Introduction to Shannon sampling and interpolation theory
Introduction to Shannon sampling and interpolation theory
Ten lectures on wavelets
Single-Bit Oversampled A/D Conversion with Exponential Accuracy in the Bit-Rate
DCC '00 Proceedings of the Conference on Data Compression
Interpolation of Bandlimited Functions from Quantized Irregular Samples
DCC '02 Proceedings of the Data Compression Conference
Sampling signals with finite rate of innovation
IEEE Transactions on Signal Processing
Error-rate characteristics of oversampled analog-to-digital conversion
IEEE Transactions on Information Theory
The capacity of wireless networks
IEEE Transactions on Information Theory
On distributed sampling of smooth non-bandlimited fields
Proceedings of the 3rd international symposium on Information processing in sensor networks
Proceedings of the 3rd international symposium on Information processing in sensor networks
Rate-distortion problem for physics based distributed sensing
Proceedings of the 3rd international symposium on Information processing in sensor networks
Wireless sensor networks
Spatio-temporal sampling rates and energy efficiency in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 5th international conference on Information processing in sensor networks
Effects of A-D conversion nonidealities on distributed sampling in dense sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Matched source-channel communication for field estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Energy-constrained optimal quantization for wireless sensor networks
EURASIP Journal on Advances in Signal Processing
Limits of signal processing performance under thresholding
Signal Processing
IEEE Transactions on Image Processing
Entropy of highly correlated quantized data
IEEE Transactions on Information Theory
IEEE Transactions on Wireless Communications
Random field estimation with delay-constrained and delay-tolerant wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on signal processing-assisted protocols and algorithms for cooperating objects and wireless sensor networks
Unboundedness of thresholding and quantization for bandlimited signals
Signal Processing
Minimum transmission power configuration in real-time sensor networks with overlapping channels
ACM Transactions on Sensor Networks (TOSN)
Hi-index | 0.06 |
We address the problem of deterministic oversampling of bandlimited sensor fields in a distributed communication-constrained processing environment, where it is desired for a central intelligent unit to reconstruct the sensor field to maximum pointwise accuracy.We show, using a dither-based sampling scheme, that is is possible to accomplish this using minimal inter-sensor communication with the aid of a multitude of low-precision sensors. Furthermore, we show the feasibility of having a flexible tradeoff between the average oversampling rate and the Analog to Digital (A/D) quantization precision per sensor sample with respect to achieving exponential accuracy in the number of bits per Nyquist-period, thereby exposing a key underpinning "conservation of bits" principle. That is, we can distribute the bit budget per Nyquist-period along the amplitude-axis (precision of A/D converter) and space (or time or space-time) using oversampling in an almost arbitrary discrete-valued manner, while retaining the same reconstruction error decay profile. Interestingly this oversampling is possible in a highly localized communication setting, with only nearest-neighbor communication, making it very attractive for dense sensor networks operating under stringent inter-node communication constraints. Finally we show how our scheme incorporates security as a by-product due to the presence of an underlying dither signal which can be used as a natural encryption device for security. The choice of the dither function enhances the security of the network.