Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CTM

2007

Self-bending of dark and gray photorefractive solitons

Authors
Carvalho, MI; Facao, M; Christodoulides, DN;

Publication
PHYSICAL REVIEW E

Abstract
We investigate the effects of diffusion on the evolution of steady-state dark and gray spatial solitons in biased photorefractive media. Numerical integration of the nonlinear propagation equation shows that the soliton beams experience a modification of their initial trajectory, as well as a variation of their minimum intensity. This process is further studied using perturbation analysis, which predicts that the center of the optical beam moves along a parabolic trajectory and, moreover, that its minimum intensity varies linearly with the propagation distance, either increasing or decreasing depending on the sign of the initial transverse velocity. Relevant examples are provided.

2007

3D volumetric reconstruction and characterization of objects from uncalibrated images

Authors
Azevedo, TCS; Tavares, JMRS; Vaz, MAP;

Publication
Proceedings of the Seventh IASTED International Conference on Visualization, Imaging, and Image Processing

Abstract
Three-dimensional (3D) object reconstruction using only bi-dimensional (2D) images has been a major research topic in Computer Vision. However, it is still a complex problem to solve, when automation, speed and precision are required. In the work presented in this paper, we developed a computational platform with the main purpose of building 3D geometric models from uncalibrated images of objects. Simplicity and automation were our major guidelines to choose volumetric reconstruction methods, such as Generalized Voxel Coloring. This method uses photo-consistency measures to build an accurate 3D geometric model, without imposing any kind of restrictions on the relative motion between the camera used and the object to be reconstructed. Our final goal is to use our computational platform in building and characterize human external anatomical shapes using a single off-the-shelf camera.

2007

Ambient network attachment

Authors
Rinta aho, T; Campos, R; Mehes, A; Meyer, U; Sachs, J; Selander, G;

Publication
2007 PROCEEDINGS OF THE 16TH IST MOBILE AND WIRELESS COMMUNICATIONS, VOLS 1-3

Abstract
The efficiency of network attachment plays a crucial role in the performance of accessing services in new environments. As an example, when a moving network is changing its location relative to attachment points, the detection of the candidate access networks along with their properties and security relationships needs to be carefully managed. This paper presents the framework and mechanisms for network attachment of Ambient Networks. Different steps required for optimizing the network attachment procedure are studied, and a secure network attachment protocol is proposed.

2007

Exploiting a prioritized MAC protocol to efficiently compute min and max in multihop networks

Authors
Andersson, B; Pereira, N; Tovar, E;

Publication
PROCEEDINGS OF THE FIFTH WORKSHOP ON INTELLIGENT SOLUTIONS IN EMBEDDED SYSTEMS

Abstract
Consider a wireless sensor network (WSN) where a broadcast from a sensor node does not reach all sensor nodes in the network; such networks are often called multihop networks. Sensor nodes take sensor readings but individual sensor readings are not very important. It is important however to compute aggregated quantities of these sensor readings. The minimum and maximum of all sensor readings at an instant are often interesting because they indicate abnormal behavior for example if the maximum temperature is very high then it may be that afire has broken out. We propose an algorithm for computing the min or max of sensor reading in a multihop network. This algorithm has the particularly interesting property of having a time complexity that does not depend on the number of sensor nodes; only the network diameter and the range of the value domain of sensor readings matter

2007

Exploiting a prioritized MAC protocol to efficiently compute interpolations

Authors
Andersson, B; Pereira, N; Tovar, E;

Publication
ETFA 2007: 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOLS 1-3

Abstract
Consider a network where all nodes share a single broadcast domain such as a wired broadcast network. Nodes take sensor readings but individual sensor readings are not the most important pieces of data in the system. Instead,, we are interested in aggregated quantities of the sensor readings such as minimum and maximum values, the number of nodes and the median among a set Of sensor readings on different nodes. In this paper we show that a prioritized medium access control (MAC) protocol may advantageously be exploited to efficiently compute aggregated quantities of sensor readings. In this context, we propose a distributed algorithm that has a very low time and message-complexity for computing certain aggregated quantities. Importantly we show that if every sensor node knows its geographical location, then. sensor data can be interpolated with our novel distributed algorithm, and the message-complexity of the algorithm is independent of the number of nodes. Such an interpolation of sensor data can be used to compute any desired function; for example the temperature gradient in a room (e.g., industrial plant) densely populated with sensor nodes, or the gas concentration gradient within a pipeline or traffic tunnel.

2007

Static-priority scheduling over wireless networks with multiple broadcast domains

Authors
Pereira, N; Andersson, B; Tovar, E; Rowe, A;

Publication
RTSS 2007: 28TH IEEE INTERNATIONAL REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS

Abstract
We propose a wireless medium access control (AMC) protocol that provides static-priority scheduling of messages in a guaranteed collision-free manner. Our protocol supports multiple broadcast domains, resolves the wireless hidden node problem and allows for parallel transmissions across a mesh network. Arbitration of messages is achieved without the notion of a master coordinating node, global clock synchronization or out-of-band signalling. The protocol relies on bit-dominance similar to what is used in the CAN bus except that in order to operate on a wireless physical layer, nodes are not required to receive incoming bits while transmitting. The use of bit-dominance efficiently allows for a much larger number of priorities than would be possible using existing wireless solutions. A AMC protocol with these properties enables schedulability analysis of sporadic message streams in wireless multihop networks.

  • 330
  • 369