Attack-Resilient Time Synchronization for Wireless Sensor Networks

Size: px
Start display at page:

Download "Attack-Resilient Time Synchronization for Wireless Sensor Networks"

Transcription

1 ack-resilien Time Synchronizaion for Wireless Sensor Neworks Hui Song, Sencun Zhu, and Guohong Cao Deparmen of Compuer Science & Engineering The Pennsylvania Sae Universiy Universiy Park, P {hsong,szhu,gcao}@cse.psu.edu srac The exising ime synchronizaion schemes in sensor neworks were no designed wih securiy in mind, hus leaving hem vulnerale o securiy aacks. In his paper, we firs idenify various aacks ha are effecive o several represenaive ime synchronizaion schemes, and hen focus on a specific ype of aack called delay aack, which canno e addressed y crypographic echniques. Nex we propose wo approaches o deec and accommodae he delay aack. Our firs approach uses he generalized exreme sudenized deviae (GESD) algorihm o deec muliple ouliers inroduced y he compromised nodes; our second approach uses a hreshold derived using a ime ransformaion echnique o filer ou he ouliers. Finally we show he effeciveness of hese wo schemes hrough exensive simulaions. I. INTRODUCTION Many sensor nework applicaions require ime o e synchronized wihin he nework. Examples of such applicaions include moile ojec racking, daa aggregaion, TDM radio scheduling, message ordering, o name a few. Consider he applicaion of moile ojec racking [1], in which a sensor nework is deployed in an area of ineres o monior passing ojecs. When an ojec appears, he deecing nodes record he deecing locaion and he deecing ime. Laer, hese locaion and ime informaion are sen o he aggregaion node which esimaes he moving rajecory of he ojec. Wihou an accurae ime synchronizaion, he esimaed rajecory of he racked ojec could differ grealy from he acual one. Similarly, we can see he imporance of ime synchronizaion for he operaions of oher sensor nework applicaions. ll nework ime synchronizaion mehods rely on some sor of message exchanges eween nodes. Nondeerminism in he nework dynamics such as physical channel access ime or operaing sysem overhead (e.g., sysem calls), makes he synchronizaion ask challenging in sensor neworks. In he lieraure, many schemes have een proposed o address he ime synchronizaion prolem [2], [3], [4], [5], [6]. These schemes involve he exchange of muliple ime synchronizaion messages among muliple sensor nodes [2] or eween wo sensor nodes [3] o e synchronized. However, none of hem was designed wih securiy in mind, even hough securiy has een idenified as a major challenge for sensor neworks [7]. cually, even if an adversary is capale of desroying some or all sensor nodes, i may op for oher more severe aacks, since i is more dangerous o ake acions ased on some false sensor daa han wihou any daa. For example, if an adversary can aack he ime synchronizaion proocol so ha he esimaed direcion of a moile ojec is conrary o is acual direcion, a wrong or even risky acion may e aken and many sysem resources may e wased. Thus, when a sensor nework is deployed in an adversarial environmen such as a alefield, he ime synchronizaion proocol is an aracive arge o he adversaries. In his paper, we firs idenify several securiy aacks an adversary can launch agains a non-secure ime synchronizaion proocol. For insance, an aacker can replay old synchronizaion messages, drop, modify, or even forge exchanged iming messages. Since many of hese aacks can e addressed y employing appropriae crypographic echniques, we focus on a specific ype of aack called delay aack, which canno e addressed y he crypographic echniques. In he delay aack, a malicious aacker (or a compromised node) delieraely delays he ransmission of ime synchronizaion messages o magnify he offse eween he ime of a malicious node and he acual ime. ll he curren ime synchronizaion schemes [2], [3], [4], [5], [6] are vulnerale o his aack in one way or anoher. We propose wo approaches o deec and accommodae he delay aacks. Our firs approach uses he generalized exreme sudenized deviae (GESD) algorihm o deec he ouliers inroduced y malicious nodes. If here is no malicious node, he ime offses among he sensor nodes should follow he same (or similar) disriuion or paern. For heir aacks o e effecive, malicious nodes ypically repor heir ime offses much larger han hose from he enign nodes, leaving heir repored values suspicious. Our second approach uses a ime ransformaion echnique, which enales every node o derive an upper ound of he ime offse ha is accepale o i, herey filering ou he ouliers. We discuss he meris as well as he limiaions of each approach, and evaluae he effeciveness of hese wo schemes hrough exensive simulaions. The res of he paper is organized as follows. The nex secion descries he relaed work and discusses various aacks which are addressale using crypographic echniques. In Secion III, we idenify and discuss a new aack called delay aack. Secion IV presens he sysem model and assumpions. In Secion V, we presen he GESD-ased approach. Secion

2 VI presens he hreshold-ased approach. The performance of hese wo approaches are evaluaed in Secion VII. Secion VIII concludes he paper. II. RELTED WORK. Time Synchronizaion in Hosile Environmens ll of he curren ime synchronizaion proocols [2], [3], [4], [5], [6] ecome vulnerale in hosile environmens. Taking he RBS scheme as an example, an aacker may launch differen kinds of aacks o reak he proocol. The firs aack is called masquerade aack. Suppose node sends ou a reference eacon o is wo neighors B and C. n aacker E can preend o e B and exchange wrong ime informaion wih C, disruping he ime synchronizaion process eween B and C. second aack is called replay aack. Using he same scenario in he firs aack, an aacker E can replay B s old iming packes, misleading C o e synchronized o a wrong ime. hird aack is called message manipulaion aack. In his aack, an aacker may drop, modify, or even forge he exchanged iming messages o inerrup he ime synchronizaion process. For he message dropping aack, he aacker can selecively drop he packes o prolong he converging ime of he synchronizaion process. This aack could e difficul o deec. For he message forging aack, he aacker can forge many reference eacon messages and flood he nework. On one hand, i reaks ime synchronizaion among he neighors. On he oher hand, i causes hose nodes o consume power o process hese unwaned and faked iming messages. If some of he nodes are power-deprived, some holes or even pariion may appear in he nework. We can cerainly employ some crypographic echniques o address he aforemenioned aacks. For example, providing auhenicaion of every exchanged message will preven an ouside aacker from impersonaing oher nodes or alering he conen of an exchanged message. dding a sequence numer o eacon messages or oher messages will preven message replay aacks. Message dropping may e noiced y some misehavior deecion schemes [8]. B. Faul-Tolerance Time Synchronizaion The ime synchronizaion prolem has een sudied for many years and mos of he previously proposed approaches fall ino he general field of faul-olerance ime synchronizaion [9], [1], [11], [12]. Our proposed schemes differ from hese schemes in several ways. Firs, in [1], [11], [12], i was assumed ha wo nonfauly clocks never differ y more han a predefined hreshold δ. However, how o define his hreshold is no discussed. In our second scheme, we use he ime ransformaion echnique o derive he hreshold. Our firs scheme do no have his assumpion a all. Second, he scheme of [9] requires an auhenicaion mechanism such as digial signaures o ensure ha no oher node can generae he same message or aler he message wihou deecion. Our schemes do no have his requiremen. In fac, our schemes are addressing a new aack, called delay aack, which can no e prevened or handled y crypographic echniques such as digial signaures, ecause we assume ha nodes may e compromised. III. THE DELY TTCK MODEL The ime synchronizaion schemes proposed for wireless sensor neworks are ased on wo models: he receiver-receiver model and he sender-receiver model. The reference roadcas synchronizaion scheme (RBS) [2] and is prooype proocol [13] fall ino he receiver-receiver model. In he following, we simply use he RBS scheme o represen he receiver-receiver model. Schemes of he sender-receiver model include TPSN [3], LTS [4], he iny-sync and mini-sync schemes [5], and he gloal ime synchronizaion proocol [6]. In he following, we will descrie he delay aack model in he conex of he RBS scheme [2], which is ased on he following idea: using a hird pary for ime synchronizaion. node, which is a regular node acing as a reference node, roadcass a reference eacon o is neighors. Each neighoring node records he arrival ime of he eacon ased on is own clock. Since hese receiving nodes are close o he reference node, we can assume he eacon arrives a oh receivers a he same ime. Therefore, he difference eween he recording imes of hese receiving nodes is he ime offse eween hem. By exchanging heir recorded receiving imes, hey can calculae he ime offse, adjus and synchronize heir clocks. s shown in Figure 1(a), nodes and B have he recorded imes a and, respecively, and he ime offse eween hem is δ = a. To synchronize wih node, node B may increase is clock y δ, or oh of hem se heir clocks o ( a + )/2. Nex we inroduce a new aack model agains he RBS scheme. Definiion 1 (Delay ack): In a delay aack, an aacker delieraely delays some of he ime messages, e.g., he eacon message in he RBS scheme, so as o fail he ime synchronizaion process. Figure 1() and (c) show wo ways o launch he delay aack in he RBS scheme. In Figure 1(), wo colluding nodes ac as he reference node for nodes and B. They send he reference eacon o nodes and B a differen imes. s a resul, nodes and B receive he eacon messages a differen imes, u hey assume hey receive he eacon a he same ime. Figure 1(c) shows ha a malicious node can launch he aove aacks alone if i has a direced anenna [14] so ha nodes and B only hear one eacon message. The delay aack can also e launched when a enign node is synchronizing wih a compromised node. The compromised node can add some delay o he eacon receiving ime and send i he good node. This will mislead he good node o synchronize o a wrong ime. The sender-receiver model proocols [3], [4], [5], [6] are also vulnerale o he delay aack. In he sender-receiver model, he sender and he receiver exchange ime synchronizaion packes, esimae he round-rip ransmission ime eween hem, and synchronize heir clocks afer finding he clock offse eween hem. Since only wo nodes are involved in he process, his model does no suffer from he aacks

