scispace - formally typeset
Search or ask a question
Author

Richard R. Brooks

Bio: Richard R. Brooks is an academic researcher from Clemson University. The author has contributed to research in topics: Wireless sensor network & Encryption. The author has an hindex of 32, co-authored 167 publications receiving 4631 citations. Previous affiliations of Richard R. Brooks include Pennsylvania State University & California State University, Monterey Bay.


Papers
More filters
Journal ArticleDOI
11 Aug 2003
TL;DR: This formulation is anchored on location-aware data routing to conserve system resources, such as energy and bandwidth, and may be possible to filter clutter from the system by embedding higher level reasoning in the distributed system.
Abstract: The highly distributed infrastructure provided by sensor networks supports fundamentally new ways of designing surveillance systems. In this paper, we discuss sensor networks for target classification and tracking. Our formulation is anchored on location-aware data routing to conserve system resources, such as energy and bandwidth. Distributed classification algorithms exploit signals from multiple nodes in several modalities and rely on prior statistical information about target classes. Associating data to tracks becomes simpler in a distributed environment, at the cost of global consistency. It may be possible to filter clutter from the system by embedding higher level reasoning in the distributed system. Results and insights from a recent field test at 29 Palms Marine Training Center are provided to highlight challenges in sensor networks.

492 citations

Journal ArticleDOI
TL;DR: An assessment of the role, impact and challenges of IoT in transforming EPESs is provided and several opportunities for growth and development are offered.
Abstract: A transformation is underway in electric power and energy systems (EPESs) to provide clean distributed energy for sustainable global economic growth. Internet of Things (IoT) is at the forefront of this transformation imparting capabilities, such as real-time monitoring, situational awareness and intelligence, control, and cyber security to transform the existing EPES into intelligent cyber-enabled EPES, which is more efficient, secure, reliable, resilient, and sustainable. Additionally, digitizing the electric power ecosystem using IoT improves asset visibility, optimal management of distributed generation, eliminates energy wastage, and create savings. IoT has a significant impact on EPESs and offers several opportunities for growth and development. There are several challenges with the deployment of IoT for EPESs. Viable solutions need to be developed to overcome these challenges to ensure continued growth of IoT for EPESs. The advancements in computational intelligence capabilities can evolve an intelligent IoT system by emulating biological nervous systems with cognitive computation, streaming and distributed analytics including at the edge and device levels. This review paper provides an assessment of the role, impact and challenges of IoT in transforming EPESs.

437 citations

Journal ArticleDOI
TL;DR: Although each detector shows promise in limited testing, none completely solve the detection problem and combining various approaches with experienced network operators most likely produce the best results.
Abstract: Denial-of-service (DoS) detection techniques - such as activity profiling, change-point detection, and wavelet-based signal analysis - face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey of techniques and testing results provides insight into our ability to successfully identify DoS flooding attacks. Although each detector shows promise in limited testing, none completely solve the detection problem. Combining various approaches with experienced network operators most likely produce the best results.

