You are on page 1of 8

WIRELESS

INTEGRATED
NETWORK
SENSORS
For pervasive computing performance, exploit the
physical limits of these densely distributed networks of
embedded sensors, controls, and processors.

W
ireless integrated network sen- [2–5]. Scales range from local to global for applica-
sors (WINS) provide distrib- tions in medicine, security, factory automation, envi-
uted network and Internet ronmental monitoring, and condition-based
access to sensors, controls, and maintenance. Compact geometry and low cost allow
processors deeply embedded in WINS to be embedded and distributed at a fraction
equipment, facilities, and the of the cost of conventional wireline sensor and actu-
environment. The WINS network represents a new ator systems.
monitoring and control capability for applications WINS opportunities depend on development of a
in such industries as transportation, manufacturing, scalable, low-cost, sensor-network architecture. Such
health care, environmental oversight, and safety and applications require delivery of sensor information to
security. WINS combine microsensor technology the user at a low bit rate through low-power trans-
and low-power signal processing, computation, and ceivers. Continuous sensor signal processing enables
low-cost wireless networking in a compact system. the constant monitoring of events in an environment
Recent advances in integrated circuit technology in which short message packets would suffice. Future
have enabled construction of far more capable yet applications of distributed embedded processors and
inexpensive sensors, radios, and sensors will require vast numbers of devices. Con-
processors, allowing mass ventional methods of sensor networking represent an
production of sophisti- impractical demand on cable installation and net-
cated systems linking work bandwidth. Processing at the source would
the physical world to drastically reduce the financial, computational, and
digital data networks management burden on communication system

G.J. Pottie and W.J. Kaiser

COMMUNICATIONS OF THE ACM May 2000/Vol. 43, No. 5 51


Figure 1. Remote access to seismic and image data;
(a) browser image of photo and seismic response of vehicle; (b) sensor node control panel; and
(c) sampling rate controls.

(b)
(a) (c)

components, networks, and human resources. undo the dispersion [12]. Finally, many obstructions
Here, we limit ourselves to a security application can render electromagnetic sensors useless. Regardless
designed to detect and identify threats within some of the size of the sensor array, objects behind walls or
geographic region and report the decisions concerning under dense foliage cannot be detected.
the presence and nature of such threats to a remote As a simple example, consider the number of pix-
observer via the Internet. In the context of this appli- els needed to cover a particular area at a specified res-
cation, we describe the physical principles leading to olution. The geometry of similar triangles reveals that
consideration of dense sensor networks, outline how the same number of pixels is needed whether the pix-
energy and bandwidth constraints compel a distrib- els are concentrated in one large array or distributed
uted and layered signal processing architecture, outline among many devices. For free space with no obstruc-
why network self-organization and reconfiguration are tions, we would typically favor the large array, since
essential, discuss how to embed WINS nodes in the there are no communications costs for moving infor-
Internet, and describe a prototype platform enabling mation from the pixels to the processor. However,
these functions, including remote Internet control and coverage of a large area implies the need to track mul-
analysis of sensor-network operation. tiple targets (a very difficult problem), and almost
every security scenario of interest involves heavily
Physical Principles cluttered environments complicated by obstructed
When are distributed sensors better than a single lines of sight. Thus, if the system is to detect objects
large device, given the high cost of design implicit in reliably, it has to be distributed, whatever the net-
having to create a self-organizing cooperative net- working cost.
work? What are the fundamental limits in sensing, There are also example situations (such as radar) in
detection theory, communications, and signal pro- which it is better to concentrate the elements, typi-
cessing driving the design of a network of distrib- cally where it is not possible to get sensors close to tar-
uted sensors? gets. There are also many situations in which it is
Propagation laws for sensing. All signals decay with possible to place sensors in proximity to targets,
distance as a wavefront expands. For example, in free bringing many advantages.
space, electromagnetic waves decay in intensity as the Detection and estimation theory fundamentals. A
square of the distance; in other media, they are sub- detector is given a set of observables {Xj} to determine
ject to absorption and scattering effects that can which of several hypotheses {hi} is true. These observ-
induce even steeper declines in intensity with dis- ables may, for example, be the sampled output of a
tance. Many media are also dispersive (such as via seismic sensor. The signal includes not only the
multipath or low-pass filtering effects), so a distant response to the desired target (such as a nearby pedes-
sensor requires such costly operations as deconvolu- trian) but background noise and interference from
tion (channel estimation and inversion) to partially other seismic sources. A hypothesis might include the

