DCDD: Reliable and Energy Efficient Transport Layer for Sensor Networks Petar Djukic and Shahrokh Valaee The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto, 10 King’s College Road, Toronto, ON, M5S 3G4, Canada e-mail:{djukic,valaee}@comm.utoronto.ca

Abstract— We present Diversity Coded Directed Diffusion (DCDD), a reliable and energy efficient transport protocol for sensor networks. In DCDD, the sink uses a number of receivers— called “prongs”—that connect to it with reliable links. Sensor split observations into many fragments and generate parity fragments with an FEC algorithm. The fragments are then distributed over the paths and simultaneously sent to the sink. The sink can reconstruct the observation if it receives a portion of the fragments which is of the same size as the original observation. We use the ns-2 simulator to examine the ability of DCDD to increase end-to-end reliability, as well as the effect of DCDD on energy consumption in the network. Our simulations show that the network where DCDD is used outperforms the network in which the sensors use only MAC retransmissions to increase reliability. DCDD makes the energy use in the network more fair and at the same time it increases the end-to-end reliability in the network. DCDD also decreases the delay in the network. Index Terms— Sensor networks, directed diffusion, fault tolerance, energy efficient protocols

I. I NTRODUCTION Wireless sensor networks are used to observe natural phenomena such as seismological and weather conditions, collect data in battlefields, and monitor traffic in urban areas. The observed data is usually in the order of several bytes per observation and the receipt of every observation is not essential. In the future, sensor networks will be made of video and image enabled sensors. The observed data will be in the order of several kilobytes per observation and the correct reception of every piece of data will be essential. In this paper, we are working on a security system implemented with image enabled sensors. Sensors would be placed throughout a building and occasionally take pictures of their environment. If an incident is detected, the security management center (the sink) requests the sensors in the vicinity of the incident to send their most recent images and to start taking new images more frequently and report them at regular intervals. Once the incident is over, the sink requests that sensors stop sending their images. The security system’s network layer is implemented with directed diffusion [1]–[3]. Unlike the IP network layer, which routes datagrams based on unique node names, directed diffusion routes datagrams based on data naming. This type of routing is perfectly suited for our sensor network since the identification of sensors is not important, but the location and the content of observations is. However, directed diffusion

delivers datagrams from the sensors to the sink with best effort and it does not take into account reliability or energy characteristics of sensor networks. It has been shown previously that radio links in sensor networks are extremely unreliable [4]. This makes it necessary to add a transport layer to directed diffusion, especially if the sensors are transmitting large observations split into smaller datagrams. In this case, it is essential for the sink to receive the complete sequence of datagrams to be able to retrieve the whole observation. The traditional end-to-end transport layer approaches do not work in sensor networks since they rely both on end-toend retransmissions and hop-to-hop retransmission for reliable delivery of large data. The end-to-end retransmissions make the system unscalable since the number of sensor in the network is very large and it may be impossible for the sink to track hundreds or thousands of connections from the reporting sensors. At the same time the hop-to-hop retransmissions are energy inefficient since wireless transmissions are the biggest energy consumer on the sensors [5]. We propose diversity coded directed diffusion (DCDD) as a transport layer on top of directed diffusion. DCDD uses multiple network paths and forward erasure codes (FEC) to increase reliability and improve energy use in the network. In DCDD, the sink uses a number of receivers—called “prongs”—that connect to it with reliable links. This creates a hierarchical architecture where each sensor can be connected to a prong directly or with multiple hops through other sensors. In addition, the prongs are set sufficiently apart from each other, so that the sensor can reach each prong through paths independent of paths to other prongs.1 The sensor splits each observation into many fragments and generates parity fragments with an erasure code [6]. The fragments are then distributed over the paths and simultaneously sent to the sink. The sink can reconstruct the packet if it receives a portion of the fragments which is of the same size as the original observation. We examine performance of DCDD with ns-2 simulations [7]. We show that DCDD increases the end-to-end reliability by about 10% compared to when the reliability is provided solely by retransmissions in the MAC layer, and that DCDD 1 Here, we use multipaths in the network layer, as opposed to a scheme that may use multipaths in the physical layer.

App

significantly lowers delay in the network. We also show that DCDD introduces significant load-balancing of energy consumption in the network.