3 reference node R eacon eacon a M B ck malicious node Compromised Reference node R acker +e B Compromised Reference node R (a) The RBS scheme () Collusion-ased delay aack (c) Direcional anenna-ased delay aack Fig. 1. The RBS scheme and he delay aack +e B inroduced y a malicious reference node. However, a node can e deceived if he node i is synchronizing wih is malicious. Therefore, hese schemes are also sujec o he aforemenioned delay aacks. IV. SYSTEM MODEL ND SSUMPTIONS. Node, Nework, and Securiy ssumpions We consider a sensor nework composing of resourceconsrained sensor nodes such as he curren generaion of Berkeley Mica moes [15]. Every sensor node is equipped wih an oscillaor assised clock and powered y an exernal aery. The clock of a sensor sars o ick only afer i is powered on. Since i is unlikely o power on all he sensor nodes a he same ime, here may e large ime offses among sensor nodes iniially. We assume ha he sensor nodes deployed in a securiy criical environmen is manufacured o susain possile reak-in aacks a leas for a shor ime inerval (say several seconds) when capured y an adversary [16]; oherwise, he adversary could easily compromise all he sensor nodes and hen ake over he nework. To his end, we assume ha here exiss a lower ound on he ime inerval T min ha is necessary for an adversary o compromise a sensor node. We assume ha he firs ime synchronizaion will e execued and finished wihin he ime inerval T min. s a resul, we can assume ha all he sensor nodes are loosely synchronized. Because of inrinsic clock drifs of sensor nodes, he ime offses among sensor nodes could ecome very large (e.g., in he order of seconds or even larger) unless ime synchronizaion is performed once in a while. Hence, we assume ha ime synchronizaion is performed periodically. Each node is assigned a unique id efore deploymen and i can auhenicae he messages sen/received wih appropriae shared keys esalished hrough a key managemen proocol [16], [17], [18]. This ensures ha no node can impersonae ohers during he exchange of iming messages and a malicious node can ac as a reference a mos once. Noe ha he presence of jam-and-replay aackers can incur exra delay o any well-ehaving node s ransmission in is neighorhood. s a resul, a well-ehaving node may e misidenified as compromised. In his paper, however, we assume ha we can uilize jamming aack deecion schemes, such as [19], o deec and remove he jam-and-replay aackers. B. Models for Secure Time Synchronizaion R3 R2 R4 R1 delay aack i a... i B Ri Rn delay aack Ri+1 (a) Two-node model Fig Rn 1 R3 2 R2 3 R4 dela2 2 dela dela4 4 dela1 4 R1 R5 n dela5 n dela(n) dela(i)... n 1 dela(n 1) i Rn dela(i+1) Ri n 1 Rn 1... Ri+1 () Neighoring-node model Two models for secure ime synchronizaion The general idea of defending agains delay aacks is as follows. fer collecing a se of ime offses from muliple involved nodes, we idenify he malicious ime offses ha are due o delay aacks. The idenified malicious ime offses will e excluded and he res of he ime offses are used o esimae he acual ime offse. Nex, we presen wo models for collecing he ime offses: he wo-node model and he neighoring-node model, which are descried in he conex of he RBS scheme. The wo-node model: In his model, one node needs o synchronize wih anoher node. For example, in Figure 2(a), node B is he cluser head and is a node wihin he cluser. ll nodes in he cluser are required o synchronize wih B. Due o securiy concerns, node only russ he cluser head u no oher nodes in he cluser. However, i has o use oher nodes as reference nodes when using RBS. To deal wih securiy aacks on ime synchronizaion, node uses muliple reference nodes o oain a se of ime offses. For example, i can reques R 1,R 2,... R n o serve as reference nodes. Le i a, i represen he wo eacon receiving imes oained y using a reference node R i and δ i = ( i a i ) e he ime offse eween and B. Node B oains n ime offses {δ 1,δ 2,...,δ n }. Based on he colleced ime offses, we can deec and exclude he malicious ime offses and esimae he acual ime offse eween and B more accuraely. The neighoring-node model: In some applicaions, a node may e required o synchronize wih is neighors o cooperae wih each oher. In his case, he wo-node model is no i

