SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Booleska operatorer måste skrivas med VERSALER

Träfflista för sökning "AMNE:(NATURAL SCIENCES Computer and Information Sciences) ;pers:(Voigt Thiemo)"

Sökning: AMNE:(NATURAL SCIENCES Computer and Information Sciences) > Voigt Thiemo

  • Resultat 1-10 av 307
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Li, Shenghui, 1994-, et al. (författare)
  • Byzantine-Robust Aggregation in Federated Learning Empowered Industrial IoT
  • 2023
  • Ingår i: IEEE Transactions on Industrial Informatics. - : Institute of Electrical and Electronics Engineers (IEEE). - 1551-3203 .- 1941-0050. ; 19:2, s. 1165-
  • Tidskriftsartikel (refereegranskat)abstract
    • Federated Learning (FL) is a promising paradigm to empower on-device intelligence in Industrial Internet of Things(IIoT) due to its capability of training machine learning models across multiple IIoT devices, while preserving the privacy of their local data. However, the distributed architecture of FL relies on aggregating the parameter list from the remote devices, which poses potential security risks caused by malicious devices. In this paper, we propose a flexible and robust aggregation rule, called Auto-weighted Geometric Median (AutoGM), and analyze the robustness against outliers in the inputs. To obtain the value of AutoGM, we design an algorithm based on alternating optimization strategy. Using AutoGM as aggregation rule, we propose two robust FL solutions, AutoGM_FL and AutoGM_PFL. AutoGM_FL learns a shared global model using the standard FL paradigm, and AutoGM_PFL learns a personalized model for each device. We conduct extensive experiments on the FEMNIST and Bosch IIoT datasets. The experimental results show that our solutions are robust against both model poisoning and data poisoning attacks. In particular, our solutions sustain high performance even when 30% of the nodes perform model or 50% of the nodes perform data poisoning attacks.
  •  
2.
  • Al Nahas, Beshr, 1985, et al. (författare)
  • Low-power listening goes multi-channel
  • 2014
  • Ingår i: Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014. ; , s. 2-9
  • Konferensbidrag (refereegranskat)abstract
    • Exploiting multiple radio channels for communication has been long known as a practical way to mitigate interference in wireless settings. In Wireless Sensor Networks, however, multi-channel solutions have not reached their full potential: the MAC layers included in TinyOS or the Contiki OS for example are mostly single-channel. The literature offers a number of interesting solutions, but experimental results were often too few to build confidence. We propose a practical extension of low-power listening, MiCMAC, that performs channel hopping, operates in a distributed way, and is independent of upper layers of the protocol stack. The above properties make it easy to deploy in a variety of scenarios, without any extra configuration/scheduling/channel selection hassle. We implement our solution in Contiki and evaluate it in a 97-node~testbed while running a complete, out-of-the-box low-power IPv6 communication stack (UDP/RPL/6LoWPAN). Our experimental results demonstrate increased resilience to emulated WiFi interference (e.g., data yield kept above 90% when Contiki MAC drops in the 40% range). In noiseless environments, MiCMAC keeps the overhead low in comparison to Contiki MAC, achieving performance as high as 99% data yield along with sub-percent duty cycle and sub-second latency for a 1-minute inter-packet interval data collection. © 2014 IEEE.
  •  
3.
  • Michel, Mathieu, et al. (författare)
  • Load-Balanced Data Collection through Opportunistic Routing
  • 2015. - 9
  • Ingår i: 2015 International Conference on Distributed Computing in Sensor Systems. - 9781479988563 ; , s. 62-70
  • Konferensbidrag (refereegranskat)abstract
    • Wireless Sensor Networks performing low-power data collection often suffer from uneven load distribution among nodes. Nodes close to the network root typically face a higher load, see their battery deplete first, and become prematurely unable to operate (both sensing and relaying other nodes' data). We argue that opportunistic routing, by making forwarding decision on a per-packet basis and at the receiver rather than the sender, has the potential to better balance the load across nodes. We extend ORPL, an opportunistic version of the standard routing protocol RPL, with support for load-balancing. In our protocol, ORPL-LB, nodes continuously adapt their wake-up interval in order to adjust their availability and attain a deployment-specific target duty cycle. We implement our protocol in Contikiand present our experimental validation in Indriya, a 93-nodestestbed. Our results show that ORPL-LB reduces significantly(by approximately 40%) the worst node's duty cycle, with little or no impact on packet delivery ratio and latency.
