Daniel Giusto’s research while affiliated with Massachusetts Institute of Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (28)


Inter-Vehicle Communication QoS Management for Disaster Recovery
  • Chapter

January 2010

·

48 Reads

·

3 Citations

P. Orefice

·

L. Paura

·

·

[...]

·

The chapter deals with the QoS Management in a relief communication network able to manage the different wireless access technologies that the rescuers utilize. A QoS DiffServ-based architecture is proposed, which not only provides seamless QoS support over different access wireless technologies, but also exhibits a scalability property against the entry of any new access technology, since the new entry can be managed just adding a new specific QoS management module without requiring the upgrading of the ones already present in the system. A testbed for the performance evaluation of the proposed architecture has also been designed and the first results show the effectiveness of the proposal.


Performance Characterization of Passive UHF RFID Tags

January 2010

·

51 Reads

·

2 Citations

In this chapter, we concentrate on performance characterization of passive ultra-high frequency (UHF) radio frequency identification (RFID) tags. Energy harvesting properties of the tag and the significance of the backscattered signal strength and radar cross-section (RCS) of the tag are analyzed with two characterization examples. The presented examples are an analysis of the effects of dipole antenna width and an analysis of the impedance matching properties of a bow-tie tag antenna.


Fig. 1 Example of backscatter mechanism of the transmitted pulse due to tag's antenna and the presence of scatterers.  
Fig. 3 Example of the laboratory impulse response (grid point H, at distance of 3.10 m) and of the antenna mode contribution (after clutter removal). In particular, it is evident the presence of some echoes after the 1 st direct path.  
Fig. 5 Example of reader transmitted and received signals. For simplicity an all-ones sequence for {d n } is considered.
Fig. 6 Bit error probability as a function of the bit rate R b in different tag locations. SPMF receiver is considered.
Fig. 7 Bit error probability as a function of the bit rate R b in different tag locations. IMF is considered.

+1

Backscatter Communication Using Ultrawide Bandwidth Signals for RFID Applications
  • Chapter
  • Full-text available

January 2010

·

759 Reads

·

13 Citations

RFID technology for use in real-time object identification is being rapidly adopted in several fields such as logistic, automotive, surveillance, automation systems, etc. [1]. A radiofrequency identification (RFID) system consists of readers and tags applied to objects. The reader interrogates the tags via a wireless link to obtain the data stored on them. The cheapest RFID tags with the largest commercial potential are passive or semi-passive, and the energy necessary for tag–reader communication is harvested from the reader’s signal. Passive RFID tags are usually based on backscatter modulation, where the antenna reflection properties are changed according to information data [2].

Download

Probabilistic Information Dissemination for MANETs: the IPAC Approach

January 2010

·

32 Reads

·

17 Citations

Efficient data dissemination in MANETs presents a significant challenge. Epidemic dissemination is introduced as a method to reliably spread information (context) across a network in which no direct path from source to destination can be secured. We propose a probabilistic broadcast scheme instead of the flooding technique, thus, reducing significantly the volume of message transmissions seen throughout the network. Simulation results prove the efficiency of such a scheme, which achieves full coverage of the network with disseminated context.


HYDRA: A Development Platform for Integrating Wireless Devices and Sensors into Ambient Intelligence Systems

January 2010

·

2,234 Reads

·

119 Citations

The HYDRA project develops middleware for networked embedded systems that allow developers to create ambient intelligence (AmI) applications based on wireless devices and sensors. Through its unique combination of Service-oriented Architecture (SoA) and a semantic-based Model-Driven Architecture, HYDRA will enable the development of generic services based on open standards.


Optimal Cross-Layer Flow-Control for Wireless Maximum-Throughput Delivery of VBR Media Contents

January 2010

·

19 Reads

·

4 Citations

Emerging media overlay networks for wireless applications aim at delivering Variable-Bit-Rate (VBR) encoded media contents to nomadic end-users by exploiting the (fading-impaired and time-varying) access capacity offered by the “last-hop” wireless channel. In this application scenario, a still open question concerns the design of control policies maximizing the average throughput over the wireless last-hop, under constraints on the maximum connection bandwidth allowed at the Application (APP) layer, the queue-capacity available at the Data-Link (DL) layer, and the average and peak transmit energies sustained by the Physical (PHY) layer. The main feature of the approach we follow relies on the maximization (on a per-slot basis) of the throughput averaged over the fading statistics and conditioned on the queue-state. The resulting optimal controller is rate-based and operates in a cross-layer fashion that involves the APP, DL, and PHY layers of the underlying protocol stack. This means that the proposed controller dynamically allocates connection bandwidth at the APP layer, throughput at the DL layer, and transmit-energy at the PHY layer by basing on both current queue and channel-states. The carried out numerical tests give insights about the connection bandwidth-vs.-queue-delay tradeoff attained by the optimal controller.


Fig. 1 A possible (pervasive) use of IEEE 802.15.4 WPANs in an emergency area. 
Fig. 2 An example of network including 30 nodes. The numbers represent nodes’ identifiers. 
Fig. 3 Simplified flow chart describing PANEL.
Fig. 4 Operations computed by a generic child i n of the PAN coordinator p n at the beginning of 
Fig. 7 Average gain in terms of mean level of nodes as function of the number of nodes in the topology.
A Distributed Procedure for IEEE 802.15.4 PAN Coordinator Election in Emergency Scenarios

January 2010

·

250 Reads

·

2 Citations

In an emergency scenario, the presence of a reliable communication infrastructure is fundamental. In response to massive catastrophes, such as earthquakes, floods, fires, etc., public authorities are expected to undertake actions to control and limit damages for people and for buildings. To this end, security agents are dispatched to the emergency area and they need to communicate to the people from a remote centre and they are responsible for emergency management. In this context, the use of IEEE 802.15.4 wireless personal area networks (WPANs) to allow communications among security agents seems particularly appropriate, thanks to their characteristics of self-configurability, adaptability, scalability, and low cost. Moreover, this kind of network can be used, if necessary, in a pervasive mode for data collection in the emergency area. In this work, we present an algorithm to self-configure an IEEE 802.15.4 WPAN by electing, in a distributed manner, a suitable node for the WPAN coordination. Our approach achieves a reduction of the network depth and a better distribution of nodes at different levels of the network.


A Mobile Platform for Measurements in Dynamic Topology Wireless Networks

January 2010

·

139 Reads

Due to the wide spread of mobile devices, such as smartphones, nowadays new applications and appealing services are emerging for wireless networks. Some interesting novel architectures for communication inspired by principles of cooperation have been introduced in the last years. To evaluate the performance of new proposed architectures, it is often necessary to measure throughput and delay in the communication, and the power consumption of the devices. In many measurement campaigns, mobile devices are placed in fixed positions without moving around, and consequently the results differ from reality, where the topology of the network is constantly changing due to mobility of the users. Another approach is to make simulations where the topology of the network can be modified during the measurements, but in some cases they can only offer a good approximation of the real environment. In this chapter, we present a mobile platform we have designed to optimize measurements for wireless networks with dynamic topologies by using real devices.


Fig. 1 Schematic overview of the RFID installation 
RFID Data Analytics in Apparel Retail

January 2010

·

1,082 Reads

·

2 Citations

This contribution is concerned with business value of large amounts of data generated by RFID data collection infrastructures. We present the case example of a department store that implemented RFID in its menswear department to seamlessly track thousands of items on their way from the distribution center to the point of sale. The recorded trace data allow for a number of quantitative analyses, which provide novel insights into in-store logistics and customer behavior on the sales floor. We provide an overview of the structure of the underlying raw data and the necessary analysis procedures for generating business-relevant information. Our case study findings indicate that RFID poses an untapped opportunity for retail companies to improve category management, store layout design, inventory control, and process execution.


InterDataNet: A Scalable Middleware Infrastructure for Smart Data Integration

January 2010

·

24 Reads

·

3 Citations

At the core of the Internet/Web of Things lays the issue of large-scale interoperability of heterogeneous Things/Objects networks. Going beyond limited-scale interoperability, middleware requires dealing with a number of issues targeting, among others, the Web-wide Object addressability and Objects capabilities orchestration for the development of different applications. Such a goal requires not only addressing “internetworking things” at a communication level but also “interdataworking of things” i.e., providing interoperability among Objects smart data. Indeed, the smarter and the most interoperable are the data, the easier will be sharing, linking, and processing between distributed IoT applications. This chapter discusses the architectural requirements of the InterDataNet (IDN) framework. IDN approach provides scalable integration, management, and reuse of large numbers of Objects networks in the Web of Data, thus enabling Web of Things applications. The core of the IDN is provided through three main views: the IDN-Information Model, the IDN-Service Architecture, and the IDN-Applications.


