where existing schemes reboot an entire node on an error, Neutron’s compiler and runtime extensions divide programs into recovery units and reboot only the faulting unit. The TinyOS kernel itself is a recovery unit: a kernel safety violation appears to applications as the processor being unavailable for 10–20 milliseconds. Neutron further minimizes safety violation cost by supporting “precious ” state that persists across reboots. Application data, time synchronization state, and routing tables can all be declared as pre-cious. Neutron’s reboot sequence conservatively checks that pre-cious state is not the source of a fault before preserving it. Together, recovery units and precious state allow Neutron to reduce a safety violation’s cost to time synchronization by 94 % and to a routing protocol by 99.5%. Neutron also protects applications from losing data. Neutron provides this recovery on the very limited resources of a tiny, low-power microcontroller.

On Mining Sensor Network Software Repositories

by Andreas Loukas, Matthias Woehrle, Koen Langendoen
"... Wireless Sensor Network (WSN) software is typically developed in one of the two prominent WSN operating systems: TinyOS or Contiki. Both of these operating systems are open-source projects and basically frameworks for WSN developers. In this paper, we study the software repositories of these two pro ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Wireless Sensor Network (WSN) software is typically developed in one of the two prominent WSN operating systems: TinyOS or Contiki. Both of these operating systems are open-source projects and basically frameworks for WSN developers. In this paper, we study the software repositories of these two

Wireless Sensor Networks: Software Architecture

by Muhammad Adeel , Javaid Member , Advisory Council , Comptia
"... Abstract ..."
Abstract - Add to MetaCart
Abstract not found

Eide: Resource Management Aspects for Sensor Network Software

by Sean Walton, Eric Eide - PLOS ’07 Proceedings of the 4th workshop on Programming languages and operating systems, Article No. 5, October 2007, National Science Foundation
"... The software that runs on a typical wireless sensor network node must address a variety of constraints that are imposed by its pur-pose and implementation platform. Examples of such constraints include real-time behavior, highly limited RAM and ROM, and other scarce resources. These constraints lead ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
The software that runs on a typical wireless sensor network node must address a variety of constraints that are imposed by its pur-pose and implementation platform. Examples of such constraints include real-time behavior, highly limited RAM and ROM, and other scarce resources. These constraints

Sensor Network Software Update Management: A Survey

by Chih-chieh Han, Ram Kumar, Roy Shea, Mani Srivastava - Journal of Network Management , 2005
"... The existing tools for software updates in workstations cannot be used with the severely resource constrained sensor nodes. In this article, we survey the software update techniques based on a conceptual model in WSNs. Three components of this model that we study are the execution environment at the ..."
Abstract - Cited by 21 (0 self) - Add to MetaCart
at the sensor nodes, the software distribution protocol in the network and optimization of transmitted updates. Software management is a critical task in the system administration of enterprise scale net-works. Enterprise scale networks that have traditionally comprised of large clusters of worksta

Anquiro: enabling efficient static verification of sensor network software

by Luca Mottola, Thiemo Voigt, Fredrik Österlind, Joakim Eriksson, Luciano Baresi, Carlo Ghezzi - In Proceedings of the 2010 ICSE Workshop on Software Engineering for Sensor Network Applications, SESENA ’10 , 2010
"... We present ANQUIRO, a domain-specific model checker for statically verifying the correctness of sensor network software. In this context, static verification has hitherto received little attention, as state space explosion problems may prevent applying these techniques. ANQUIRO overcomes this limita ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
We present ANQUIRO, a domain-specific model checker for statically verifying the correctness of sensor network software. In this context, static verification has hitherto received little attention, as state space explosion problems may prevent applying these techniques. ANQUIRO overcomes

ANALYSIS OF WIRELESS SENSOR NETWORKS FOR HABITAT MONITORING

by Joseph Polastre, Robert Szewczyk, Alan Mainwaring, David Culler, John Anderson , 2004
"... We provide an in-depth study of applying wireless sensor networks (WSNs) to real-world habitat monitoring. A set of system design requirements were developed that cover the hardware design of the nodes, the sensor network software, protective enclosures, and system architecture to meet the require ..."
Abstract - Cited by 1490 (19 self) - Add to MetaCart
We provide an in-depth study of applying wireless sensor networks (WSNs) to real-world habitat monitoring. A set of system design requirements were developed that cover the hardware design of the nodes, the sensor network software, protective enclosures, and system architecture to meet

Context-Oriented Programming for Adaptive Wireless Sensor Network Software Mikhail Afanasov

by Politecnico Di Milano, Luca Mottola, Carlo Ghezzi
"... Abstract—We present programming abstractions for imple-menting adaptive Wireless Sensor Network (WSN) software. The need for adaptability arises in WSNs because of unpredictable environment dynamics, changing requirements, and resource scarcity. However, after about a decade of research in WSN progr ..."
Abstract - Add to MetaCart
Abstract—We present programming abstractions for imple-menting adaptive Wireless Sensor Network (WSN) software. The need for adaptability arises in WSNs because of unpredictable environment dynamics, changing requirements, and resource scarcity. However, after about a decade of research in WSN

Distributed Sensor Network Software Development Testing through Simulation

by Sean M. Brennan, Sean M. Brennan, Sean M. Brennan , 2003
"... publication policies. ..."
Abstract - Add to MetaCart
publication policies.

Tinysec: A link layer security architecture for wireless sensor networks

by Chris Karlof, Naveen Sastry, David Wagner - in Proc of the 2nd Int’l Conf on Embedded Networked Sensor Systems
"... We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols te ..."
Abstract - Cited by 521 (0 self) - Add to MetaCart
results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10 % energy, latency, and bandwidth overhead.
Next 10 →
Results 1 - 10 of 64,051
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University