421 citations

Book
01 Oct 1997
TL;DR: A comparison with Existing Approaches, a New Method for Cloud Removal, and Experimental Results of the Exhaustive Search Algorithm: Designing Optimal Sensor Systems within Dependability Bounds.
Abstract: I. INTRODUCTION TO SENSOR FUSION. 1. Introduction. Importance. Sensor Processes. Applications. Summary. Problem Set 1. II. FOUNDATIONS OF SENSOR FUSION. 2. Sensors. Mathematical Description. Use of Multiple Sensors. Construction of Reliable Abstract Sensors From Simple Abstract Sensors. Static and Dynamic Networks. Conclusion. Problem Set 2. 3. Mathematical Tools Used. Algorithms. Linear Algebra. Coordinate Transformations. Rigid Body Motion. Probability. Dependability and Markov Chains. Gaussian Noise. Meta-Heuristics. Summary. Problem Set 3. 4. High-Performance Data Structures: CAD Based. Boundary Representations. Sweep Presentation. CSG - Constructive Solid Geometry. Wire-Frame Models and the Wing-Edge Data Structure. Surface Patches and Contours. Generalized Cylinders. Summary. Problem Set 4. 5. High-Performance Data Structures: Tessellated. Sparse Arrays. Simplex Grids of Non-Uniform Sizes. Grayscale and Color Arrays. Occupancy Grids and HIMM Histogram Maps. Summary. Problem Set 5. 6. High-Performance Data Structures: Trees, and Graphs. 2n Trees. Forest of Quadtrees. Translation Invariant Data Structure. Multi-Dimensional Trees. Graphs of Free Space. Description Trees of Polygons. Range and Interval Trees. Summary. Problem Set 6. 7. High-Performance Data Structures: Functions. Interpolation. Least Squares Estimation. Splines. Bezier Curves and Bi-Cubic Patches. Fourier Transform, Cepstrum and Wavelets. Modal Representation. Summary. Problem Set 7. 8. Representing Ranges and Uncertainty in Data Structures. Explicit Accuracy Bounds. Probability and Dempster-Shafer Methods. Statistics. Fuzzy Sets. Summary. Problem Set 8. III. APPLICATIONS TO SENSOR FUSION. 9. Image Registration for Sensor Fusion. Image Registration Techniques. Problem Statement. Fitness Function. Tabu Search. Genetic Algorithms. Simulated Annealing. Results. Summary. 10. Designing Optimal Sensor Systems within Dependability Bounds. Applications. Dependability Measures. Optimization Model. Exhaustive Search on the Multidimensional Surface. Experimental Results of the Exhaustive Search Algorithm. Heuristic Methods. Summary. 11. Sensor Fusion and Approximate Agreement. Byzantine Generals Problem. Approximate Byzantine Matching. Fusion of Contradictory Sensor Information. Performance Comparison. Hybrid Algorithm. Example 1. Example 2. Summary. 12. Kalman Filtering Applied to a Sensor Fusion Problem. Background. A New Method. A New Technique for Cloud Removal. A Prototype System. Kalman Filter for Scenario 1. Discussion of Results. Summary. 13. Optimal Sensor Fusion Using Range Trees Recursively. Sensors. Redundancy and Associated Errors. Faulty Sensor Averaging Problem. Interval Trees. Algorithm to Find the Optimal Region. Algorithm Complexity. Comparison with Known Methods. Summary. 14. Distributed Dynamic Sensor Fusion. Problem Description. New Paradigm for Distributed Dynamic Sensor Fusion. Robust Agreement Using the Optimal Region. A Comparison with Existing Approaches. Experimental Results. Summary. IV. CASE STUDIES AND CONCLUSION. 15. Sensor Fusion Case Studies. Levels of Sensor Fusion. Types of Sensors Available. Research Trends. Case Studies. Summary. 16. Conclusion. Review. Conclusion. Appendix A. Program Source Code. References. Index483.

364 citations

Journal ArticleDOI
TL;DR: In the interest of full disclosure, CRC Press is a member of the Taylor & Francis Group, LLC, and I am a co-contributor of one section in this book as mentioned in this paper.
Abstract: In the interest of full disclosure, CRC Press is a member of the Taylor & Francis Group, LLC, and I am a co-contributor of one section in this book. At their best, handbooks are concise reference w...

274 citations


Cited by
More filters
Journal Article
TL;DR: This book by a teacher of statistics (as well as a consultant for "experimenters") is a comprehensive study of the philosophical background for the statistical design of experiment.
Abstract: THE DESIGN AND ANALYSIS OF EXPERIMENTS. By Oscar Kempthorne. New York, John Wiley and Sons, Inc., 1952. 631 pp. $8.50. This book by a teacher of statistics (as well as a consultant for \"experimenters\") is a comprehensive study of the philosophical background for the statistical design of experiment. It is necessary to have some facility with algebraic notation and manipulation to be able to use the volume intelligently. The problems are presented from the theoretical point of view, without such practical examples as would be helpful for those not acquainted with mathematics. The mathematical justification for the techniques is given. As a somewhat advanced treatment of the design and analysis of experiments, this volume will be interesting and helpful for many who approach statistics theoretically as well as practically. With emphasis on the \"why,\" and with description given broadly, the author relates the subject matter to the general theory of statistics and to the general problem of experimental inference. MARGARET J. ROBERTSON

13,333 citations

Proceedings ArticleDOI
22 Jan 2006
TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Abstract: We will review some of the major results in random graphs and some of the more challenging open problems. We will cover algorithmic and structural questions. We will touch on newer models, including those related to the WWW.

7,116 citations

Book
01 Jan 2001
TL;DR: This chapter discusses Decision-Theoretic Foundations, Game Theory, Rationality, and Intelligence, and the Decision-Analytic Approach to Games, which aims to clarify the role of rationality in decision-making.
Abstract: Preface 1. Decision-Theoretic Foundations 1.1 Game Theory, Rationality, and Intelligence 1.2 Basic Concepts of Decision Theory 1.3 Axioms 1.4 The Expected-Utility Maximization Theorem 1.5 Equivalent Representations 1.6 Bayesian Conditional-Probability Systems 1.7 Limitations of the Bayesian Model 1.8 Domination 1.9 Proofs of the Domination Theorems Exercises 2. Basic Models 2.1 Games in Extensive Form 2.2 Strategic Form and the Normal Representation 2.3 Equivalence of Strategic-Form Games 2.4 Reduced Normal Representations 2.5 Elimination of Dominated Strategies 2.6 Multiagent Representations 2.7 Common Knowledge 2.8 Bayesian Games 2.9 Modeling Games with Incomplete Information Exercises 3. Equilibria of Strategic-Form Games 3.1 Domination and Ratonalizability 3.2 Nash Equilibrium 3.3 Computing Nash Equilibria 3.4 Significance of Nash Equilibria 3.5 The Focal-Point Effect 3.6 The Decision-Analytic Approach to Games 3.7 Evolution. Resistance. and Risk Dominance 3.8 Two-Person Zero-Sum Games 3.9 Bayesian Equilibria 3.10 Purification of Randomized Strategies in Equilibria 3.11 Auctions 3.12 Proof of Existence of Equilibrium 3.13 Infinite Strategy Sets Exercises 4. Sequential Equilibria of Extensive-Form Games 4.1 Mixed Strategies and Behavioral Strategies 4.2 Equilibria in Behavioral Strategies 4.3 Sequential Rationality at Information States with Positive Probability 4.4 Consistent Beliefs and Sequential Rationality at All Information States 4.5 Computing Sequential Equilibria 4.6 Subgame-Perfect Equilibria 4.7 Games with Perfect Information 4.8 Adding Chance Events with Small Probability 4.9 Forward Induction 4.10 Voting and Binary Agendas 4.11 Technical Proofs Exercises 5. Refinements of Equilibrium in Strategic Form 5.1 Introduction 5.2 Perfect Equilibria 5.3 Existence of Perfect and Sequential Equilibria 5.4 Proper Equilibria 5.5 Persistent Equilibria 5.6 Stable Sets 01 Equilibria 5.7 Generic Properties 5.8 Conclusions Exercises 6. Games with Communication 6.1 Contracts and Correlated Strategies 6.2 Correlated Equilibria 6.3 Bayesian Games with Communication 6.4 Bayesian Collective-Choice Problems and Bayesian Bargaining Problems 6.5 Trading Problems with Linear Utility 6.6 General Participation Constraints for Bayesian Games with Contracts 6.7 Sender-Receiver Games 6.8 Acceptable and Predominant Correlated Equilibria 6.9 Communication in Extensive-Form and Multistage Games Exercises Bibliographic Note 7. Repeated Games 7.1 The Repeated Prisoners Dilemma 7.2 A General Model of Repeated Garnet 7.3 Stationary Equilibria of Repeated Games with Complete State Information and Discounting 7.4 Repeated Games with Standard Information: Examples 7.5 General Feasibility Theorems for Standard Repeated Games 7.6 Finitely Repeated Games and the Role of Initial Doubt 7.7 Imperfect Observability of Moves 7.8 Repeated Wines in Large Decentralized Groups 7.9 Repeated Games with Incomplete Information 7.10 Continuous Time 7.11 Evolutionary Simulation of Repeated Games Exercises 8. Bargaining and Cooperation in Two-Person Games 8.1 Noncooperative Foundations of Cooperative Game Theory 8.2 Two-Person Bargaining Problems and the Nash Bargaining Solution 8.3 Interpersonal Comparisons of Weighted Utility 8.4 Transferable Utility 8.5 Rational Threats 8.6 Other Bargaining Solutions 8.7 An Alternating-Offer Bargaining Game 8.8 An Alternating-Offer Game with Incomplete Information 8.9 A Discrete Alternating-Offer Game 8.10 Renegotiation Exercises 9. Coalitions in Cooperative Games 9.1 Introduction to Coalitional Analysis 9.2 Characteristic Functions with Transferable Utility 9.3 The Core 9.4 The Shapkey Value 9.5 Values with Cooperation Structures 9.6 Other Solution Concepts 9.7 Colational Games with Nontransferable Utility 9.8 Cores without Transferable Utility 9.9 Values without Transferable Utility Exercises Bibliographic Note 10. Cooperation under Uncertainty 10.1 Introduction 10.2 Concepts of Efficiency 10.3 An Example 10.4 Ex Post Inefficiency and Subsequent Oilers 10.5 Computing Incentive-Efficient Mechanisms 10.6 Inscrutability and Durability 10.7 Mechanism Selection by an Informed Principal 10.8 Neutral Bargaining Solutions 10.9 Dynamic Matching Processes with Incomplete Information Exercises Bibliography Index