  •  
4.
  • Asad, H. A., et al. (författare)
  • On Securing Persistent State in Intermittent Computing
  • 2020
  • Ingår i: ENSsys 2020 - Proceedings of the 8th International Workshop on Energy Harvesting and Energy-Neutral Sensing Systems. - New York, NY, USA : Association for Computing Machinery, Inc. ; , s. 8-14, s. 8-14, s. 8-14
  • Konferensbidrag (refereegranskat)abstract
    • We present the experimental evaluation of different security mechanisms applied to persistent state in intermittent computing. Whenever executions become intermittent because of energy scarcity, systems employ persistent state on non-volatile memories (NVMs) to ensure forward progress of applications. Persistent state spans operating system and network stack, as well as applications. While a device is off recharging energy buffers, persistent state on NVMs may be subject to security threats such as stealing sensitive information or tampering with configuration data, which may ultimately corrupt the device state and render the system unusable. Based on modern platforms of the Cortex M*series, we experimentally investigate the impact on typical intermittent computing workloads of different means to protect persistent state, including software and hardware implementations of staple encryption algorithms and the use of ARM TrustZone protection mechanisms. Our results indicate that i) software implementations bear a significant overhead in energy and time, sometimes harming forward progress, but also retaining the advantage of modularity and easier updates; ii) hardware implementations offer much lower overhead compared to their software counterparts, but require a deeper understanding of their internals to gauge their applicability in given application scenarios; and iii) TrustZone shows almost negligible overhead, yet it requires a different memory management and is only effective as long as attackers cannot directly access the NVMs.
  •  
5.
  • De Guglielmo, Domenico, et al. (författare)
  • Analysis and Experimental Evaluation of IEEE 802.15.4e TSCH CSMA-CA Algorithm
  • 2017
  • Ingår i: IEEE Transactions on Vehicular Technology. - 0018-9545 .- 1939-9359. ; 66:2, s. 1573-1588
  • Tidskriftsartikel (refereegranskat)abstract
    • Time-slotted channel hopping (TSCH) is one of the medium access control (MAC) behavior modes defined in the IEEE 802.15.4e standard. It combines time-slotted access and channel hopping, thus providing predictable latency, energy efficiency, communication reliability, and high network capacity. TSCH provides both dedicated and shared links. The latter is special slots assigned to more than one transmitter, whose concurrent access is regulated by a carrier-sense multiple access with collision avoidance (CSMA-CA) algorithm. In this paper, we develop an analytical model of the TSCH CSMA-CA algorithm to predict the performance experienced by nodes when using shared links. The model allows for deriving a number of metrics, such as delivery probability, packet latency, and energy consumption of nodes. Moreover, it considers the capture effect (CE) that typically occurs in real wireless networks. We validate the model through simulation experiments and measurements in a real testbed. Our results show that the model is very accurate. Furthermore, we found that the CE plays a fundamental role as it can significantly improve the performance experienced by nodes.
  •  
6.
