scispace - formally typeset
Search or ask a question
Institution

Worcester Polytechnic Institute

EducationWorcester, Massachusetts, United States
About: Worcester Polytechnic Institute is a education organization based out in Worcester, Massachusetts, United States. It is known for research contribution in the topics: Computer science & Population. The organization has 6270 authors who have published 12704 publications receiving 332081 citations. The organization is also known as: WPI.


Papers
More filters
Journal ArticleDOI
TL;DR: The proposed nonlinear observer possesses a state-dependent gain which is computed from the solution of a system of first-order singular partial differential equations, and in particular, consists of a chain of state observation algorithms that reconstruct the unmeasurable state vector at different delayed time-instants within the time-delay window introduced by the available output measurements.

129 citations

Journal ArticleDOI
TL;DR: A theory-driven computational model of dialogue that simulates a human health counselor who is helping his or her clients to change via a series of conversations over time is described, demonstrating high levels of fidelity to best practices in health behavior change counseling.

129 citations

Journal ArticleDOI
TL;DR: A simple dynamic power management algorithm is developed for fixed quality-of-service constraints and varying channel interference, and shows improved network capacity and stability in addition to substantially improved battery life at the mobile terminals.
Abstract: For fixed quality-of-service constraints and varying channel interference, how should a mobile node in a wireless network adjust its transmitter power so that energy consumption is minimized? Several transmission schemes are considered, and optimal solutions are obtained for channels with stationary, extraneous interference. A simple dynamic power management algorithm based on these solutions is developed. The algorithm is tested by a series of simulations, including the extraneous-interference case and the more general case where multiple, mutually interfering transmitters operate in a therefore highly responsive interference environment. Power management is compared with conventional power control for models based on FDMA/TDMA and CDMA cellular networks. Results show improved network capacity and stability in addition to substantially improved battery life at the mobile terminals.

128 citations

Journal ArticleDOI
TL;DR: A novel dependable and secure data storage scheme with dynamic integrity assurance based on the principle of secret sharing and erasure coding is proposed to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components.
Abstract: Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). The distributed architecture makes it challenging to build a highly secure and dependable yet lightweight data storage system. On the one hand, sensor data are subject to not only Byzantine failures, but also dynamic pollution attacks, as along the time the adversary may modify/pollute the stored data by compromising individual sensors. On the other hand, the resource-constrained nature of WSNs precludes the applicability of heavyweight security designs. To address the challenge, in this article we propose a novel dependable and secure data storage scheme with dynamic integrity assurance. Based on the principle of secret sharing and erasure coding, we first propose a hybrid share generation and distribution scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components. To further dynamically ensure the integrity of the distributed data shares, we then propose an efficient data integrity verification scheme exploiting the techniques of algebraic signature and spot-checking. The proposed scheme enables individual sensors to verify in one protocol execution the correctness of all the pertaining data shares simultaneously in the absence of the original data. Extensive security analysis shows that the proposed scheme has strong resistance against various data pollution attacks. The efficiency of the scheme is demonstrated by experiments on sensor platforms Tmote Sky and iMote2.

128 citations


Authors

Showing all 6336 results

NameH-indexPapersCitations
Andrew G. Clark140823123333
Ming Li103166962672
Joseph Sarkis10148245116
Arthur C. Graesser9561438549
Kevin J. Harrington8568233625
Kui Ren8350132490
Bart Preneel8284425572
Ming-Hui Chen8252529184
Yuguang Fang7957220715
Wenjing Lou7731129405
Bernard Lown7333020320
Joe Zhu7223119017
Y.S. Lin7130416100
Kevin Talbot7126815669
Christof Paar6939921790
Network Information
Related Institutions (5)
Georgia Institute of Technology
119K papers, 4.6M citations

94% related

Carnegie Mellon University
104.3K papers, 5.9M citations

93% related

Massachusetts Institute of Technology
268K papers, 18.2M citations

91% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

91% related

Purdue University
163.5K papers, 5.7M citations

91% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202326
202295
2021763
2020836
2019761
2018703