Citations (25)


... The IoT is a set of applications that allow "things" to connect (e.g., machineto-human and machine-to-machine). For example, individual products to manufacture machinery, connect to the internet, communicate information about their features (i.e., condition of the things, the temperature of the attributes and movement), and "immediate data processing" called smart response through radiofrequency identification, sensor, or mobile devices [4,5]. ...

Reference:

A Systematic Literature Review of Privacy Information Disclosure in AI-Integrated Internet of Things (IoT) Technologies
The Internet of Things: 20th Tyrrhenian Workshop on Digital Communications
  • Citing Book
  • January 2010

... This project (Ronci and Listanti, 2010) offers and experimental implementation of a session initiation protocol (SIP) over object management group data distribution service (OMG DDS) to support interactive delay sensitive communications. Using OMG DDS, it is possible to provide QoS support, offer universal access to information and scalable efficient data distribution in addition to easy adaptation to changes. ...

Service Oriented Middleware Solutions for Emergency Communication Networks
  • Citing Chapter
  • January 2010

... Later, Deursen and Radomirovic [29] claimed that Lee et al.'s scheme [28] was weaker and could not withstand in case of an active attack. To resolve the security weaknesses of [27,28] and [29], Lee et al. [30] suggested three new ECC-based secure RFID authentication schemes. After that, Lv et al. [31] pointed out that Lee et al.'s schemes [16,28,30] are weaker in tracking active attacks. ...

Privacy Challenges in RFID Systems
  • Citing Chapter
  • January 2010

... For example in [1] an algorithm for motion derivation at the decoder side for the H.264/AVC codec is presented. In [2] a block-wise algorithm, based on LSE prediction is presented. In this paper we propose a motion compensated prediction of the current frame at the decoder side, performed in absence of motion information. ...

Video Coding with Motion Estimation at the Decoder
  • Citing Chapter
  • January 2010

... However, the distribution of this information should not compromise respondents' privacy, in the sense of revealing information about specific individuals. For this purpose, statistical agencies have studied and developed numerous mechanisms [3] and algorithms [4]– [7] to apply to the microdata sets before releasing them. In essence, these techniques rely upon some form of perturbation that permits protecting privacy to a certain extent, at the cost of losing some of the data utility with respect to the unperturbed version. ...

Private Location-Based Information Retrieval via k-Anonymous Clustering

... [4] (5) The presence or absence of architectures or techniques that enabled differentiated services within the core (6) The role of signaling [6] (7) The context or application space for such networks, e.g., military/tactical communications, disaster management [7,8] (8) The impact of channel effects peculiar to wireless systems such as fast and slow fading, error control and mobile (9) The implications for mobility management in terms of handoffs (vertical or otherwise), call-establishment [2,[9][10][11][12] There were simulation studies, performance evaluations using test-beds and theoretical analysis. With regards to the first dimension, i.e., type and number of wireless access networks, WLANs (mainly IEEE802.11 ...

Inter-Vehicle Communication QoS Management for Disaster Recovery
  • Citing Chapter
  • January 2010

... The emerging technology of wireless sensor network(WSN) has become an increasingly feasible approach to realize control and management of building environment [7,8,9]. ...

An IEEE 802.15.4 Wireless Sensor Network for Energy Efficient Buildings

... In the last decade energy-autonomous wireless sensors for ambient monitoring, personal tracking [3] and manufacturing control have greatly benefited from the well-assessed Radio Frequency Identification (RFID) standard EPC C1G2 which nowadays enables sensing functionalities [4], [5] besides the basic identification. RFID-based sensors demands for a rather limited maintenance in comparison with others assessed wireless technologies such as ZigBee, Bluetooth or Wifi [6]. ...

Sensor-Oriented Passive RFID
  • Citing Chapter
  • January 2010