2

Filter 3 4

5

Routing 6

7

Directed Diffusion Core

A. Related Work We first review two transport layer approaches designed specifically for sensor networks, and then we review diversity coded routing approaches. Reliable multi-segment transport (RMST) protocol for directed diffusion was proposed in [8]. The protocol uses a combination of end-to-end retransmissions, hop-to-hop retransmissions in the MAC layer, and caching on intermediate nodes to provide reliable delivery of large observations. The pump slowly, fetch quickly (PSFQ) protocol was designed for sensor networks where the MAC layer does not retransmit packets [9]. The protocol replaces the retransmit functionality of the MAC layer in the transport layer by letting intermediate nodes request retransmission of packets from their upstream neighbours if loss is detected. Both in the case of RMST and PSFQ the cost of energy is not taken into account. In contrast, our protocol is designed to load-balance the energy use in the network and decrease the need to retransmit packets lost in hop-to-hop transmissions. Diversity coded routing (DCR) was first proposed in [10] for use in wired networks. The focus of the work was to analyze the decrease in delay due to load balancing introduced with diversity coded routing. In [11] and [12] the authors investigate DCR for highly mobile wireless multihop networks. In that work, the authors present optimization algorithms for DCR that minimize packet loss. We introduced DCR for sensor networks in [13] and [14]. In that work, we proposed energy optimization algorithms that maximize network lifetime with a lower bound on reliability in the network. We showed, theoretically, that it is possible to use diversity coded routing to increase network lifetime and reliability in the network. In this work, we propose a protocol that implements DCR over directed diffusion, and show that indeed DCR is a good approach for sensor networks.

1 MAC

8 MAC

Fig. 1.

Directed Diffusion Network Stack

and the sink to create a network stack dynamically [3]. We first describe how data is named and then how the network stack is built using the subscribe/publish API. 1) Named Data: All data observed by sensors is named with attribute-value pairs. An observation from our security system can be named as follows: type task location time data

= = = = =

data image [10, 20] 10:02:34 blob.

The attributes of the data are on the left and the values of the attributes are on the right. The observed data is from the imaging task, at the location x = 10m and y = 20m, collected at 10:02:34 with the actual image stored as a blob.2 A similar scheme is used by the sink to name the data the sink is interested in: type task rect time

= = = >

query image [0, 50, 0, 50] 10:00:00.

The difference is that the sink names the data it is interested in, so it specifies a range of locations and times rather than a specific location and time. 2) Subscribe/publish API: In addition to named data, directed diffusion uses a subscribe/publish API to allow sensors and sinks to build the network stack. A task (application) on a sensor registers for the data of the query type with the publish call and the sink registers for the data of the data type with the subscribe call. It is also possible to register filters, which can modify the passing data, so that the stack is more elaborate. Directed diffusion keeps track of the registered applications and filters and uses a callback mechanism to indicate if data matching the registered description is encountered. We show the directed diffusion network stack in Figure 1. Data flow is shown as arrows to and from the directed diffusion core. Data can come from the application (entry point 3) or the MAC layer (entry point 1) and is then passed to applications and filters that match the data. The order in which data traverses applications and filters is established with a priority

II. D IVERSITY C ODED D IRECTED D IFFUSION In this section, we describe how the DCDD layer works and the changes necessary in directed diffusion to allow the use of multiple prongs and FEC to transmit large observations from the source to the sink. We first describe how directed diffusion operates and then we describe how DCDD is added to the directed diffusion network stack. A. Directed Diffusion Directed diffusion uses named data and the subscribe/publish API to provide communication channels between sensors and sinks. On the sensor, the sensing tasks publish their data and on the sink the collecting applications subscribe to specific observations. Naming of the data is necessary so that directed diffusion can filter and steer the data to the sinks that subscribe to it. Together, named data and the subscribe/publish API allow the sensors

2 We

2

make the location attribute a coordinate to simplify exposition.

TABLE I Data 1 2 ... s

Received on p1 1 ... 5

encoder

1 2 ... s + p Encoded Data

directed diffusion

6 ... Received on p2

SEGMENTID FIELDS

Data 1 2 ... s

decoder

20 . . . p + s Received on p3

Fig. 2.

Field

Size

Description

flowid seqid maxid inseqid

8 5 4 15

Identifies the sensor Identifies the observation s = 2(1+maxid) Identifies a segment of the observation

DCDD Operation

type task rect time prongid

scheme, known before any publish or subscribe calls are made. The diffusion core matches the data to the descriptions provided with subscribe/publish calls and passes it to components that registered for that data. The subscribe and publish calls also cause directed diffusion to send control traffic in the network [2]. In the case of routing protocols in our simulations, the subscribe call causes interests (queries) to propagate through the network and set up gradients that aid with routing of the data back to the sink. If an interest reaches a sensor where a matching publish call was made the task that registered for the query is notified and can start reporting its data back to the sink. The prototype of DCDD, presented in this paper, is tightly coupled within our sensing application. In the future, we may also implement DCDD as a filter that modifies the data stream into a FEC encoded stream, however since we only deal with one collecting task, that was not necessary for the prototype.

= = = > =

query image [0, 50, 0, 50] 10:00:00. 1.

Given this query, directed diffusion can set up gradients so that only the observations containing prongid=1 is steered to prong 1, allowing DCDD to distribute the segments among the prongs. Once the segment arrives at a prong, the prong forwards it to the sink via a reliable link. The sink keeps the cache of all the received segments and once it receives all s segments from the observation it can reconstruct the observation using the decoder function of the FEC algorithm. We also add a segmentid attribute to the directed diffusion data namespace so that the sink can uniquely identify the segments sent by the sensors. We packed the segmentid as a 32-bit integer since this is the smallest attribute size in directed diffusion. The fields of the segmentid attribute and their sizes are given in Table I. The first field, flowid, identifies a sensor’s response to a query. This field allows the sink to receive 255 unique query responses at a time.3 It can be made unique for each sensor by using a hash of the sensor’s MAC address, or by assigning the flowids to the sensors before deployment in the field. The second field, seqid, is used to distinguish observations sent by the sensor. This field allows the sink to receive more than one observation at a time from each sensor. The third field, maxid indicates the number of fragments in the observation s. The fourth field, inseqid identifies the segment of the observation. This field takes values from 0 to s + p. At the beginning of the operation each sensor subscribes to queries coming from a list of predefined prongs. Once the sensor receives queries from its list of prongs it is able to start transmitting information back to the sink. The registration of prongs with the sensors is not necessary for successful operation of DCDD, however it allows us to control which prongs each sensor uses for communications with the sink. For example, the network can have hundreds of prongs, but each sensor can only communicate with a few of the prongs closest to its own location. In order to decrease the complexity, sensors do not need to register with the sink. The sink can identify the packets from each sensor with the segmentid attribute.

B. DCDD Additions DCDD adds two new attributes to the directed diffusion data namespace, FEC encoder and decoder, and a protocol sensors and prongs use to start DCDD enabled communications. We show the operation of DCDD in Figure 2. The application on the sensor generates an image which is passed as a blob of data to DCDD. DCDD splits the data into s segments and uses an FEC algorithm to encode the set into a new set of s + p segments. The FEC allows the sink to reconstruct the original data if it receives more than s encoded segments. In our implementation, we use an XOR-based Reed-Solomon erasure code [6]. The encoder function is 72 lines of C code long and compiles to about 1Kb of Intel x86 binary code. The encoded segments are passed to directed diffusion so they can be sent to the prongs (shown as p1 to p3 in the figure). Directed diffusion allows the use of multiple prongs, however if the protocol is used as is, diffusion would send all s + p segments to each prong. This would add unnecessary redundancy to our protocol. To reduce the redundancy, DCDD needs to distribute the s + p segments among multiple prongs and send only a portion of the segments to each prong. We add prongid attribute to the directed diffusion data namespace so that DCDD can distribute the segments among the prongs. The new attribute is added to the queries so that interests from each prong are unique. For example, queries from prong 1 will be named as follows:

3 This number can be easily increased by introducing a separate 32-bit field to the directed diffusion data namespace.

3

Percentage of Delivered Observations

III. E XPERIMENTAL R ESULTS

100

We have implemented DCDD in the ns-2 simulator [7]. We examine the ability of DCDD to increase end-to-end reliability, as well as the effect of DCDD on energy consumption in the network. The performance of DCDD is compared with the scenario in which the sensors do not use any extra parity and there is only one prong in the network. In that case, the reliability in the network is maintained with acknowledgments in the MAC layer. The sensor application we have implemented simulates the security application described in the introduction. The sink sends a request for observations through the network. Some of the sensors respond to the request and send a large observation back to the sink. After transmitting the observation, sensors hibernate for an exponentially distributed period of time and then transmit a new observation. We have modified directed diffusion to include prongid and segmentid attributes as described in Section II-B. We have also added the FEC encoder from [6] to encode the observations from a set of s fragments into a set of s + p fragments. The sensor assigns an equal number of fragments to each prong before they are transmitted by directed diffusion. The sink collects the received fragments in its cache. If more than s fragments for a particular observation are collected, the sink reconstructs the observation. Otherwise, the fragments are collected for fixed amount of time and discarded after that time expires. The cache timeout is set to be smaller than the time sensors take to transmit 2seqid+1 − 1 observations, so that the observations from a particular sensor can be uniquely identified with the seqid field.

Percentage of recovered observations

90 80 70 60 50 40 1 prong (acks) 1 prong (no acks) 4 prong (no acks) 8 prong (no acks)

30 20 10 0

0

5

Fig. 3.

10 15 Number of Parity Fragments (p)

20

Percentage of received observations Average Fragment Delay

30

Average Delay (ms)

25

20

15

10

1 prong (acks) 1 prong (no acks) 4 prongs (no acks) 8 prongs (no acks)

5

0

A. General Setup At the physical layer we have used 802.15.4 in the beaconenabled mode. In this mode of operation, some of the sensors are full-function devices (FDDs) while other are reducedfunction devices (RFDs). The FFDs transmit beacons used by the RFDs to synchronize. All data packet frames are transmitted using slotted CSMA-CA, and the MAC layer data transmissions can be acknowledged or unacknowledged. In the case of acknowledged transmissions, lost data packets are transmitted three times before they are dropped at the sender. In all of the simulations, we have used a single hop packet loss rate of 0.01. This rate allows most of the control traffic to get through the network, however over several hops, this rate causes a large amount of end-to-end packet loss. We used a network scenario with 100 sensors in an area 120m×120m. The sensors were arranged in a grid topology, with distance chosen such that a sensor can only communicate with the sensors one hop away on the grid. The sink prongs were put in the four corners of the network to achieve the maximum network coverage, and the source of information are the twelve sensors in the middle of the topology.

0

5

10 15 Number of Parity Fragments (p)

Fig. 4.

20

Average Fragment Delay

ments p from 0 to 24 in increments of 4. The sensor transmits all s + p fragments TON = 90 seconds with interarrival times for each fragment exponentially distributed with the mean of TON /s. After each transmission of s + p fragments, the sensors sleep for an exponentially distributed time with the mean TOFF = 120 seconds. Fig. 3 illustrates the percentage of recovered observations as the number of parity segments p varies. We see from the figure that as the number of fragments p increases, the percentage of recovered observations also increases. We also see that as the number of the prongs increases, the percentage of recovered observations increases as well. We have shown this theoretically in [13] and [14]. The delivery ratio of observations increases from 78% in the case of single prong with acknowledgments to over 90% with 8 prongs and 20 fragments of parity. We note that this increase in reliability is end-to-end and that it does not include any retransmissions at any level in the network. We have shown in [13] and [14] that it is possible to increase reliability even further than what

B. Simulation Results We split observations into s = 32 fragments, where each fragment is 30 bytes long. We vary the number of parity frag4

Energy Consumption per Delivered Obsevation 10

Energy Consumption 1 prong

8 1 prongs (acks no parity) 2 prongs (no acks) 4 prongs (no acks)

7 6

Consumed Energy (Joules)

Energy per Observation (Joules)

9

5 4 3 2 1 0

15

10

5

0 4

6

8

10 12 14 16 18 Number of Parity Fragments (p)

20

22

20

24

40 60 80 100

Fig. 5.

Average Energy Cost per Observation

Position X (m)

20

120

40

60

80

100

120

Position Y (m)

(a) Energy Consumption 1 Sink with acknowledgments

is shown in this figure if the allocation of fragments to each prong is optimized. Fig. 4 illustrates the delay in the network as the number of parity segments p increases. We note that the delay is significantly lower in the network where there are no retransmissions in the MAC layer, even though we have increased the load in the network with the additional parity fragments. The average delay is at least 25% lower in the network which uses DCDD as the transport layer. Fig. 5 shows the average amount of energy used per successful delivery of an observation. We plot the figure starting at p = 4 since there were almost no successful deliveries with DCDD for p = 0. We see that per observation delivery cost decreases as the number of prongs increases. Also, if four prongs are used, per observation delivery cost is smaller than the delivery cost for a single prong with MAC acknowledgments. Fig. 6 shows how energy is consumed in the network. Fig. 6a shows energy consumption when only one prong is used with acknowledgments at the MAC layer and Fig. 6b and Fig. 6c show energy consumption when two and four prongs are used without any acknowledgments at the MAC layer. We first note that the majority of the energy in Fig. 6a is consumed by sensors which do no generate any information. Second, we note that the energy consumption is distributed more evenly when multiple prongs are used Fig. 6b-c, and that the sensor which consume the most energy are the sensors which generate the observations. This shows that DCDD introduces loadbalancing and fairnes in the network. Fig. 7 and Fig. 8 show a more analytical view of Fig. 6a-c. Fig. 7 shows the percentage of total energy consumption for each node and the ranking of that node (in terms of energy consumption). We see that in the case of 1 prong with MAC retransmissions, few of the nodes use a large amount of energy, whereas in the case of multiple prongs energy is almost evenly distributed. Fig. 8 shows the percentage of energy used by the group of lowest n consumers. We see that in the case

Consumed Energy (Joules)

Energy Consumption 2 prongs

6

4

2

0 20 40 60 80

60

100 Position X (m)

120

80

100

120

40 Position Y (m)

20

(b) Energy Consumption 2 Sinks no acknowledgments p = 16 Energy Consumption 4 prongs

Consumed Energy (Joules)

8

6

4

2

0 20 40 60 80 100 120 Position X (m)

20

40

60

80

100

120

Position Y (m)

(c) Energy Consumption 4 Sinks no acknowledgments p = 16 Fig. 6.

5

Energy consumption

Energy Consumption By Node

the performance of DCDD even further than is shown in this paper.

4.5 4

Consumed Energy

R EFERENCES

1 prong (acks) 2 prongs (no acks) 4 prongs (no acks) 8 prongs (no acks)

3.5 3

[1] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, “Directed diffusion for wireless sensor networking,” IEEE/ACM Transactions on Networking (TON), vol. 11, no. 1, pp. 2–16, 2003. [2] F. Silva, J. Heidemann, R. Govindan, and D. Estrin, “Directed diffusion,” USC/Information Sciences Institute, Tech. Rep. ISI-TR-2004-586, January 2004, to appear in Frontiers in Distributed Sensor Networks, S. S. Iyengar and R. R. Brooks, eds. [3] D. Coffin, D. V. Hook, R. Govidan, J. Heidemann, and F. Silva, “Network routing application programmer’s interface (API) and walk through 8.0,” 2001. [4] A. Woo, T. Tong, and D. Culler, “Taming the underlying challenges for reliable multihop routing in sensor networks,” in SenSys’03. ACM Press, 2003. [5] G. J. Pottie and W. J. Kaiser, “Wireless integrated network sensors,” Communications of the ACM, vol. 43, no. 5, pp. 51–58, March 2000. [6] J. Blomer, M. Kalfane, R. Karp, M. Karpinski, M. Luby, and D. Zuckerman, “An XOR-based erasure-resilient coding scheme,” Berkley, CA, Technical Report TR-95-048, 1995. [7] “The network simulator - ns-2.” [Online]. Available: http://www.isi. edu/nsnam/ns/ [8] F. Stann and J. Heidemann, “RMST: Reliable data transport in sensor networks,” in Proceedings of the First International Workshop on Sensor Net Protocols and Applications. Anchorage, Alaska, USA: IEEE, April 2003, pp. 102–112. [9] C.-Y. Wan, A. T. Campbell, and L. Krishnamurthy, “PSFQ: a reliable transport protocol for wireless sensor networks,” in Proceedings of the first ACM international workshop on Wireless sensor networks and applications. ACM Press, 2002, pp. 1–11. [10] N. F. Maxemchuk, “Dispersity routing,” in Proceedings of IEEE Internationl Communications Conferenece ICC’75, Sna Francisco, CA, June 1975, pp. 41.10–41.13. [11] A. Tsirigos and Z. J. Haas, “Analysis of multipath routing-part I: The effect on the packet delivery ratio,” IEEE Trans. Wireless Commun., vol. 3, no. 1, pp. 138–146, January 2004. [12] ——, “Analysis of multipath routing, part 2: Mitigation of the effects of frequently changing network topologies,” IEEE Trans. Wireless Commun., vol. 3, no. 2, pp. 500–511, March 2004. [13] P. Djukic and S. Valaee, “Minimum energy fault tolerant sensor networks,” in Globecom Workshops, 2004, pp. 22–26. [14] ——, “Maximum network lifetime in fault tolerant sensor networks,” in Globecom, 2005.

2.5 2 1.5 1 0.5 0

0

20

40

60

80

100

Node Rank

Fig. 7.

Energy consumption ranking Distribution of Energy Consumption

100 Ideal 1 prong (acks) 2 prongs (no acks) 4 prongs (no acks) 8 prongs (no acks)

Percentage of Total Consumed Energy

90 80 70 60 50 40 30 20 10 0

0

20

40 60 Number of Lowest Consumers

Fig. 8.

80

100

Energy Distribution

of one prong with acknowledgments 50% of the energy is consumed by the top 15 nodes, whereas in the case of four and eight prongs 50% of the energy is consumed by the top 38 nodes. This also shows how well DCDD distributes energy consumption in the network. IV. C ONCLUSIONS

AND

F UTURE W ORK

We have presented DCDD, a reliable transport layer for sensor networks. DCDD runs transparently on top of directed diffusion and provides an increased end-to-end reliability compared to an approach which only relies on MAC retransmissions for increased reliability. DCDD also distributes of energy use in the network, making the network more fair. We have used a very simple algorithm to distribute observation fragments among the prongs. However, we have shown in [13] and [14] that the performance of a scheme like DCDD can be improved significantly if more information is known about the paths in the network. We are currently working on algorithms and extensions to DCDD to improve 6

DCDD: Reliable and Energy Efficient Transport ... - Semantic Scholar

MAC layer (entry point 1) and is then passed to applications and filters that ..... “Network routing application programmer's interface (API) and walk through 8.0 ...

182KB Sizes 1 Downloads 287 Views

Recommend Documents

DCDD: Reliable and Energy Efficient Transport ... - Semantic Scholar
Sensors would be placed throughout a building and occasionally take pictures ... PSFQ the cost of energy is not taken into account. In contrast, ... App. 2. 3. Filter. 4. 5. Routing. 6. 7. 8. MAC. Fig. 1. Directed Diffusion Network Stack and the sink

Minimum Energy Reliable Multipath Ad Hoc ... - Semantic Scholar
relax the bound on the reliability of the energy information required for the program and use the C.L.T. approximation to add a confidence bound on the minimum ...

Renewable Energy and Energy Efficiency ... - Semantic Scholar
Oct 18, 2013 - Energy Efficient Appliance Tax Credit for Manufacturers . ..... FY2011; $0 for FY2012; $0 for FY2013; data for FY2014 is currently unavailable.

Renewable Energy and Energy Efficiency ... - Semantic Scholar
Oct 18, 2013 - Bioenergy Technologies Office – Financial Opportunities online ... contract for cost-shared research, development, and demonstration projects. ... production, delivery, and storage technologies; overcome technical barriers to.

An Energy-efficient Nonvolatile In-memory ... - Semantic Scholar
THE analysis of big-data at exascale (1018 bytes/s or flops) has introduced the emerging need to reexamine the existing hardware platform that can support ...

capitalization of energy efficient features into home ... - Semantic Scholar
May 25, 2007 - rapidly rising energy consumption (See Figure 2). In the early .... Obtain 15 percent of their electricity from clean renewable sources by 2012, 30.

