Kamin Whitehouse :: Projects


[an error occurred while processing this directive]

[an error occurred while processing this directive]

[an error occurred while processing this directive]

[an error occurred while processing this directive]

[an error occurred while processing this directive]

[an error occurred while processing this directive]

[an error occurred while processing this directive]

[an error occurred while processing this directive]

[an error occurred while processing this directive]

Smart Buildings Buildings account for 40% of the total US energy budget, the largest energy consuming sector in the country, and many government and public organizations agree that a national grand challenge is to achieve a 70% reduction in building energy by 2030. However, energy retrofits are extremely costly. We are developing computational alternatives to conventional retrofits that use a combination of embedded sensing, intelligence, and control to save energy at 10x to 100x lower cost than conventional approaches. A cornerstone of this work is new technology to identify and track individual people, recognize common activity patterns, and detect object usage. These sensing technologies allow buildings to provide heating and cooling, lighting, and water heating services that respond to the dynamics of occupant presence, activities, and goals. Our current data predicts that, if they were deployed in every home, these techniques would reduce total US energy consumption by almost 3%, more than the energy used by the entire commercial airline industry.

MacroLab allows a user to write a single macroprogram for an entire Cyber-Physical System. It is the first system that can perform automatic, topology-specific decomposition of programs describing parallel operations on parallel data structures. More...

Clairvoyant is the first comprehensive source-level debugger for WSNs. It provides standard debugging commands, including break, step, watch, and backtrace as well as new, special-purpose commands that deal with interrupts, conditional breakpoints, and new global commands such as gstop and gcontinue. More...

We demonstrated that we can eavesdrop on wireless devices in a home and extract private information, even when all of the wireless data is encrypted, with a Fingerprint and Timing-based Snooping attack, or a FATS attack. Experiments on four houses demonstrate that we can infer when and how often the bathroom and kitchen are visited, when the person is sleeping, and when the home is occupied with 90-100\% accuracy. More...

MetroNet The MetroNet project will consist of sensors deployed in the storefront windows of downtown Charlottesville. The sensors can be used by the store owners, city customers, city planners, real estate customers, etc. More...

The Flash flooding protocol exploits the capture effect to reduce flooding latency by allowing nodes to propagate the flood simultaneously, thereby eliminating neighborhood contention. Our results indicate that Flash can reduce latency by as much as 80%, achieving flooding latencies near the theoretical lower bound without sacrificing coverage, reliability or power consumption.More...


Marionette is a development tool for wireless embedded networks. It provides a tight coupling between the program running on the wireless nodes and a python user environment, so that the programmer can call functions and read/write variables on the nodes from within a python shell or script. This provides unprecedented run-time visibility and control for wireless embedded devices, and can be used to rapid application prototyping and/or debugging. More...


Hood is the first neighborhood-based programming abstraction for sensor networks. It performs neighbor discovery, neighbor list management, and data sharing automatically, allowing the programmer to access the data values of neighboring nodes through a Get/Set interface, instead of through messaging protocols. More...


Semantic Streams is a system that allows people to pose semantic queries over sensor data. It produces logical interpretations of data, in contrast to most query systems which produce the data itself or mathematical aggregations of the data, e.g. the user queries for the number of cars or trucks that pass through an intersection instead of raw magnetometer values. More...

This is the first collision detection scheme for wireless networks. This scheme can 1) differentiate between packet loss due to collisions vs. bad link quality 2) identify the nodes that caused the colllision 3) recover one of the packets from the collision. Until now, all wireless MAC protocols assumed that collision detection was not possible. More....

Wireless Localization: Our work in localization has several components, including hardware for acoustic and ultrasonic ranging, collections of acoustic, ultrasound, and RSSI ranging data from multiple different environments, a simulator called "silhouette" that simulates a localization deployment given an empirical ranging profile, and quantitative comparisons of localization with different models of ranging, different algorithms, and different environments.

In the pursuer-evader game (PEG), a vehicle (the evader) is driven through a sensor field that tracks its location and routes it to another device (the pursuer) that tries to autonomously capture the evader. In August 2005, we deployed PEG using passive infrared (PIR) sensors to track any moving object in an area covering 50,000 square meters with over 550 solar-powered sensor nodes. More...

This sensor network calibration technique allows each node to calibrate its sensor using the actuators of its neighbors. This creates an over-constrained system from which calibration coefficients can be inferred even in the face of some noise from both the sensors and actuators. More...