49 research outputs found

    Fault-tolerant rate-monotonic first-fit scheduling in hard-real-time systems

    Full text link

    Efficient Location Training Protocols for Localization in Heterogeneous Sensor and Actor Networks

    No full text
    International audienceAbstract--In this work we consider a large-scale geographic area populated by tiny sensors and some more powerful devices called actors, authorized to organize the sensors in their vicinity into short-lived, actor-centric sensor networks. The tiny sensors run on miniature non-rechargeable batteries, are anonymous and are unaware of their location. The sensors differ in their ability to dynamically alter their sleep times. Indeed, the periodic sensors have sleep periods of predefined lengths, established at fabrication time; by contrast, the free sensors can dynamically alter their sleep periods, under program control. The main contribution of this work is to propose an energy-efficient location training protocol for heterogeneous actor-centric sensor networks where the sensors acquire coarse-grain location awareness with respect to the actor in their vicinity. Our analytical analysis, confirmed by experimental evaluation, show that the proposed protocol outperforms the best previously-known location training protocols in terms of the number of sleep/awake transitions, overall sensor awake time, and energy consumption

    Efficient Binary scheme for Training Heterogeneous Sensor Actor Networks

    No full text
    International audienceSensor networks are expected to evolve into long-lived, autonomous networked systems whose main mission is to provide in-situ users – called actors – with real-time information in support of specific goals supportive of their mission. The network is populated with a heterogeneous set of tiny sensors. The free sensors alternate between sleep and awake periods, under program control in response to computational and communication needs. The periodic sensors alternate between sleep periods and awake periods of predefined lengths, established at the fabrication time. The architectural model of an actor-centric network used in this work comprises in addition to the tiny sensors a set of mobile actors that organize and manage the sensors in their vicinity. We take the view that the sensors deployed are anonymous and unaware of their geographic location. Importantly, the sensors are not, a priori, organized into a network. It is, indeed, the interaction between the actors and the sensor population that organizes the sensors in a disk around each actor into a short-lived, mission-specific, network that exists for the purpose of serving the actor and that will be disbanded when the interaction terminates. The task of setting up this form of actor-centric network involves a training stage where the sensors acquire dynamic coordinates relative to the actor in their vicinity. The main contribution of this work is to propose an energy- efficient training protocol for actor-centric heterogeneous sensor networks. Our protocol outperforms all know training protocols in the number of sleep/awake transitions per sensor needed by the training process. Specifically, in the presence of kk coronas, no sensor will experience more thanlog(k) \lceil log(k)\rceil sleep/awake transitions and awake periods

    L(h,1,1)-Labeling of Outerplanar Graphs

    Full text link

    Access Control for Data Integration in Presence of Data Dependencies

    Full text link
    International audienceDefining access control policies in a data integration scenario is a challenging task. In such a scenario typically each source specifies its local access control policy and cannot anticipate data inferences that can arise when data is integrated at the mediator level. Inferences, e.g., using functional dependencies, can allow malicious users to obtain, at the mediator level, prohibited information by linking multiple queries and thus violating the local policies. In this paper, we propose a framework, i.e., a methodology and a set of algorithms, to prevent such violations. First, we use a graph-based approach to identify sets of queries, called violating transactions, and then we propose an approach to forbid the execution of those transactions by identifying additional access control rules that should be added to the mediator. We also state the complexity of the algorithms and discuss a set of experiments we conducted by using both real and synthetic datasets. Tests also confirm the complexity and upper bounds in worst-case scenarios of the proposed algorithms
    corecore