4 enough since some neighors may have een compromised and synchronizing wih a malicious node is more vulnerale o aacks. Our soluion is illusraed in Figure 2(). Suppose has n neighors: R 1, R 2,..., R n. We run he RBS scheme eween and each of is neighors and each ime we use a differen node as reference o oain a ime offse. fer collecing n ime offses, we can deec he ouliers, exclude hem, and make a good esimaion on he acual ime offses. In addiion o he aove wo models, oher models are possile. These models have one hing in common: hey collec a se of ime offses, which may include malicious ime offses. The focus of his paper is o answer he following quesion: Given a se of ime offses, how o idenify he ouliers and how o achieve an aack-resilien esimaion? In his paper, we propose soluions in he conex of RBS, alhough he soluions can also e applied o he sender-receiver ased model. V. THE GESD-BSED DELY TTCK DETECTION Inuiively, wihou delay aacks, he ime offses among nodes follow a similar disriuion. The exisence of delay aacks makes he malicious ime offses much differen from he ohers; oherwise, he aack is no effecive and can e oleraed y he ime synchronizaion schemes. In saisics, hese malicious ime offses are referred o as ouliers, which is defined as an oservaion which deviaes so much from oher oservaions as o arouse suspicious ha i was generaed y a differen mechanism [2]. Numerous schemes have een proposed o deec ouliers [21] (see [21] for a survey). mong hem, he generalized exreme sudenized deviae many-oulier procedure (GESD) [22] is proved o perform well under differen condiions [21]. In he following, we inroduce GESD and discuss how o apply i o our prolem. fer he ouliers have een idenified y GESD, we discuss how o exclude he ouliers and oain a more accurae esimaion of he ime offse.. The GESD Many-Oulier Deecion Procedure Before inroducing GESD, le us firs look a he exreme sudenized deviae (ESD) es which is also called he Gru s es. The ESD es is good a deecing one oulier in a random normal sample. Definiion 2 (ESD Tes): Given a daa se Γ = {x 1,x 2,...,x n }, The mean of Γ is denoed as x and he sandard deviaion of Γ is denoed as s. Le T i = x i x /s, where i = 1,...,n. T i is also called he corresponding T -value of x i. Le x j e he oservaion ha leads o he larges x i x /s, where i = 1,...,n. Then x j is an oulier when T j exceeds a aled criical value λ. In principle, if T j does no exceed he criical value λ, we need no single ou x j. ssuming his es finds an oulier, we hen look for furher ouliers y removing oservaion x j and repeaing he process on he remaining n 1 oservaions. However, he ESD es can only deec one oulier. GESD is a modified version of he ESD es, which can find muliple ouliers. Two criical parameers for GESD are r and λ i, where r is he esimaed numer of ouliers in he daa se and λ i is he wo-sided 1 α percen criical value go from Formula (1). λ i = n i 1,p (n i) (n i n i 1,p )(n i + 1) (1) In Formula (1), i = 1,...,r. v,p is he 1 p percenage poin from he disriuion wih v degrees of freedom, and p = 1 [α/2(n i+1)]. Given α,n and r, he criical values λ i, where i = 1,...,r, can e calculaed eforehand. B. Using GESD for Delay ack Deecion The GESD-ased approach is formally defined as follows. Definiion 3 (GESD-ased delay aack deecion): Given he ime offse se Γ = {δ 1,δ 2,...,δ n }, all he ime offses δ i ha are idenified as ouliers y GESD are claimed o e under delay aack. In GESD, r is he numer of esimaed ouliers in he daa se, which is he esimaed numer of malicious ime offses in our seings. The choice of r plays an imporan role in GESD. If r is se o a small numer and here are more han r malicious ime offses among he n ime offses, some of hem canno e deeced using GESD. On he oher hand, if r is oo large, i wases ime on checking he nodes ha are in fac enign (good) ones. In his paper, since he numer of ime offses is small (e.g., 2), we se r o e half of he oal numer of ime offses. We also assume ha he numer of malicious ime offses is less han half of he oal numer of ime offses. Wihou his assumpion, GESD may no work since i may find he malicious ime offses o e enign and he enign ones o e malicious. Definiion 4 (Esimae r): Le he median of he ime offse se Γ e x and s e he sandard deviaion. r is defined as he numer of ime offses x j such ha x j x /s > 2, where i = 1,...,n. When he numer of malicious nodes is small, i.e, less han 5% of he oal, we can uilize he median of he ime offses o se r. s shown in Definiion 4, r is he numer of ime offses ha are wo sandard deviaions away from he median. In mos cases, he daa and ime offses are normally disriued, and 95% of he values are a mos wo sandard deviaions away from he mean. In our case, we replace he mean wih he median since he median serves eer when here exiss malicious daa ses. Figure 3 shows how o use GESD o idenify ouliers. The algorihm acceps hree parameers: he esimaed numer of ouliers r, he ime offse daa se Γ, and he criical value λ compued y Formula (1). λ can e pre-compued and sored in he sensors. In he following, we use λ n o denoe he criical values for a daa se wih n elemens. Two array srucures C and T, are used o save he candidae oulier informaion. C is used o keep he ouliers and T is used o save he T value (Definiion 2) corresponding o he candidae ouliers. The T

5 lgorihm 1: Inpu: r, Γ, λ le j = 1, C and T e wo arrays 1 egin loop 2 calculae x and s over se Γ; find x kj which maximizes x i x, x i Γ; 3 le T[j] = { x kj x /s}, C[j] = x kj ; remove x kj from Γ; 4 increase j; decrease r; 5 if (r < 1) reak 6 end loop 7 le oulier se Ω =, j = r; 8 egin loop 9 if (T[j] > λ n [j]) {Ω = {C[k]}, k = 1,..., j; reurn Ω} 1 else {decrease j; if (j < 1) reurn } 11 end loop Fig. 3. Idenifying ouliers wih GESD values of he candidae ouliers are laer used o compare wih he criical values o decide wheher he candidaes are ouliers or no. C. Delay ack ccommodaion The goal of securing ime synchronizaion is o synchronize he ime in he presence of delay aacks. This can e achieved y firs idenifying he ouliers (malicious ime offses) and hen excluding hem when esimaing he rue ime offses eween nodes. We use he mean of he enign ime offses o approximae he rue ime offses. The following definiion can e used o approximae he ime offse esimaion ˆδ. Definiion 5 (Esimae ˆδ): Le Γ e he ime offse daa se and Ω e he oulier se. Then he enign ime offse se is Γ Ω. ˆδ is defined as he mean of he se Γ Ω. Le he size of Γ e n and he size of Ω e k. ˆδ is calculaed as follows. n k ˆδ = i=1 x i n k,where x i Γ Ω. VI. THRESHOLD-BSED DELY TTCK DETECTION One drawack of he GESD approach is ha i needs o have enough reference nodes o deec he malicious nodes effecively. This has een verified y he simulaion resuls shown in Secion VII-B. In his secion, we propose a hreshold-ased approach o deec he delay aacks ased on he following oservaions. Wihou delay aacks, he ime offse eween wo nodes should e ounded y a hreshold value if he maximum clock drif raes can e ounded. Wih he hreshold value, we can idenify hose ime offses ha are larger han he hreshold as malicious ones. Differen from GESD, he hreshold-ased approach does no need ha many reference nodes. Moreover, he hreshold-ased approach only needs o calculae he hreshold once, and hus has less overhead. In he following, we firs presen he ime ransformaion echnique, which was firs proposed in [23]. Then, ased on he ime ransformaion echnique, we presen a mehod o deermine he hreshold. fer deermining he hreshold, we discuss how o use i o defend agains delay aacks.. The Time Transformaion Technique Before presening he ime ransformaion echnique, le us firs look a he hardware oscillaor assised clock in Berkeley Mica moes [15], which implemens an approximaion C(T) of he acual ime T. C(T) = k T T ω(η)d η + C(T ) is a funcion of he real ime T, which derives from he angular frequency ω(t) of he hardware oscillaor. In his formula, k is a proporional coefficien and T is he iniial clock value. For a perfec hardware clock, dc d T is equal o one. However, all hardware clocks are no perfec since hey are sujec o clock drif. We can only assume ha he clock drif rae of he sensor clock does no exceed a maximum value of ρ. Thus, we have he following inequaliy: 1 ρ dc d T 1 + ρ. The idea of ime ransformaion is o ransform he real ime difference T ino he sensor clock difference C and vice versa. These ransformaions are difficul ecause of he unpredicailiy of he sensor clock, u here exiss some lower and upper ounds on he esimaes. Based on he previous inequaliy, we can ge: 1 ρ C T 1 + ρ. This inequaliy can e ransformed ino (1 ρ) T C (1 + ρ) T and C 1+ρ T C 1 ρ, which means ha he clock difference C can e approximaed y he inerval [(1 ρ) T,(1 + ρ) T ]. On he oher hand, he real ime difference T ha corresponds o he sensor clock difference C can e approximaed y he inerval [ C 1+ρ, C 1 ρ ]. Node Node B eacon eacon a T Fig M 3 ck 4 2 T1 T2 Time ransformaion Time in node Time in node B True Time In order o ransform a ime difference C1 corresponding o one node N 1 wih ρ 1, o a ime corresponding o anoher node N 2 wih ρ 2, C1 is firs esimaed y he real ime inerval [ C 1 1+ρ 1, C 1 1 ρ 1 ], which in urn is esimaed y he sensor clock ime inerval [ 1 ρ2 1+ρ 1 C1, 1+ρ2 1 ρ 1 C1 ], relaive o he local ime of node N 2. s shown in Figure 4, nodes and B use RBS o do ime synchronizaion. The maximum clock drif raes of and B are denoed as ρ a and ρ, respecively. Suppose and B receive he reference eacon a ime a and, in erms of heir own local clocks, respecively. fer receiving he reference eacon, a ime 1, sends a message M o B, elling B ha i received he eacon a ime a. Message M is received y B a ime 3, and hen B sends ack an ck a ime 4 o confirm ha i has received M. In he ck, B piggyacks, 3, and 4. fer receiving he ck, can use he ime ransform echnique o ransform he eacon receiving ime o a ime inerval [ L, R ] relaive o s clock. L and R are calculaed using Formula 2.