  • Perez-Ramirez, Daniel F., et al. (författare)
  • DeepGANTT: A Scalable Deep Learning Scheduler for Backscatter Networks
  • 2023
  • Ingår i: IPSN '23: Proceedings of the 22nd International Conference on Information Processing in Sensor Networks. - New York, NY, United States : Association for Computing Machinery (ACM). - 9798400701184 ; , s. 163-
  • Konferensbidrag (refereegranskat)abstract
    • Novel backscatter communication techniques enable battery-free sensor tags to interoperate with unmodified standard IoT devices, extending a sensor network’s capabilities in a scalable manner. Without requiring additional dedicated infrastructure, the battery-free tags harvest energy from the environment, while the IoT devices provide them with the unmodulated carrier they need to communicate. A schedule coordinates the provision of carriers for the communications of battery-free devices with IoT nodes. Optimal carrier scheduling is an NP-hard problem that limits the scalability of network deployments. Thus, existing solutions waste energy and other valuable resources by scheduling the carriers suboptimally. We present DeepGANTT, a deep learning scheduler that leverages graph neural networks to efficiently provide near-optimal carrier scheduling. We train our scheduler with optimal schedules of relatively small networks obtained from a constraint optimization solver, achieving a performance within 3% of the optimum. Without the need to retrain, our scheduler generalizes to networks 6 × larger in the number of nodes and 10 × larger in the number of tags than those used for training. DeepGANTT breaks the scalability limitations of the optimal scheduler and reduces carrier utilization by up to compared to the state-of-the-art heuristic. As a consequence, our scheduler efficiently reduces energy and spectrum utilization in backscatter networks.
  •  
7.
  • Österlind, Fredrik, 1981- (författare)
  • Improving Low-Power Wireless Protocols with Timing-Accurate Simulation
  • 2011
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Low-power wireless technology enables numerous applications in areas from environmental monitoring and smart cities, to healthcare and recycling. But resource-constraints and the distributed nature of applications make low-power wireless networks difficult to develop and understand, resulting in increased development time, poor performance, software bugs, or even network failures. Network simulators offer full non-intrusive visibility and control, and are indispensible tools during development. But simulators do not always adequately represent the real world, limiting their applicability.In this thesis I argue that high simulation timing accuracy is important when developing high-performance low-power wireless protocols. Unlike in generic wireless network simulation, timing becomes important since low-power wireless networks use extremely timing-sensitive software techniques such as radio duty-cycling. I develop the simulation environment Cooja that can simulate low-power wireless networks with high timing accuracy.Using timing-accurate simulation, I design and develop a set of new low-power wireless protocols that improve on throughput, latency, and energy-efficiency. The problems that motivate these protocols were revealed by timing-accurate simulation. Timing-accurate software execution exposed performance bottlenecks that I address with a new communication primitive called Conditional Immediate Transmission (CIT). I show that CIT can improve on throughput in bulk transfer scenarios, and lower latency in many-to-one convergecast networks. Timing-accurate communication exposed that the hidden terminal problem is aggravated in duty-cycled networks that experience traffic bursts. I propose the Strawman mechanism that makes a radio duty-cycled network robust against traffic bursts by efficiently coping with hidden terminals.The Cooja simulation environment is available for use by others and is the default simulator in the Contiki operating system since 2006.
  •  
8.
  • Mahima, K. T. Y., et al. (författare)
  • MM4Drone : A Multi-spectral Image and mmWave Radar Approach for Identifying Mosquito Breeding Grounds via Aerial Drones
  • 2023
  • Ingår i: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. - Cham : Springer Science and Business Media Deutschland GmbH. - 9783031345852 - 9783031345869 ; , s. 412-426, s. 412-426
  • Konferensbidrag (refereegranskat)abstract
    • Mosquitoes spread disases such as Dengue and Zika that affect a significant portion of the world population. One approach to hamper the spread of the disases is to identify the mosquitoes’ breeding places. Recent studies use drones to detect breeding sites, due to their low cost and flexibility. In this paper, we investigate the applicability of drone-based multi-spectral imagery and mmWave radios to discover breeding habitats. Our approach is based on the detection of water bodies. We introduce our Faster R-CNN-MSWD, an extended version of the Faster R-CNN object detection network, which can be used to identify water retention areas in both urban and rural settings using multi-spectral images. We also show promising results for estimating extreme shallow water depth using drone-based multi-spectral images. Further, we present an approach to detect water with mmWave radios from drones. Finally, we emphasize the importance of fusing the data of the two sensors and outline future research directions. 
  •  
9.
  • Boano, Carlo Alberto, et al. (författare)
  • Hot Packets : A systematic evaluation of the effect of temperature on low power wireless transceivers
  • 2013
  • Ingår i: Proc. 5th Extreme Conference on Communication. - New York : ACM Press. - 9781450321716 ; , s. 7-12
  • Konferensbidrag (refereegranskat)abstract
    • Temperature is known to have a significant effect on the performance of radio transceivers: the higher the temperature, the lower the quality of links. Analysing this effect is particularly important in sensor networks because several applications are exposed to harsh environmental conditions. Daily or hourly changes in temperature can dramatically reduce the throughput, increase the delay, or even lead to network partitions. A few studies have quantified the impact of temperature on low-power wireless links, but only for a limited temperature range and on a single radio transceiver. Building on top of these preliminary observations, we design a low-cost experimental infrastructure to vary the onboard temperature of sensor nodes in a repeatable fashion, and we study systematically the impact of temperature on various sensornet platforms. We show that temperature affects transmitting and receiving nodes differently, and that all platforms follow a similar trend that can be captured in a simple first-order model. This work represents an initial stepping stone aimed at predicting the performance of a network considering the particular temperature profile of a given environment.
  •  
10.
  • Hassanzadeh, Navid, et al. (författare)
  • Do Sensor Networks need Mobile MAC Protocols?
  • 2012
  • Ingår i: CONET'12: Proceedings of the 3rd Workshop on Networks of Cooperating Objects in conjunction with CPS Week.
  • Konferensbidrag (refereegranskat)
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 307
Typ av publikation
konferensbidrag (228)
tidskriftsartikel (39)
rapport (13)
doktorsavhandling (7)
bokkapitel (6)
annan publikation (4)
visa fler...
licentiatavhandling (4)
proceedings (redaktörskap) (3)
bok (2)
samlingsverk (redaktörskap) (1)
visa färre...
Typ av innehåll
refereegranskat (273)
övrigt vetenskapligt/konstnärligt (33)
populärvet., debatt m.m. (1)
Författare/redaktör
Dunkels, Adam (56)
Tsiftes, Nicolas (38)
Raza, Shahid (36)
Mottola, Luca (35)
Eriksson, Joakim (34)
visa fler...
Österlind, Fredrik (31)
Finne, Niclas (28)
Varshney, Ambuj (23)
Duquennoy, Simon (20)
He, Zhitao (20)
Roedig, Utz (19)
Boano, Carlo Alberto (18)
Hewage, Kasun (18)
Alonso, Juan (17)
Wirström, Niklas (17)
Römer, Kay (16)
Ritter, Hartmut (15)
Rohner, Christian (13)
Wolisz, Adam (12)
Schiller, Jochen (12)
Lemic, Filip (12)
Hermans, Frederik (12)
Gunningberg, Per (11)
Handziski, Vlado (11)
Keppitiyagama, Chama ... (9)
Noda, Claro (8)
Zuniga, Marco (8)
De Poorter, Eli (8)
Van Haute, Tom (8)
Moerman, Ingrid (7)
Ngai, Edith (7)
Pérez-Penichet, Carl ... (7)
Landsiedel, Olaf, 19 ... (6)
Iyer, Venkatraman (6)
Behboodi, Arash (6)
De Zoysa, Kasun (6)
Brown, James (5)
Mottola, Luca, 1980- (5)
Alves, Mario (5)
Picco, Gian Pietro (5)
Fotouhi, Hossein (4)
Papadimitratos, Pana ... (4)
Köckemann, Uwe (4)
Karnouskos, Stamatis (4)
Gunningberg, Per, Pr ... (4)
Sreenan, Cormac J. (4)
Daniel, Florian (4)
Spiess, Patrik (4)
Tranquillini, Stefan ... (4)
visa färre...
Lärosäte
RISE (237)
Uppsala universitet (156)
Mälardalens universitet (15)
Chalmers tekniska högskola (9)
Kungliga Tekniska Högskolan (7)
Mittuniversitetet (3)
visa fler...
Umeå universitet (2)
Örebro universitet (2)
Linköpings universitet (1)
Karlstads universitet (1)
visa färre...
Språk
Engelska (307)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (307)
Teknik (55)
Lantbruksvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy