2005
DOI: 10.1007/11502593_19
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications

Abstract: Abstract. Many sensor network applications demand tightly-bounded object detection quality. To meet such stringent requirements, we develop three sensing scheduling protocols to guarantee worst-case detection quality in a sensor network while reducing sensing power consumption. Our protocols emulate a line sweeping through all points in the sensing field periodically. Nodes wake up when the sweeping line comes close, and then go to sleep when the line moves forward. In this way, any object can be detected with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…The system processes the data from IR sensors in order to detect an event of interest in the private area to identify the author by correlation with the images grabbed in the public area. Energy conservation through limiting the sensing to a small part of the network was also considered in [32]- [35]. In [32], the activation pattern is swept across the network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The system processes the data from IR sensors in order to detect an event of interest in the private area to identify the author by correlation with the images grabbed in the public area. Energy conservation through limiting the sensing to a small part of the network was also considered in [32]- [35]. In [32], the activation pattern is swept across the network.…”
Section: Related Workmentioning
confidence: 99%
“…Energy conservation through limiting the sensing to a small part of the network was also considered in [32]- [35]. In [32], the activation pattern is swept across the network. Both schemes assume a simple topology and do not handle sensing holes due to the sleeping time of the sensors.…”
Section: Related Workmentioning
confidence: 99%
“…Then, over time, this section moves over the network by putting nodes to sleep and waking new ones. This gives the appearance of an awake section of nodes flowing over the entire network like a wave [8]. This algorithm proposes three types of waves:  Two straight lines of nodes are awake at the same time, with the lines being parallel to each other.…”
Section: Wavementioning
confidence: 99%
“…Qun Li is supported in part by US National Science Foundation grant CCF-0514985. Some preliminary results of this work have been presented in [24], and [25].…”
Section: Acknowledgmentsmentioning
confidence: 99%