3,569 citations

Journal ArticleDOI
11 Aug 2003
TL;DR: The history of research in sensor networks over the past three decades is traced, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spanning this period: the Distributed Sensor Networks (DSN) and the Sensor Information Technology (SensIT) programs.
Abstract: Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spanning this period: the Distributed Sensor Networks (DSN) and the Sensor Information Technology (SensIT) programs. Technology trends that impact the development of sensor networks are reviewed, and new applications such as infrastructure security, habitat monitoring, and traffic control are presented. Technical challenges in sensor network development include network discovery, control and routing, collaborative signal and information processing, tasking and querying, and security. The paper concludes by presenting some recent research results in sensor network algorithms, including localized algorithms and directed diffusion, distributed tracking in wireless ad hoc networks, and distributed classification using local agents.

3,269 citations

Journal ArticleDOI
TL;DR: A conceptual framework is presented that separates the acquisition and representation of context from the delivery and reaction to context by a context-aware application, and a toolkit is built that instantiates this conceptual framework and supports the rapid development of a rich space of context- aware applications.
Abstract: Computing devices and applications are now used beyond the desktop, in diverse environments, and this trend toward ubiquitous computing is accelerating. One challenge that remains in this emerging research field is the ability to enhance the behavior of any application by informing it of the context of its use. By context, we refer to any information that characterizes a situation related to the interaction between humans, applications, and the surrounding environment. Context-aware applications promise richer and easier interaction, but the current state of research in this field is still far removed from that vision. This is due to 3 main problems: (a) the notion of context is still ill defined, (b) there is a lack of conceptual models and methods to help drive the design of context-aware applications, and (c) no tools are available to jump-start the development of context-aware applications. In this anchor article, we address these 3 problems in turn. We first define context, identify categories of contextual information, and characterize context-aware application behavior. Though the full impact of context-aware computing requires understanding very subtle and high-level notions of context, we are focusing our efforts on the pieces of context that can be inferred automatically from sensors in a physical environment. We then present a conceptual framework that separates the acquisition and representation of context from the delivery and reaction to context by a context-aware application. We have built a toolkit, the Context Toolkit, that instantiates this conceptual framework and supports the rapid development of a rich space of context-aware applications. We illustrate the usefulness of the conceptual framework by describing a number of context-aware applications that have been prototyped using the Context Toolkit. We also demonstrate how such a framework can support the investigation of important research challenges in the area of context-aware computing.

3,095 citations