IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8057144
|View full text |Cite
|
Sign up to set email alerts
|

ADMin: Adaptive monitoring dissemination for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 49 publications
(29 citation statements)
references
References 20 publications
0
27
0
Order By: Relevance
“…In Internet of Things data dissemination is first addressed in ADMin [11], it is a low-cost IoT framework that reduces the device energy consumption and the volume of data disseminated across the network. Based on IoT device disseminate data by monitoring streams based on run time knowledge.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In Internet of Things data dissemination is first addressed in ADMin [11], it is a low-cost IoT framework that reduces the device energy consumption and the volume of data disseminated across the network. Based on IoT device disseminate data by monitoring streams based on run time knowledge.…”
Section: Related Workmentioning
confidence: 99%
“…computed for contact in equation 3and for time out equation 4δn (i) = (1-µ) *δn (i) + µ τk(i) (3) For Time out = (1-µ) *δn (i) (4) Where τn (i)) and δn (i) are the direct and indirect tightness of Node n in Interest i. We adopted the exponentially weighted moving average (EWMA) [11], which is one of the most effective schemes for online estimation and has been employed in many prior works, to maintain and update the nodal tightness.…”
Section: Indirect Tightness 1 Let δN (I) -Indirect Tightness Of Nodementioning
confidence: 99%
“…It adapts the amount of data disseminated through the network over time [ 11 ]. Another framework transmits updates when the sensor readings are detected to be unusual, and have triggered dissemination [ 12 ], adapting the monitoring sensing intensity and dynamically adjusting the data volume payload.…”
Section: Introductionmentioning
confidence: 99%
“…The remedy to the above challenges is to suppress largescale temporal graphs with approximation techniques [14]. Ideally, an approximation technique dynamically adjusts the rate at which data are processed based on the current data stream evolution, such that when stable phases are detected, the data processing rate is reduced.…”
Section: Introductionmentioning
confidence: 99%
“…1: Graph Metric and Topology Structure Volatility for a Mobile Network with Fixed Temporal Granularity degree) are relatively stable in certain phases, it is actually a different set of nodes interacting in the network [17]. In light of this, ignoring that the particular connections actually span across different locations of the network, can severely affect capacity planning and service provisioning [14]. Thus, while reducing the metric processing rate preserves resources by computationally offloading graph processing engines, it hinders the challenge of missing structural changes in the graph topology which might capture and reveal significant insights.…”
Section: Introductionmentioning
confidence: 99%