6 L = 2 ( 4 ) 1+ρa 1 ρ (( 2 1 ) ( 4 3 ) 1 ρa 1+ρ ) R = 2 ( 4 ) 1 ρa 1+ρ (2) B. Deermining he hreshold ξ The hreshold ξ is he upper ound of he ime offses eween wo nodes. We deermine ξ ased on he idea of ime ransformaion shown aove. Differen from he original paper, where he ime inerval is used o order messages, we uilize he ime inerval o quanify he ime offse upper ound eween wo nodes. In addiion, unlike [23] where he ime ransformaion happens along muliple hops, we only need o do he ime ransformaion wihin a single hop. s a resul, he inerval we ge has less error accumulaion han ha in [23]. sraighforward soluion is o use ( R L ) as ξ. However, ( R L ) is a igh ound. If we use i o decide wheher a ime offse is malicious or no, i may idenify enign ime offses as malicious ones. Thus, o effecively deec malicious ime offses, ξ should e a looser upper ound. Since L and R are he wo oundaries of ime a node, max( a L, R a ) should e he upper ound of he ime offses eween and B. Based on his oservaion, he ime offse upper ound, ξ a, eween and B can e deermined y Formula (3), which is a looser upper ound compared o ( R L ). This can e explained as follows. If he clock drif raes of he wo nodes are equal, a should fall inside [ L, R ]; oherwise, a may fall ouside of [ L, R ], leading o a looser upper ound ased on Formula (3). Since he clock drif raes of wo nodes are usually no equal, Formula (3) gives a looser upper ound compared o ( R L ). R a if a < L ξ a = MX{ R a, a L } if a [ L, R ] (3) a L if a > R The ime offse upper ound eween wo neighoring nodes shown in Formula (3) is calculaed only in he firs ime synchronizaion, which happens shorly afer he deploymen of he sensor nework. Thus, he ime offse caused y he clock drif is small in Formula (3). The clock drif ime increases as ime goes y. If he ime synchronizaion inerval is long, he clock drif ime will e long and should e aken ino consideraion when deermining he ime offse upper ound. Formula (4) gives he ime offse upper ound eween nodes and B considering clock drif ime. a = ξ a + ρ a ρ T (4) In Formula (4), T is he ime synchronizaion inerval and a is he upper ound of he ime offse eween nodes and B when hey are synchronized using one reference node. To increase he accuracy of he esimaion, we use n reference nodes o oain a se of ξ a. The hreshold ξ is defined as he maximum among hem, as showed in Formula (5). { ξ = MX ξ a i } + ρ a ρ T, where 1 i n. (5) Wih hreshold ξ, we can deec malicious ime offses among a se of ime offses. The hreshold-ased approach is formally defined in Definiion 6. Definiion 6 (Threshold-ased delay aack deecion): Given he ime offse daa se Γ = {δ 1,δ 2,...,δ n }, all he ime offses igger han ξ are claimed o e under delay aack and are idenified as malicious ime offses. C. Delay ack ccommodaion fer he malicious ime offses have een deeced using he hreshold, we can use he same sraegy as ha in Secion V-C o exclude hem and oain a good esimaion on he rue ime offse eween wo nodes.. Simulaion seup VII. PERFORMNCE EVLUTIONS We evaluae he performance of he wo approaches using he RBS scheme y simulaion. In he simulaion, each node has a maximum clock drif rae a microsecond level (1 6 second) [23]. The deviaions of clock drif raes among nodes are also a microsecond level. To synchronize wo nodes, a numer of reference nodes are generaed varying from 1 o 2. Each reference node roadcass a reference eacon o he wo nodes, which record he eacon receiving imes according o heir clocks. The arrival imes of he reference eacons follow Poisson disriuion, and he eacon processing ime follows normal disriuion. Since he ypical message size is 36 yes in TinyOS [24], he eacon processing ime is aou 12 milliseconds which is he ime required o process a 36-ye packe. fer he eacon has een processed, one node sends he eacon receiving ime o he oher, which calculaes he ime offse eween hem. fer hese wo nodes ge a se of ime offses, we randomly pick some of hem as malicious ime offses and assume hey are under delay aacks. We add a delay aack ime which follows normal disriuion. Based on a se of ime offses, he proposed schemes are evaluaed wih differen levels of delay aack ime and differen numer of malicious ime offses. ll resuls are oained y seing he synchronizaion inerval o 5, seconds. The resuls are averaged over 1 runs. Mos of he simulaion parameers are lised in Tale I. Three merics are used o evaluae he effeciveness of he proposed schemes: he successful deecion rae, he false posiive rae, and he accuracy improving rae. In a nework wih delay aacks, he successful deecion rae ells he percenage of malicious ime offses ha can e successful deeced. The false posiive rae shows he percenage of ime offses ha are repored as ouliers u are acually no. The accuracy improving rae shows he accuracy improvemen on he esimaed ime offse afer he deeced ouliers have een

