Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
Habitat monitoring with sensor networks
Communications of the ACM - Wireless sensor networks
Mitigating congestion in wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Deploying a Wireless Sensor Network on an Active Volcano
IEEE Internet Computing
Constraint chaining: on energy-efficient continuous monitoring in sensor networks
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Suppression and failures in sensor networks: a Bayesian approach
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Hi-index | 0.00 |
In this paper we present a fully model-based analysis of the effects of suppression and failure in data transmission with sensor networks. Sensor networks are becoming an increasingly common data collection mechanism in a variety of fields. Sensors can be created to collect data at very high temporal resolution. However, during periods when the process is following a stable path, transmission of such high resolution data would carry little additional information with regard to the process model, i.e., all of the data that is collected need not be transmitted. In particular, when there is cost to transmission, we find ourselves moving to consideration of suppression in transmission. Additionally, for many sensor networks, in practice, we will experience failures in transmission--messages sent by a sensor but not received at the gateway, messages sent but arriving corrupted. Evidently, both suppression and failure lead to information loss which will be reflected in inference associated with our process model. Our effort here is to assess the impact of such information loss under varying extents of suppression and varying incidence of failure. We consider two illustrative process models, presenting fully model-based analyses of suppression and failure using hierarchical models. Such models naturally facilitate borrowing strength across nodes, leveraging all available data to learn about local process behavior.