Pervasive Computing (隨處計算) 2006

Lecturer: jrjiang@csie.ncu.edu.tw (江振瑞)
Teacher Assistant:
yulihuang@acnlab.csie.ncu.edu.tw (黃宇立)
Time: Thu. 9:00~11:50
Place: EA210
Blackboard Sysytem: http://bb.ncu.edu.tw

Course Description:

A new era of computing is on the horizon. In this new era, hundreds of billions of tiny devices are deeply embedded within our physical environment. The devices are integrated into everything, from badges to chairs, and all have the ability to compute, sense, and communicate. This brings a new computing paradigm – pervasive computing, in which computation occurs everywhere. This course is intended to provide an in-depth examination of advanced topics in pervasive computing.

Syllabus: Scoring:
Reference Books:
Supplemental Readings:
  1. M Medidi, RA Slaaen, Y Zhou, CJ Mallery, S Medidi, "Cluster-based localization in wireless sensor networks," Proceedings of SPIE, 2006. 
  2. Q Fang, J Gao, LJ Guibas, "Locating and Bypassing Holes in Sensor Networks," Mobile Networks and Applications, 2006.


Paper List (from http://www.eecs.harvard.edu/%7Emdw/course/cs263/):

Ad hoc networking

Sensor networks general

Sensor network applications

Sensor network operating systems

Sensor networks: communications and routing

Programming abstractions

Distributed data processing

Localization and time synchronization

Security

Other

Paper List (from http://suraj.lums.edu.pk/%7Emuneeb/course/papers.html)

1: Introduction & Overview
J. Elson, D. Estrin, Wireless Sensor Networks: A bridge to the Physical World. in Wireless Sensor Networks, Kluwer, 2004.

2: Sensor Node Hardware & Operating Systems
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, System architecture directions for networked sensors. ACM Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2000.

3: Sensor Network Operating Systems (contd)
P. Levis, S. Madden, D. Gay, J. Polastre, R. Szewczyk, A. Woo, E. Brewer and D. Culler, The Emergence of Networking Abstractions and Techniques in TinyOS, NSDI'04.

4: Medium Access Control
Wei Ye and John Heidemann. Medium Access Control in Wireless Sensor Networks. Wireless Sensor Networks, Kluwer Academic Publishers, May 2004.

Wei Ye, John Heidemann and Deborah Estrin. Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks. IEEE/ACM Transactions on Networking, Vol. 12, No. 3, pp. 493-506, June 2004.

5: Medium Access Control (contd)
V. Rajendran, K. Obraczka, J.J Garcia-Luna-Aceves, Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks. In Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003).

6: Localization
Nirupama Bulusu, John Heidemann and Deborah Estrin. GPS-less Low Cost Outdoor Localization for Very Small Devices. IEEE Personal Communications Magazine, Vol. 7, No. 5, pp. 28-34. October, 2000.

7: Localization (contd)
Nirupama Bulusu, John Heidemann, Deborah Estrin, and Tommy Tran. Self-configuring localization systems: Design and Experimental Evaluation. ACM Transactions on Embedded Computing Systems, 3 (1 ), pp. 24-60, February, 2004.

8: Time Synchronization
Richard Karp, Jeremy Elson, Deborah Estrin, and Scott Shenker. Optimal and Global Time Synchronization in Sensornets. In CENS Technical Report #12 ,
April 11 2003.

9: Network Layer Protocols: Multi-hop
C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, F. Silva. Directed Diffusion for Wireless Sensor Networking. IEEE/ACM Transactions on Networking, Vol. 11, No. 1, pp. 2-16, February 2003.

10: MID TERM

11: Network Layer Protocols: Cluster-based

W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. An Application-Specific Protocol Architecture for Wireless Microsensor Networks, IEEE Transactions on Wireless Communications, Vol. 1, No. 4, October 2002, pp. 660-670.

12: Topology Control
Alberto Cerpa and Deborah Estrin. ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies
IEEE Transactions on Mobile Computing Special Issue on Mission-Oriented Sensor Networks,
Vol. 3, No. 3, July-September 2004.

13: Data Storage in Sensor Networks
S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu. Data-centric storage in sensornets with GHT, a geographic hash table. Mobile Networks and Applications, Vol. 8, No. 4, 2003.

14: Sensor Network Middle-ware
W. Heinzelman, A. Murphy, H. Carvalho and M. Perillo, Middleware to Support Sensor Network Applications, IEEE Network Magazine Special Issue, Jan. 2004.

15: Querying Sensor Networks
Samuel Madden, Michael Franklin, Joseph Hellerstein, and Wei
Hong. TinyDB: An Acqusitional Query Processing System for Sensor Networks. To Appear in, ACM Transactions on Database Systems 2004.

16: Querying Sensor Networks (contd)
A. Deshpande, C. Guestrin, S. Madden, J. Hellerstein, and Wei
Hon
g. Model Driven Data Acquisition in Sensor Networks. VLDB 2004.

17: Sensor Network Programming Languages
D. Gay, P. Levis, R. v. Behren, M. Welsh, E. Brewer, and D. Culler. The nesC Language: A Holistic Approach to Networked Embedded Systems. ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) 2003.

18: Simulation & Experiment Environments
P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications. In Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003).

L. Girod, J. Elson, A. Cerpa, T. Stathopoulos, N. Ramanathan, and D. Estrin. EmStar: a Software Environment for Developing and Deploying Wireless Sensor Networks. In Proceedings of the 2004 USENIX Technical Conference, 2004.

19: Security issues in Sensor Networks
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and Doug Tygar. SPINS: Security Protocols for Sensor Networks. In Wireless Networks Journal (WINE), September 2002.


Adrian Perrig, Bartosz Przydatek and Dawn Song. SIA: Secure Information Aggregation in Sensor Networks. In ACM SenSys 2003.


Paper List (from http://hinrg.cs.jhu.edu/wsn05/reading.html)

Introduction,Motivation,Applications Platforms HW/SW Wireless Characterization/Measurement MAC protocols Topology Control Routing Protocols Transport Protocols Synchronization,Localization Querying/Programming abstractions/Storage System Integrity/Calibration/Security Simulation

Back to My Home