Skip to main content

Handling Sensed Data in Hostile Environments

  • Conference paper
Mobile Ad-hoc and Sensor Networks (MSN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3794))

Included in the following conference series:

  • 807 Accesses

Abstract

Systems that track sensed data trigger alerts based on the evaluation of some condition. In the presence of loss data a conservative condition may not generate a necessary alert and an aggressive condition may generate an alert that could have never happened. We observe that some lost values can be predicted and suggest new classes of conditions that provide more accurate alerts. We motivate the use of such conditions, provide a method for comparing two condition systems, and investigate the systems’ properties in both replicated and non replicated architectures. In addition, we propose a weak completeness property, discuss its merit and show a motivation for its use. Our main result shows that a triggering algorithm, used in one of our condition systems, strictly dominates another algorithm for conservative system, yet, both algorithms satisfy the same set of properties; thus, with some simple observations, we have a strong evidence for its optimality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anceaume, E., Datta, A.K., Gradinariu, M., Simon, G.: Publish/subscribe scheme for mobile networks. Technical report, POMC 2002 Workshop on Principles of Mobile Computing, Toulouse, France, October 30-31 (2002)

    Google Scholar 

  2. Bernstein, P.A., Newcomer, E.: Principles of Transactions Processing. Morgan Kaufmann, San Francisco (1997)

    Google Scholar 

  3. Birman, K.P.: The process group approach to reliable distributed computing. Communications of the ACM 36(12), 37–53 (1993)

    Article  Google Scholar 

  4. Carzaniga, A., Nitto, E., Rosenblum, D., Wolf, L.: Issues in supporting event-based architectural styles. In: Proceedings of the third international workshop on Software architecture, Orlando, Florida. ACM SIGPLAN Notices, pp. 17–20. ACM Press, New York (1998)

    Chapter  Google Scholar 

  5. Cugola, G., Arno Jacobsen, H.: Using publish/subscribe middleware for mobile systems. ACM SIGMOBILE Mobile Computing and Communications Review 6(4), 25–33 (2002)

    Article  Google Scholar 

  6. Gray, J., Helland, P., O’Neil, P., Shasha, D.: The dangers of replication and a solution. In: ACM SOGMOD conference, pp. 173–182. ACM Press, New York (1996)

    Google Scholar 

  7. Huang, Y., Garcia-Molina, H.: Replicated condition monitoring. In: Proc. 20th ACM Symp. on Principles of Distributed Computing, Newport, Rhode Island. ACM SIGPLAN Notices, pp. 229–237. ACM Press, New York (2001)

    Google Scholar 

  8. Huang, Y., Garcia-Molina, H.: Publish/subscribe in a mobile environment. Wireless Networks 10, 643–652 (2004)

    Article  Google Scholar 

  9. Sun Microsystems. Jini technology core platform spec - distributed events. Technical report, Sun Microsystems (2000), http://www.sun.com/software/jini/specs/core2_0.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ben-Zwi, O., Pinter, S.S. (2005). Handling Sensed Data in Hostile Environments. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_43

Download citation

  • DOI: https://doi.org/10.1007/11599463_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30856-0

  • Online ISBN: 978-3-540-32276-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics