1 EECS 598 Wireless Sensor Networks Technologies, Systems, and Applications Lecture 2: Computer Science Issues Prabal Dutta University of Michigan January.

Slides:



Advertisements
Similar presentations
Academic vs. Industrial Research Jobs
Advertisements

Say NO to Multi-hop Wireless Networks Suresh Singh.
Robot Sensor Networks. Introduction For the current sensor network the topography and stability of the environment is uncertain and of course time is.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Embedded Networking and One to Many to One John Heidemann USC/ISI ICNP Panel—November 2, 1999.
Systems Engineering in a System of Systems Context
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Digital Systems Emphasis for Electrical Engineering Students Digital Systems skills are very valuable for electrical engineers Digital systems are the.
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
490dp Introduction Robert Grimm. The Computer for the 21 st Century “The most profound technologies are those that disappear. They weave themselves into.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
September 13, Motivating Sensor Network Research: The Applications and Computer Science Issues Prabal Dutta and David Chu.
CS 597 Your Ph.D. at USC The goal of a Ph.D. What it takes to achieve a great Ph.D. Courses Advisor How to read papers? How to keep up-to-date with research?
CS350/550 Software Engineering Lecture 1. Class Work The main part of the class is a practical software engineering project, in teams of 3-5 people There.
Pattern Myths1 Ten Design Pattern Myths Jim Fawcett condensed from Pattern Hatching, John Vlissides, Addison-Wesley, 1998.
Moving forward with Scalable Game Design. The landscape of computer science courses…  Try your vegetables (sneak it in to an existing course)  Required.
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Sensor Network Simulation Simulators and Testbeds Jaehoon Kim Jeeyoung Kim Sungwook Moon.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
As human life began in a very simple and primitive way and continued until we reach 2013! Of course a lot of things changed during this huge period of.
Xiaoyu Tong and Edith C.-H. Ngai Dept. of Information Technology, Uppsala University, Sweden A UBIQUITOUS PUBLISH/SUBSCRIBE PLATFORM FOR WIRELESS SENSOR.
Maharaja Sayaji University, Baroda February 12th, 2011 Sameer Sahasrabudhe and Kapil Kadam.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
NSW Curriculum and Learning Innovation Centre Draft Senior Secondary Curriculum ENGLISH May, 2012.
SWE 316: Software Design and Architecture – Dr. Khalid Aljasser Objectives Lecture 11 : Frameworks SWE 316: Software Design and Architecture  To understand.
Some Computer Science Issues in Ubiquitous Computing Presenter : Junghee-Han Mark Weiser Communications of the ACM, July 1993.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
Software Engineering EKT 420 MOHAMED ELSHAIKH KKF 8A – room 4.
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
DNS based IP NetLocation Service China Telecom Guangzhou Institute
How to start research V. Jayalakshmi. Why do we research? – To solve a problem – To satisfy an itch – To gain more market share/ Develop and improve –
A Quick Guide to beginning Research Where to Start.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
Design engineering Vilnius The goal of design engineering is to produce a model that exhibits: firmness – a program should not have bugs that inhibit.
CS HONORS UNDERGRADUATE RESEARCH PROGRAM - PROJECT PROPOSAL Tingyu Thomas Lin Advisor: Professor Deborah Estrin January 25, 2007.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Dr Theodoros N Arvanitis Senior Lecturer, Head of Biomedical Informatics, Signals & Systems Research Laboratory, Department of Electronic, Electrical &
Some Computer Science Issues in Ubiquitous Computing
Design Process … and some design inspiration. Course ReCap To make you notice interfaces, good and bad – You’ll never look at doors the same way again.
ICN Baseline Scenarios draft-pentikousis-icn-scenarios-04 K. Pentikousis (Ed.), B. Ohlman, D. Corujo, G. Boggia, G. Tyson, E. Davies, P. Mahadevan, S.
Group member: Kai Hu Weili Yin Xingyu Wu Yinhao Nie Xiaoxue Liu Date:2015/10/
OpensensorAalborg University, Mobile Device Group Anders Grauballe Gian Paolo Perrucci Frank H.P. Fitzek Aalborg University Denmark Introducing Contextual.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Pervasive Computing Parts of the slides are extracted from those of Profs. Mark Weiser, Deborah Estrin, Akbar Sayeed, Jack Stankovic, Mani Srivastava,
Smart Home Technologies
The transformational capacity of ubiquitous and contextual computing.
Role Of Network IDS in Network Perimeter Defense.
Societal-Scale Computing: The eXtremes Scalable, Available Internet Services Information Appliances Client Server Clusters Massive Cluster Gigabit Ethernet.
Building Systems for Today’s Dynamic Networked Environments A Methodology for Building Sustainable Enterprises in Dynamic Environments through knowledge.
INTRODUCTION TO LANGUAGE LEARNING Basics to get you started.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Research Topics in Ubiquitous Computing Jason I. Hong.
1 Advanced Software Architecture Muhammad Bilal Bashir PhD Scholar (Computer Science) Mohammad Ali Jinnah University.
INTRODUCTION TO WIRELESS SENSOR NETWORKS
CS6501/ECE6501 IoT Sensors and Systems
Internet of Things A Process Calculus Approach
CS240: Advanced Programming Concepts
Systems Engineering for Mission-Driven Modeling
CS6501 Embedded Operating Systems for the IoT
Automated Analysis and Code Generation for Domain-Specific Models
Sensor Networks – Motes, Smart Spaces, and Beyond
Presentation transcript:

