|
Smart Buildings for Energy Conservation We are creating smart
building technology to improve building efficiency by using
information about occupant locations and activities. Preliminary
results using data from 8 homes indicate that our approach can save
28% of HVAC energy with only $25 in sensors. Ongoing research is
extending these results several ways.
The Data Furnace In joint work with Microsoft researchers, we propose installing
servers into homes, apartment buildings, and office buildings, and to
use the exhaust heat as a primary heat source for the building. We
call this the Data Furnace. This approach saves energy, saves
money, and improves performance of Web applications.
Programming and
Debugging Cyber-Physical System we have created an evolving series
of tools for programming, debugging, testing, and analyzing
Cyber-physical systems to make software both easier to create and more
reliable. Major results include: 1) a macroprogramming system that
enables scientists to control a CPS with simple programs in a
Matlab-like syntax 2) low-level debuggers that manage the resouce
constraints of wireless embedded networks 3) new program analysis
techniques that can address the {\em path explosion} problem of
interrupt-driven embedded software.
MacroLab allows a user to write a single
macroprogram for an entire Cyber-Physical System. It is the first system that
can perform automatic, topology-specific decomposition of programs describing
parallel operations on parallel data structures. More...
Clairvoyant is the first comprehensive
source-level debugger for WSNs. It provides standard debugging
commands, including break, step, watch, and
backtrace as well as new, special-purpose commands that deal
with interrupts, conditional breakpoints, and new global
commands such as gstop and gcontinue. More...
We demonstrated
that we can eavesdrop on wireless devices in a home and extract
private information, even when all of the wireless data is encrypted,
with a Fingerprint and Timing-based
Snooping attack, or a FATS attack.
Experiments on four houses demonstrate that we can infer when and how
often the bathroom and kitchen are visited, when the person is
sleeping, and when the home is occupied with 90-100\% accuracy. More...
MetroNet The MetroNet project will consist of sensors deployed in the storefront windows of downtown Charlottesville. The sensors can be used by the store owners, city customers, city planners, real estate customers, etc. More...
The Flash
flooding protocol exploits the capture effect to reduce flooding latency by
allowing nodes to propagate the flood simultaneously, thereby eliminating
neighborhood contention. Our results indicate that Flash can reduce latency by
as much as 80%, achieving flooding latencies near the theoretical lower bound
without sacrificing coverage, reliability or power consumption.More...
Marionette is a development
tool for wireless embedded networks. It provides a tight coupling
between the program running on the wireless nodes and a python user
environment, so that the programmer can call functions and read/write
variables on the nodes from within a python shell or script. This
provides unprecedented run-time visibility and control for wireless
embedded devices, and can be used to rapid application prototyping
and/or debugging. More...
Hood is the first
neighborhood-based programming abstraction for sensor networks. It
performs neighbor discovery, neighbor list management, and data
sharing automatically, allowing the programmer to access the data
values of neighboring nodes through a Get/Set interface, instead of
through messaging protocols. More...
Semantic Streams is a system that allows people to pose
semantic queries over sensor data. It produces logical
interpretations of data, in contrast to most query systems which
produce the data itself or mathematical aggregations of the data,
e.g. the user queries for the number of cars or trucks that pass
through an intersection instead of raw magnetometer values. More...
This is the first collision detection scheme for wireless
networks. This scheme can 1) differentiate between packet loss due to
collisions vs. bad link quality 2) identify the nodes that caused the
colllision 3) recover one of the packets from the collision. Until
now, all wireless MAC protocols assumed that collision detection was
not possible. More....
This work in
localization has several components, including hardware for acoustic
and ultrasonic ranging, collections of acoustic, ultrasound, and RSSI
ranging data from multiple different environments, a simulator called
"silhouette" that simulates a localization deployment given an
empirical ranging profile, and quantitative comparisons of
localization with different models of ranging, different algorithms,
and different environments. More...
In the pursuer-evader game (PEG), a vehicle (the
evader) is driven through a sensor field that tracks its location and
routes it to another device (the pursuer) that tries to autonomously
capture the evader. In August 2005, we deployed PEG using passive
infrared (PIR) sensors to track any moving object in an area covering
50,000 square meters with over 550 solar-powered sensor nodes. More...
This
sensor network calibration technique allows each node to calibrate its
sensor using the actuators of its neighbors. This creates an
over-constrained system from which calibration coefficients can be
inferred even in the face of some noise from both the sensors and
actuators. More...
|
|