7 Numer of reference nodes 1 o 2 Numer of malicious nodes 1 o 5 Beacon processing ime mean 12 milliseconds Beacon arrival inerval mean 2 milliseconds Clock drif rae mean.5 millisecond Clock drif rae deviaion.1 millisecond Delay aack ime 1-1 milliseconds Synchronizaion inerval 5, seconds TBLE I SIMULTION PRMETERS excluded. Le ˆδ e he esimaed ime offse when he ouliers have een excluded and δ ad e he esimaed ime offse when he ouliers have no een excluded. The accuracy improving rae is defined in Formula (6). ccuracy improving rae = δ ad ˆδ 1% (6) ˆδ B. Simulaion Resuls of he GESD-ased pproach Success Rae (in %) NUM_REF= No. of malicious nodes (delay= 1 ms) (a) Fig. 5. Success Rae (in %) NUM_REF= No. of malicious nodes (delay= 1 ms) () The successful deecion rae of GESD 1) The Successful Deecion Rae: Figure 5 shows he successful deecion raes as he numer of malicious nodes and he numer of ime offses (NUM REF) change, considering differen delay aack imes (delay). We did no show he successful deecion rae when here are five malicious nodes and NUM REF is 1, ecause GESD does no work when he numer of malicious ime offses is equal or larger han ha of he enign nodes. Based on Figure 5, we can make he following oservaions. Firs, when he delay aack is 1ms, he successful deecion rae is low in mos cases. Since he ime synchronizaion inerval is 5, seconds, he clock drif ime eween wo nodes can e as large as 1ms. I is difficul o deec he delay aacks when he delay aack ime is no significanly larger han he clock drif ime, resuling in low successful deecion rae. Second, Figure 5(a) also shows ha he successful deecion rae increases as he numer of ime offses increase in general. Given a numer of malicious ime offses, we will have more enign ime offses wih a larger se of ime offses; and he more enign nodes we have, he higher he successful deecion rae is. Thus, when here are muliple ouliers, GESD is more effecive if more ime offses are availale. Third, as long as he delay aack ime is much larger han he clock drif during he synchronizaion inerval, he successful deecion rae increases dramaically. For example, as shown in Figure 5 (), he successful deecion rae reaches 1% when he delay aack is a 1ms level. s he delay aack ime is larger han he clock drif ime, he malicious ime offses can e easily idenified. lhough no shown in he figure, GESD keeps he 1% successful deecion rae when he he delay aack ime is larger han 1ms. 2) The False Posiive Rae: The simulaion resuls show ha he false posiive rae of GESD is almos zero in our sysem seings. This is ecause a enign ime offse will no e idenified as oulier when here exiss malicious nodes. Thus, GESD works well in erms of false posiive rae. ccuracy improving rae NUM_REF= No. of malicious nodes (delay= 1 ms) (a) Fig. 6. ccuracy improving rae NUM_REF= No. of malicious nodes (delay= 1 ms) () The accuracy improving rae of GESD 3) The ccuracy Improving Rae: Figure 6 shows he accuracy improving raes wih differen level of delay aacks. From he figure, we can see ha he accuracy improving rae is low when he delay aacks are a he level of 1ms. This is ecause he delay aack ime is relaively small compared o he clock drif ime during he 5,-second inerval. Thus, excluding he malicious ime offses canno have oo much improvemen. However, as he delay aack ime increases, excluding he malicious ime offses can significanly improve he accuracy improvemen rae. For example, when he delay aack ime is 1ms, he accuracy improving rae can e increased y as much as 16 imes (see Figure 6()). C. Simulaion Resuls of he Threshold-ased pproach Success Rae (in %) NUM_REF= No. of malicious nodes (delay= 1 ms) Fig. 7. (a) Success Rae (in %) NUM_REF= No. of malicious nodes (delay= 1 ms) () The successful deecion rae of he hreshold-ased approach 1) The Successful Deecion Rae: Figure 7 shows he successful deecion raes wih differen level of delay aacks when he synchronizaion inerval is 5,-second. s shown in Figure 7(a), when he delay aack ime is 1ms, he hreshold-ased scheme can achieve higher successful deecion rae (nearly 1% in all he cases) compared o GESD (Figure 5(a)). This shows ha he hreshold-ased approach is effecive even when he delay aack ime is small compared

8 o he clock drif rae. In he hreshold-ased approach, he hreshold reflecs oh he maximum ime offse ha wo nodes can have when here is no delay aack and he ime offse caused y clock drif during he synchronizaion inerval. Thus, even hough delay aack ime is no large compared o he clock drif ime, i can sill e deeced a a high rae. Similar o GESD, he hreshold-ased approach achieves a 1% successful deecion rae when he delay aack ime is 1ms. Figure 7 also shows ha he successful deecion rae does no change oo much as he numer of malicious ime offses increases. Differen from GESD, he hreshold is no affeced y he numer of malicious ime offses. In summary, he hreshold-ased approach can achieve a eer successful deecion rae han GESD. The hresholdased scheme performs well even when he delay aack ime is small compared o he clock drif ime and i is rous agains muliple delay aacks. 2) The False Posiive Rae: Simulaion resuls show ha he false posiive rae of he hreshold-ased approach is always zero in differen seings. This is ecause he hreshold is deermined in such a way ha no enign ime offses will e idenified as malicious. From he false posiive rae poin of view, oh he GESD approach and he hreshold-ased approach perform well. ccuracy improving rae NUM_REF= No. of malicious nodes (delay= 1 ms) Fig. 8. (a) ccuracy improving rae NUM_REF= No. of malicious nodes (delay= 1 ms) () The accuracy improving rae of he hreshold-ased approach 3) The ccuracy Improving Rae: Figure 8 shows he accuracy improving raes wih differen level of delay aacks. Compared o Figure 6, Figure 8 shows ha he accuracy improving rae achieved in he hreshold-ased approach is higher han ha of GESD. This can e explained y he fac ha he hreshold-ased approach can achieve a much higher successful deecion rae han GESD. s he delay aack ime increases, he improvemen on he accuracy also increases as shown in Figure 8(a) and (). In erms of he accuracy improving rae, he hreshold-ased approach performs eer han GESD, which is consisen wih he resuls of he successful deecion rae. VIII. CONCLUSIONS In his paper, we idenified various aacks ha are effecive o several represenaive ime synchronizaion schemes, and focused on dealing wih he delay aack. We proposed wo soluions o deec and accommodae he delay aacks. Our firs approach uses he generalized exreme sudenized deviae (GESD) algorihm o deec muliple ouliers inroduced y he compromised nodes and our second approach uses a hreshold derived using a ime ransformaion echnique o filer ou he ouliers. Exensive simulaion resuls show ha oh schemes are effecive in defending agains delay aacks. However, he GESD approach needs more reference nodes o effecively deec he malicious nodes. The hreshold ased approach relaxes his assumpion and ouperforms GESD in erms of successful deecion rae, false posiive rae, and accuracy improving rae. In he fuure, we will evaluae he overhead of collecing muliple ime offses in our schemes. We will also look ino schemes o reduce he overhead and make our scheme more efficien and pracical. CKNOWLEDGMENT This work was suppored in par y rmy Research Office (W911NF ) and he Naional Science Foundaion (CCR-9277, CNS , and CNS-51946). REFERENCES [1] W. Zhang and G. Cao, Opimizing Tree Reconfiguraion for Moile Targe Tracking in Sensor Neworks, IEEE INFOCOM, 24. [2] J. Elson, L. Girod, and D. Esrin, Fine-grained nework ime synchronizaion using reference roadcass, SIGOPS Oper. Sys. Rev., vol. 36, no. SI, pp , 22. [3] S. Ganeriwal, R. Kumar, and M. B. Srivasava, Timing-sync proocol for sensor neworks, in Proceedings of he 1s In l Conf. on Emedded Neworked Sensor Sysems. CM Press, 23, pp [4] J. van Greunen and J. Raaey, Lighweigh ime synchronizaion for sensor neworks, in CM WSN, 23, pp [5] M. L. Sichiiu and C. Veerariiphan, Simple, ccurae Time Synchronizaion for Wireless Sensor Neworks, Wireless Communicaions and Neworking (WCNC 3), IEEE, vol. 2, pp. 16 2, March 23. [6] Q. Li and D. Rus, Gloal clock synchronizaion in sensor neworks, in IEEE INFOCOM, March 24. [Online]. vailale: cieseer.is.psu.edu/li4gloal.hml [7] M. Chen, W. Cui, V. Wen, and. Woo, Securiy and deploymen issues in a sensor nework, 2. [Online]. vailale: cieseer.is.psu.edu/chensecuriy.hml [8] S. Mari, T. J. Giuli, K. Lai, and M. Baker, Miigaing rouing misehavior in moile ad hoc neworks, in CM MOBICOM, 2, pp [9] J. Y. Halpern, B. Simons, R. Srong, and D. Dolev, Faul-oleran clock synchronizaion, in CM PODC, 1984, pp [1] L. Lampor and P. M. Melliar-Smih, Byzanine clock synchronizaion, in CM PODC, 1984, pp [11] L. Lampor and P. Melliar-Smih, Synchronizing clocks in he presence of fauls, J. CM, vol. 32, no. 1, pp , [12]. Olson and K. G. Shin, Faul-oleran clock synchronizaion in large mulicompuer sysems, IEEE Trans. Parallel Disri. Sys., vol. 5, no. 9, pp , [13] J. Elson and D. Esrin, Time synchronizaion for wireless sensor neworks, in Proceedings of he 15h Inernaional Parallel & Disriued Processing Symposium. IEEE Compuer Sociey, 21, p [14] C. Sanivanez and J. Redi, On he Use of Direcional nennas for Sensor Neworks, in IEEE MILCOM,, Ocoer 23. [15] C. T. Inc., Wireless sensor neworks, in hp:// ccessed in Novemer, 24. [16] S. Zhu, S. Seia, and S. Jajodia, Leap: efficien securiy mechanisms for large-scale disriued sensor neworks, in CM CCS, 23, pp [17]. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, Spins: securiy proocols for sensor neworks, Wirel. New., vol. 8, no. 5, pp , 22. [18] W. Zhang and G. Cao, Group Rekeying for Filering False Daa in Sensor Neworks: Predisriuion and Local Collaoraion-Based pproach, IEEE INFOCOM, March 25. [19] W. Xu, W. Trappe, Y. Zhang, and T. Wood, The feasiiliy of launching and deecing jamming aacks in wireless neworks, in CM MOBI- HOC, 25, pp [2] D. M. Hawkins, Idenificaion of ouliers. New York: Chapman and Hall, 198. [21] B. Iglewicz and D. C. Hoaglin, How o deec and handle ouliers. SQC asic references in qualiy conrol, [22] B. Rosner, Percenage poins for generalized ESD many-oulier procedure, Technomerics, [23] K. Römer, Time synchronizaion in ad hoc neworks, in CM MOBI- HOC, 21, pp [24] J. Hill, R. Szewczyk,. Woo, S. Hollar, D. Culler, and K. Piser, Sysem archiecure direcions for neworked sensors, SIGOPS Oper. Sys. Rev., vol. 34, no. 5, pp , 2.