1 EECS 598 Wireless Sensor Networks Technologies, Systems, and Applications Lecture 2: Computer Science Issues Prabal Dutta University of Michigan January 12, 2010

2 Course Updates Twitter feed for late-breaking updates: – Writeups –Content looks good so far –If you decide to take a “pass,” send an saying so –Please send as plain text (no attachments) Today’s office hours immediately after class No class on Thursday, but writeups are still due!

3 Outline What makes good application-led research? Picking research problems Computer Science issues in Ubiquitous Computing

4 Perspectives “Applications are of course the whole point of ubiquitous computing” –Mark Weiser [Wei93] “We need to increase the applications deployed to books written ratio in sensor networks” –Deborah Estrin [Personal Communications] “In the future, increasing proportion of computer science research will be application- driven” –Eric Brewer and Mike Franklin [CS262A]

5 Defining Application-Led Research Application-Led Research –Driven by domain problem –Evaluated by quantifying benefits brought to domain Technology-Led Research –Not necessarily motivated by potential domain benefits –Interesting or challenging from a technical perspective Research Goals Should (do you agree?) –Identify users’ problems and application requirements –Provide infrastructure developers with application requirements –Validate technology and provides insights into its use

6 Selecting Applications Will this change the way people think? –If nothing changes after your research, what’s the point? Must make an impact on computer science –Just impacting biology or civil engineering is not enough –Starting from scratch can make this more difficult or easier If system building, what will you learn from it? –There must be an important question in there! Identify and attack “severe and persistent problems” Avoid trivial “proof-of-concept” research projects –Team up with domain experts when selecting problems –Make sure there’s a concept and it’s worth proving

7 Implementing Applications To start from scratch or not? –Benefits? –Drawbacks? Is building reusable infrastructure worth it? –Research community values novelty over good engineering –Research community doesn’t value implementation as research –Do you agree? Reframe the question: What are your options? (Aside) –Your efforts can be directed structurally or strategically Structural: change the community so that it values infrastructure Strategic: pick the right topic, and your work will be broadly used (and well referenced)

8 Evaluating Applications Small, lab-scale evaluations –Useful: in the early stages of design –Insufficient: impossible to understand the impact of Environment on technology Technology on environment Often hard to teach these apart – hence “systems” research Applications are evaluated only against themselves –Self-evaluation is insufficient –Requires applications, infrastructure, and data to be shared Is this a good idea? Is it done in other fields?

9 Recommendations Choose applications carefully –Address severe persistent problems; avoid trivial ones Share technical infrastructure –Design reusable SW/HW; publicly release code Evaluate applications in realistic environments –Only way to investigate interactions between tech/env/users –“The real world is it’s own best model” – Rodney Brooks Perform comparative evaluations –Release data sets from field trials; allows other to analyze

10 Outline What makes good application-led research? Picking research problems Computer Science issues in Ubiquitous Computing

11 Allen Newell’s Research Style Good science responds to real problems Good science is in the details Good science makes a difference

12 Good science responds to real problems Don’t pick fantasy problems Don’t pick trivial “proof-of-concept” problems Too many real pressing real-world problems! Pick “severe and pressing” problems

13 Good science is in the details Takes the form of a working model –The artifact is about understanding, not building –Must build when analysis is too complex –Brooks’ quote: “The real world is its own best model” Includes detailed analysis or implemented models –Allows others to benefit from work at an abstract level –Enables comparisons between difference approaches

14 Good science makes a difference Measures of contribution: –How it solves a real problem –How it shapes the work of other Solves a real problem –The problem sets the crucial context for the work –A million ideas to pursue, but which ones are worth doing? Shapes the work of others –Highest goal: change other people’s thinking –Paradigm changes are the most impactful [Kuhn]

15 Outline What makes good application-led research? Picking research problems Computer Science issues in Ubiquitous Computing

16 Mark Weiser’s Vision Who is Mark Weiser? –Michigan alumnus: MA(‘77), PhD (’79) –Father of ubiquitous computing –Work is incredibly influential What are the principles of ubiquitous computing? –The purpose of a computer is to help you do something else. –The best computer is a quiet, invisible servant. –The more you can do by intuition the smarter you are; the computer should extend your unconscious. –Technology should create calm.

17 Are We There Yet? Hundreds of Tabs? Tens of Pads? One or two Boards?

18 Did Their Work Have Impact? Yes! Due to emphasis on computer science issues: “The fruitfulness of ubiquitous computing for new computer science problems justified our belief in the…framework” Issues like –Hardware components Low power (P=C*V^2*f gives lots of degrees of freedom) Wireless (custom radios (SS/FSK/EM-NF  bits/sec/meter^3 metric) Pens (how do you write on walls?) –Network Protocols Wireless media access (MACA: RTS/CTS) Gigabit networks (lot’s of little devices create a lot of traffic) Real-time protocols (IP telephony) Mobile communications

19 Next Time Today’s office hours immediately after class Readings for Thursday –[ECPS02] “Connecting the Physical World with Pervasive Networks” –[AABB07] “Mobiscopes for Human Spaces” No class on Thursday, but summaries still due

20 Connecting the Physical World with Pervasive Networks Deborah Estrin, David Culler, Kris Pister, Gaurav Sukhatme

21 Goals Goal: to measure the physical world –Across large spaces –Over long periods of time –Using multiple sensing modalities –In remote, and largely inaccessible locations “The physical world is a partially observable, dynamic system, and the sensors and actuators are physical devices with inherent accuracy and precision limits.”

22 Challenges Immense scale of distributed systems elements –Vast numbers of devices –Fidelity Limited physical access –Embedded in the environment –Remote, expensive, or difficult to access –Wireless communications –Energy harvesting or very moderated energy consumption Extreme dynamics –Temperature, humidity, pressure, grass height, … –Passive vigilance to a flurry of activity in seconds

23 Challenge: Immense Scale NEST FE: 557 Trio Nodes, Self-powered, self- maintaining, GPS ground truth, multiple subsets

24 Challenge: Limited Physical Access to appear Sensys 05 Redwoods

25 Challenge: Extreme Dynamics Border Control –Detect border crossing –Classify target types and counts Convoy Protection –Detect roadside movement –Classify behavior as anomalous –Track dismount movements off-road Pipeline Protection –Detect trespassing –Classify target types and counts –Track movement in restricted area ExScal