An Energy-efficient Nonvolatile In-memory ... - Semantic Scholar
to a logic-in-memory architecture by non-volatile domain-wall nanowire. Domain-wall ..... as the magnetization reversal of MTJ free layer, i.e. the target domain of the ...... at 100µA, and the current density at 6 × 108A/cm2 for shift- operation.

capitalization of energy efficient features into home ... - Semantic Scholar
features and market value of a residential home in Austin, Texas. ... The EIA's 2005 Annual Energy Review has reliable data and statistics on energy .... 1985 under the Regan administration's favoring open market policies, but were ...

An Energy-Efficient Heterogeneous System for ... - Semantic Scholar
IV, we describe the system architecture. In Section V, we present the performance characteristics of the workloads. In. Section VI, we evaluate the energy ...

capitalization of energy efficient features into home ... - Semantic Scholar
May 25, 2007 - rapidly rising energy consumption (See Figure 2). In the early .... Obtain 15 percent of their electricity from clean renewable sources by 2012, 30.

Efficient Speaker Identification and Retrieval - Semantic Scholar
Department of Computer Science, Bar-Ilan University, Israel. 2. School of Electrical .... computed using the top-N speedup technique [3] (N=5) and divided by the ...

Efficient Speaker Identification and Retrieval - Semantic Scholar
identification framework and for efficient speaker retrieval. In ..... Phase two: rescoring using GMM-simulation (top-1). 0.05. 0.1. 0.2. 0.5. 1. 2. 5. 10. 20. 40. 2. 5. 10.

EWAVES: AN EFFICIENT DECODING ... - Semantic Scholar
We call it inheritance since each node must inherit its score from its par- ents. This is unnatural ... activate a child of a node in ซดุต, we need to check whether.

Efficient parallel inversion using the ... - Semantic Scholar
Nov 1, 2006 - Centre for Advanced Data Inference, Research School of Earth Sciences, Australian ..... (what we will call the canonical version), and then.

Sparkle — Energy Efficient, Reliable, Ultra-low Latency ...
It greatly reduced energy consumption and also improved end-to-end reliability and latency with a high probability. Additionally, we exper- imentally showed that the transmission power also affected the QoS metrics significantly. The Glossy protocol

Efficient parallel inversion using the ... - Semantic Scholar
Nov 1, 2006 - Centre for Advanced Data Inference, Research School of Earth Sciences, Australian National University, Canberra, ACT. 0200 ... in other ensemble-based inversion or global optimization algorithms. ... based, which means that they involve

Tree Filtering: Efficient Structure-Preserving ... - Semantic Scholar
GRF grant from the Research Grants Council of Hong Kong under Grant U. 122212. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Sina Farsiu. L. Bao, Y. Song, and Q. Yang are with the Departmen

Automatic, Efficient, Temporally-Coherent Video ... - Semantic Scholar
Enhancement for Large Scale Applications ..... perceived image contrast and observer preference data. The Journal of imaging ... using La*b* analysis. In Proc.

EWAVES: AN EFFICIENT DECODING ... - Semantic Scholar
The algorithm traverses the list of active nodes in a way that maximizes speed. For that ... cal items. We build a static lexical tree based on states. That is, the.

Efficient Semantic Service Discovery in Pervasive ... - Semantic Scholar
computing environments that integrate heterogeneous wireless network technolo- ... Simple Object Access Protocol (SOAP) on top of Internet protocols (HTTP, SMTP). .... In this area, various languages have been proposed to describe.

Safe and Efficient Robotic Space Exploration with ... - Semantic Scholar
The authors are currently developing, under the support of NASA, a Robot ... supported by the Advanced Space Operations Technology. Program of NASA's ...

Optimal and Efficient Speculation-Based Partial ... - Semantic Scholar
Sydney, NSW 2052, Australia qiongc,jxue¡@cse.unsw.edu.au .... Motivated by these two previous research efforts, this work addresses the ...... IBM System Jour- nal, 39(1), 2000. [3] J. M. Anderson, L. M. Berc, J. Dean, S. Ghemawat, M. L.. Henzinger,