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes. 8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany Low-Cos WLAN based Time-of-fligh fligh Trilaeraion Precision Indoor Personnel Locaion and Tracking for Emergency Responders Third Annual Technology Workshop, Augus 5, 2008 Worceser Polyechnic Insiue, Worceser,

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links 1 in Low-uy-ycle Wireless Sensor Neworks wih Unreliable Links Shuo uo, Suden Member, IEEE, Liang He, Member, IEEE, Yu u, Member, IEEE, o Jiang, Suden Member, IEEE, and Tian He, Member, IEEE bsrac looding

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

Difficulty-aware Hybrid Search in Peer-to-Peer Networks

Difficulty-aware Hybrid Search in Peer-to-Peer Networks Difficuly-aware Hybrid Search in Peer-o-Peer Neworks Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni School of Compuer Science and Technology Huazhong Univ. of Science and Technology {chenhanhua, hjin}@hus.edu.cn

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy

More information

Real Time Integral-Based Structural Health Monitoring

Real Time Integral-Based Structural Health Monitoring Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

Simple Network Management Based on PHP and SNMP

Simple Network Management Based on PHP and SNMP Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chaper 3 MEDIA ACCESS CONTROL Overview Moivaion SDMA, FDMA, TDMA Aloha Adapive Aloha Backoff proocols Reservaion schemes Polling Disribued Compuing Group Mobile Compuing Summer 2003 Disribued Compuing

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same

More information

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley. Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah

More information

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc

More information

Attack-resilient time synchronization for wireless sensor networks

Attack-resilient time synchronization for wireless sensor networks Ad Hoc Networks 5 (27) 112 125 www.elsevier.com/locate/adhoc Attack-resilient time synchronization for wireless sensor networks Hui Song *, Sencun Zhu 1, Guohong Cao Department of Computer Science and

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial

More information

Gauss-Jordan Algorithm

Gauss-Jordan Algorithm Gauss-Jordan Algorihm The Gauss-Jordan algorihm is a sep by sep procedure for solving a sysem of linear equaions which may conain any number of variables and any number of equaions. The algorihm is carried

More information

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems SEINA: A Sealhy and Effecive Inernal Aack in Hadoop Sysems Jiayin Wang, Teng Wang, Zhengyu Yang, Ying ao, Ningfang i, and Bo Sheng Deparmen of Compuer Science, Universiy of assachuses Boson, 1 orrissey

More information

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi: MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

Improved TLD Algorithm for Face Tracking

Improved TLD Algorithm for Face Tracking Absrac Improved TLD Algorihm for Face Tracking Huimin Li a, Chaojing Yu b and Jing Chen c Chongqing Universiy of Poss and Telecommunicaions, Chongqing 400065, China a li.huimin666@163.com, b 15023299065@163.com,

More information

Visual Indoor Localization with a Floor-Plan Map

Visual Indoor Localization with a Floor-Plan Map Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson

More information

4.1 3D GEOMETRIC TRANSFORMATIONS

4.1 3D GEOMETRIC TRANSFORMATIONS MODULE IV MCA - 3 COMPUTER GRAPHICS ADMN 29- Dep. of Compuer Science And Applicaions, SJCET, Palai 94 4. 3D GEOMETRIC TRANSFORMATIONS Mehods for geomeric ransformaions and objec modeling in hree dimensions

More information

NEWTON S SECOND LAW OF MOTION

NEWTON S SECOND LAW OF MOTION Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

An Adaptive Spatial Depth Filter for 3D Rendering IP

An Adaptive Spatial Depth Filter for 3D Rendering IP JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod

More information

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

An Improved Square-Root Nyquist Shaping Filter

An Improved Square-Root Nyquist Shaping Filter An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com

More information

WINNOWING : Protecting P2P Systems Against Pollution By Cooperative Index Filtering

WINNOWING : Protecting P2P Systems Against Pollution By Cooperative Index Filtering WINNOWING : Proecing P2P Sysems Agains Polluion By Cooperaive Index Filering Kyuyong Shin, Douglas S. Reeves, Injong Rhee, Yoonki Song Deparmen of Compuer Science Norh Carolina Sae Universiy Raleigh, NC

More information

IDEF3 Process Description Capture Method

IDEF3 Process Description Capture Method IDEF3 Process Descripion Capure Mehod IDEF3 is par of he IDEF family of mehods developmen funded by he US Air Force o provide modelling suppor for sysems engineering and enerprise inegraion 2 IDEF3 Mehod

More information

Chapter 4 Sequential Instructions

Chapter 4 Sequential Instructions Chaper 4 Sequenial Insrucions The sequenial insrucions of FBs-PLC shown in his chaper are also lised in secion 3.. Please refer o Chaper, "PLC Ladder diagram and he Coding rules of Mnemonic insrucion",

More information

Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets

Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets Thwaring lackhole acks in Disrupion-Toleran Neworks using ncouner Tickes Feng Li, Jie Wu Dep. of ompuer Science and ngineering Florida lanic Universiy oca Raon, FL 33431 vinash Srinivasan Dep. of Mah,

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

Landmarks: A New Model for Similarity-Based Pattern Querying in Time Series Databases

Landmarks: A New Model for Similarity-Based Pattern Querying in Time Series Databases Lmarks: A New Model for Similariy-Based Paern Querying in Time Series Daabases Chang-Shing Perng Haixun Wang Sylvia R. Zhang D. So Parker perng@cs.ucla.edu hxwang@cs.ucla.edu Sylvia Zhang@cle.com so@cs.ucla.edu

More information

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u Send Orders for Reprins o reprins@benhamscience.ae The Open Biomedical Engineering Journal, 5, 9, 9-3 9 Open Access Research on an Improved Medical Image Enhancemen Algorihm Based on P-M Model Luo Aijing

More information

Y. Tsiatouhas. VLSI Systems and Computer Architecture Lab

Y. Tsiatouhas. VLSI Systems and Computer Architecture Lab CMOS INEGRAED CIRCUI DESIGN ECHNIQUES Universiy of Ioannina Clocking Schemes Dep. of Compuer Science and Engineering Y. siaouhas CMOS Inegraed Circui Design echniques Overview 1. Jier Skew hroughpu Laency

More information

Video Content Description Using Fuzzy Spatio-Temporal Relations

Video Content Description Using Fuzzy Spatio-Temporal Relations Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

A Fast Stereo-Based Multi-Person Tracking using an Approximated Likelihood Map for Overlapping Silhouette Templates

A Fast Stereo-Based Multi-Person Tracking using an Approximated Likelihood Map for Overlapping Silhouette Templates A Fas Sereo-Based Muli-Person Tracking using an Approximaed Likelihood Map for Overlapping Silhouee Templaes Junji Saake Jun Miura Deparmen of Compuer Science and Engineering Toyohashi Universiy of Technology

More information

Page 1. Key Points from Last Lecture Frame format. EEC173B/ECS152C, Winter Wireless LANs

Page 1. Key Points from Last Lecture Frame format. EEC173B/ECS152C, Winter Wireless LANs EEC173/ECS152C, Winer 2006 Key Poins from Las Lecure Wireless LANs 802.11 Frame forma 802.11 MAC managemen Synchronizaion, Handoffs, Power MAC mehods: DCF & PCF CSMA/CA wih posiive ACK Exponenial backoff

More information

Locating Internet Bottlenecks: Algorithms, Measurements, and Implications

Locating Internet Bottlenecks: Algorithms, Measurements, and Implications Locaing Inerne Bolenecks: Algorihms, Measuremens, and Implicaions Ningning Hu Li (Erran) Li Zhuoing Morley Mao Carnegie Mellon Universiy Bell Laboraories Universiy of Michigan hnn@cs.cmu.edu erranlli@bell-labs.com

More information

MB86297A Carmine Timing Analysis of the DDR Interface

MB86297A Carmine Timing Analysis of the DDR Interface Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl

More information

Multi-Target Detection and Tracking from a Single Camera in Unmanned Aerial Vehicles (UAVs)

Multi-Target Detection and Tracking from a Single Camera in Unmanned Aerial Vehicles (UAVs) 2016 IEEE/RSJ Inernaional Conference on Inelligen Robos and Sysems (IROS) Daejeon Convenion Cener Ocober 9-14, 2016, Daejeon, Korea Muli-Targe Deecion and Tracking from a Single Camera in Unmanned Aerial

More information

Hermite Curves. Jim Armstrong Singularity November 2005

Hermite Curves. Jim Armstrong Singularity November 2005 TechNoe TN-5- Herie Curves Ji Arsrong Singulariy Noveer 5 This is he second in a series of TechNoes on he sujec of applied curve aheaics in Adoe Flash TM. Each TechNoe provides a aheaical foundaion for

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Sociey Convenion Paper Presened a he 119h Convenion 2005 Ocober 7 10 New Yor, New Yor USA This convenion paper has been reproduced from he auhor's advance manuscrip, wihou ediing, correcions,

More information

CENG 477 Introduction to Computer Graphics. Modeling Transformations

CENG 477 Introduction to Computer Graphics. Modeling Transformations CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home

More information

Analyzing of RESPIRE, a novel approach to automatically blocking SYN flooding attacks

Analyzing of RESPIRE, a novel approach to automatically blocking SYN flooding attacks Analyzing of RESPIRE, a novel approach o auomaically blocking SYN flooding aacks ANDRÁS KORN, JUDIT GYIMESI, DR. GÁBOR FEHÉR Budapes Universiy of Technology and Economics, Deparmen of Telecommunicaion

More information

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2

More information

A MAC layer protocol for wireless networks with asymmetric links

A MAC layer protocol for wireless networks with asymmetric links A MAC layer proocol for wireless neworks wih asymmeric links Guoqiang Wang, Damla Turgu, Ladislau Bölöni, Yongchang Ji, Dan C. Marinescu School of Elecrical Engineering and Compuer Science, Universiy of

More information

Video streaming over Vajda Tamás

Video streaming over Vajda Tamás Video sreaming over 802.11 Vajda Tamás Video No all bis are creaed equal Group of Picures (GoP) Video Sequence Slice Macroblock Picure (Frame) Inra (I) frames, Prediced (P) Frames or Bidirecional (B) Frames.

More information

IntentSearch:Capturing User Intention for One-Click Internet Image Search

IntentSearch:Capturing User Intention for One-Click Internet Image Search JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO. 1, JANUARY 2010 1 InenSearch:Capuring User Inenion for One-Click Inerne Image Search Xiaoou Tang, Fellow, IEEE, Ke Liu, Jingyu Cui, Suden Member, IEEE, Fang

More information

Mobile Robots Mapping

Mobile Robots Mapping Mobile Robos Mapping 1 Roboics is Easy conrol behavior percepion modelling domain model environmen model informaion exracion raw daa planning ask cogniion reasoning pah planning navigaion pah execuion

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

Automatic Calculation of Coverage Profiles for Coverage-based Testing

Automatic Calculation of Coverage Profiles for Coverage-based Testing Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a

More information

Selective Offloading in Mobile Edge Computing for the Green Internet of Things

Selective Offloading in Mobile Edge Computing for the Green Internet of Things EDGE COMPUTING FOR THE INTERNET OF THINGS Selecive Offloading in Mobile Edge Compuing for he Green Inerne of Things Xinchen Lyu, Hui Tian, Li Jiang, Alexey Vinel, Sabia Maharjan, Sein Gjessing, and Yan

More information

Optimal Crane Scheduling

Optimal Crane Scheduling Opimal Crane Scheduling Samid Hoda, John Hooker Laife Genc Kaya, Ben Peerson Carnegie Mellon Universiy Iiro Harjunkoski ABB Corporae Research EWO - 13 November 2007 1/16 Problem Track-mouned cranes move

More information

In fmri a Dual Echo Time EPI Pulse Sequence Can Induce Sources of Error in Dynamic Magnetic Field Maps

In fmri a Dual Echo Time EPI Pulse Sequence Can Induce Sources of Error in Dynamic Magnetic Field Maps In fmri a Dual Echo Time EPI Pulse Sequence Can Induce Sources of Error in Dynamic Magneic Field Maps A. D. Hahn 1, A. S. Nencka 1 and D. B. Rowe 2,1 1 Medical College of Wisconsin, Milwaukee, WI, Unied

More information

DCF/DSDMA: Enhanced DCF with SDMA Downlink Transmissions for WLANs

DCF/DSDMA: Enhanced DCF with SDMA Downlink Transmissions for WLANs DCF/DSDMA: Enhanced DCF wih SDMA Downlink Transmissions for WLANs Ruizhi Liao, oris ellala, Crisina Cano and Miquel Oliver NeTS Research Group Deparmen of Informaion and Communicaion Technologies Universia

More information

PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS

PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS Jun Peng Elecrical Engineering Deparmen, Universiy of Texas Rio Grande Valley, Edinburg, Texas, USA ABSTRACT Unmanned

More information

Robot localization under perceptual aliasing conditions based on laser reflectivity using particle filter

Robot localization under perceptual aliasing conditions based on laser reflectivity using particle filter Robo localizaion under percepual aliasing condiions based on laser refleciviy using paricle filer DongXiang Zhang, Ryo Kurazume, Yumi Iwashia, Tsuomu Hasegawa Absrac Global localizaion, which deermines

More information

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram nnouncemens TCP Congesion Conrol Projec #3 should be ou onigh Can do individual or in a eam of 2 people Firs phase due November 16 - no slip days Exercise good (beer) ime managemen EE 122: Inro o Communicaion

More information

Definition and examples of time series

Definition and examples of time series Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is

More information

STRING DESCRIPTIONS OF DATA FOR DISPLAY*

STRING DESCRIPTIONS OF DATA FOR DISPLAY* SLAC-PUB-383 January 1968 STRING DESCRIPTIONS OF DATA FOR DISPLAY* J. E. George and W. F. Miller Compuer Science Deparmen and Sanford Linear Acceleraor Cener Sanford Universiy Sanford, California Absrac

More information

SREM: A Novel Multicast Routing Algorithm - Comprehensive Cost Analysis

SREM: A Novel Multicast Routing Algorithm - Comprehensive Cost Analysis REM: A Novel Mulicas Rouing Algorihm - Comprehensive Cos Analysis Yewen Cao and Khalid Al-Begain chool of Compuing, Universiy of Glamorgan, CF37 DL, Wales, U.K E-mail:{ycao,kbegain}@glam.ac.uk Absrac Ever-increasing

More information

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS NME: TE: LOK: MOTION ETETORS GRPH MTHING L PRE-L QUESTIONS 1. Read he insrucions, and answer he following quesions. Make sure you resae he quesion so I don hae o read he quesion o undersand he answer..

More information

Video-Based Face Recognition Using Probabilistic Appearance Manifolds

Video-Based Face Recognition Using Probabilistic Appearance Manifolds Video-Based Face Recogniion Using Probabilisic Appearance Manifolds Kuang-Chih Lee Jeffrey Ho Ming-Hsuan Yang David Kriegman klee10@uiuc.edu jho@cs.ucsd.edu myang@honda-ri.com kriegman@cs.ucsd.edu Compuer

More information

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering

More information

LHP: An end-to-end reliable transport protocol over wireless data networks

LHP: An end-to-end reliable transport protocol over wireless data networks LHP: An end-o-end reliable ranspor proocol over wireless daa neworks Xia Gao, Suhas N. Diggavi, S. Muhukrishnan Absrac The nex generaion wireless neworks are posied o suppor large scale daa applicaions.

More information

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably.

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably. Evaluaing Web User Perceived Laency Using Server Side Measuremens Marik Marshak 1 and Hanoch Levy School of Compuer Science Tel Aviv Universiy, Tel-Aviv, Israel mmarshak@emc.com, hanoch@pos.au.ac.il 1

More information

EECS 487: Interactive Computer Graphics

EECS 487: Interactive Computer Graphics EECS 487: Ineracive Compuer Graphics Lecure 7: B-splines curves Raional Bézier and NURBS Cubic Splines A represenaion of cubic spline consiss of: four conrol poins (why four?) hese are compleely user specified

More information

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks MoBAN: A Configurable Mobiliy Model for Wireless Body Area Neworks Majid Nabi 1, Marc Geilen 1, Twan Basen 1,2 1 Deparmen of Elecrical Engineering, Eindhoven Universiy of Technology, he Neherlands 2 Embedded

More information

Managing XML Versions and Replicas in a P2P Context

Managing XML Versions and Replicas in a P2P Context Managing XML Versions and Replicas in a P2P Conex Deise de Brum Saccol1 1,2, Nina Edelweiss 2, Renaa de Maos Galane 2,4, Carlo Zaniolo 3 2 Insiuo de Informáica - Universidade Federal do Rio Grande do Sul

More information

MOTION TRACKING is a fundamental capability that

MOTION TRACKING is a fundamental capability that TECHNICAL REPORT CRES-05-008, CENTER FOR ROBOTICS AND EMBEDDED SYSTEMS, UNIVERSITY OF SOUTHERN CALIFORNIA 1 Real-ime Moion Tracking from a Mobile Robo Boyoon Jung, Suden Member, IEEE, Gaurav S. Sukhame,

More information

Rule-Based Multi-Query Optimization

Rule-Based Multi-Query Optimization Rule-Based Muli-Query Opimizaion Mingsheng Hong Dep. of Compuer cience Cornell Universiy mshong@cs.cornell.edu Johannes Gehrke Dep. of Compuer cience Cornell Universiy johannes@cs.cornell.edu Mirek Riedewald

More information

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes Modeling of IEEE 802.15.4 in a Cluser of Synchronized Sensor Nodes Kenji Leibniz, Naoki Wakamiya, and Masayuki Muraa Graduae School of Informaion Science and Technology, Osaka Universiy, 1-5 Yamadaoka,

More information

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks Carnegie Mellon Universiy From he SelecedWorks of Jia Zhang Ocober, 203 Service Oriened Soluion Modeling and Variaion Propagaion Analysis based on Archiecural uilding locks Liang-Jie Zhang Jia Zhang Available

More information

Using CANopen Slave Driver

Using CANopen Slave Driver CAN Bus User Manual Using CANopen Slave Driver V1. Table of Conens 1. SDO Communicaion... 1 2. PDO Communicaion... 1 3. TPDO Reading and RPDO Wriing... 2 4. RPDO Reading... 3 5. CANopen Communicaion Parameer

More information

Motor Control. 5. Control. Motor Control. Motor Control

Motor Control. 5. Control. Motor Control. Motor Control 5. Conrol In his chaper we will do: Feedback Conrol On/Off Conroller PID Conroller Moor Conrol Why use conrol a all? Correc or wrong? Supplying a cerain volage / pulsewidh will make he moor spin a a cerain

More information

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System Proceedings of he 6h WSEAS Inernaional Conference on Applied Compuer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 346 User Adjusable Process Scheduling Mechanism for a Muliprocessor Embedded

More information

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 439 Vulnerabiliy valuaion of Mulimedia Subsysem Based on Complex ewor Xiaoling Tang Insiue of Higher ducaion Research, Jilin Business and Technology College,

More information