52 May 2000/Vol. 43, No. 5 COMMUNICATIONS OF THE ACM


intersection of several distinct events (such as the pres- size of the feature space and the number of hypothe-
ence of multiple targets of particular types). ses that have to be considered, as each feature extrac-
The decision concerning target presence, absence, tor deals with only one target with no propagation
and type is usually based on estimates of parameters of dispersal effects.
these observations. Examples of parameters include Alternatively, we may deploy a dense sensor net-
selected Fourier, linear predictive coding, and wavelet work. Due to the decay of signals with distance,
transform coefficients. The number of parameters is shorter-range phenomena (such as magnetics) can be
typically a small fraction of the size of the observable used, limiting the number of targets (and hence
set and thus constitute a reduced representation of the hypotheses) in view at any given time. At short range,
observations for purposes of distinguishing among the probability is enhanced that the environment is
hypotheses. essentially homogeneous within the detection range,
The set of parameters is known collectively as the reducing the number of environmental features—and
feature set {fk}. The reliability of this parameter esti- thus the size of the decision space. Finally, since higher
mation depends on both the number of independent SNR is obtained at short range, and we can use a vari-
observations and the signal-to-noise ratio (SNR). For ety of sensing modes that may be unavailable at dis-
example, according to the Cramer-Rao bound [10], tance, we are better able to choose a small feature set
which establishes the fundamental limits of estima- that distinguishes targets. With only one mode, we
tion accuracy, the variance of a parameter estimate for would need to go deep into that mode’s feature set,
a signal perturbed by white noise declines linearly getting lower marginal returns for each feature. Thus,
with both the number of observations and the SNR. having targets nearby offers many options for reduc-
Consequently, to have to compute a good estimate of ing the size of the decision space.
any particular feature, we need either a long set of Communications constraints. Spatial separation is
independent observations or high SNR. another important factor in the construction of com-
The formal means of choosing among hypotheses munication networks. For low-lying antennas, intensity
is to construct a decision space (whose coordinates are drops as the fourth power of distance due to partial can-
the values of the features) and divide it into regions cellation by a ground-reflected ray [7, 9]. Propagation
according to the rule we decide on the hypothesis hi, is influenced by surface roughness, the presence of
if the conditional probability p(hi|{fk}) > p(hj|{fk}) for reflecting and obstructing objects, and antenna eleva-
all j not equal to i. Note that the features include envi- tion. The losses make long-range communication a
ronmental variations and other factors we measure or power-hungry exercise; the combination of Maxwell’s
about which we have prior knowledge. The complex- Laws (governing propagation of electromagnetic radia-
ity of the decision increases with the dimension of the tion) and Shannon’s capacity theorem (establishing
feature space; our uncertainty in the decision also gen- fundamental relationships among bandwidth, SNR,
erally increases with the number of hypotheses we and bit rate) together dictate that there is a limit on how
have to sort through. Thus, to reliably distinguish many bits can be conveyed reliably, given power and
among many possible hypotheses, we need a larger bandwidth restrictions. On the other hand, the strong
feature space. To build the minimum size space, we decay of intensity with distance provides spatial isola-
must determine the marginal improvement in the tion, allowing the reuse of frequencies throughout a
decision error rate resulting from addition of another network.
feature. This may be as simple as including another Multipath propagation (resulting from reflections
term in an orthonormal expansion (such as fast off multiple objects) is a serious problem. A digital
Fourier transform and wavelet transform) or an modulation requires a 40dB increase in SNR to main-
entirely different transformation of the set {X}. tain an error probability of 10-5 with Rayleigh dis-
Unfortunately, we seldom know the prior proba- tributed-amplitude fading of the signal due to
bilities of the various hypotheses; training is often multipath, compared to a channel with the same aver-
inadequate to determine the conditional probabilities; age path loss perturbed only by Gaussian noise. It is
and the marginal improvement in reliability declines possible to recover most of this loss by means of
rapidly as more features are extracted from any given “diversity” obtainable in any of the domains of space,
set of observables. frequency, and time, since, with sufficient separation,
On these facts hang many practical algorithms. For the multipath fade levels are independent. By spread-
example, we could apply the deconvolution and tar- ing the information, the multiple versions experience
get-separation machinery to exploit a distributed different fading, so the result is more akin to the aver-
array. Though this machinery requires intensive com- age. If nothing is done, the worst-case conditions
munications and computations, it vastly reduces the dominate error probabilities.

COMMUNICATIONS OF THE ACM May 2000/Vol. 43, No. 5 53


For static sensor nodes, time diversity is not an switch at high frequency and with large voltage
option with respect to path losses, although it may be swings dominate the chip’s power cost.
a factor in jamming and other types of interference. While Moore’s Law implies that transistor areas
Likewise, spatial diversity is difficult to obtain, since continue to decrease—and signal-processing power
multiple antennas are unlikely to be mounted on small costs decline with time—for radios and any commu-
platforms. Thus, diversity is most likely to be achieved nication technology, there are limits on the power
in the frequency domain by, say, employing some required to transmit reliably over any given distance.
combination of frequency-hopped spread spectrum, The power-amplifier stage cannot be made smaller,
interleaving, and channel coding. Measures known to due to limits on the current density of semiconduc-
be effective against deliberate jamming are also gener- tors. This stage typically burns at least four times the
ally effective against multipath fading and multiuser radiated energy, and so, in time, dominates the energy
interference. This interference reflects the common cost of radios. However, if we consider short-range
problem of intermittent events of poor SNR. communication with peak radiated power of less than
“Shadowing,” or wavefront obstruction and con- 1mW, we continue to find that the oscillators and
finement, and path loss can be dealt with by employ- mixers used for up and down conversion dominate
ing a multihop network. If nodes are placed randomly the energy budget; radios consume essentially the
in an environment, some links to near neighbors are same power whether transmitting or receiving. While
obstructed, while others present a clear line of sight. radio efficiency improves over time, with continuing
The greater the density, the closer the nodes and the technological advances, these facts suggest that net-

> If the system is to detect objects reliably, it has to be distributed,


whatever the networking cost.

greater the likelihood of having a link with suffi- works should be designed so the radio is off as much
ciently small distance and shadowing losses. The sig- of the time as possible and otherwise transmits only at
nals then effectively hop around obstacles. the minimum required level.
Exploitation of these forms of diversity can lead to Processing also gets cheaper with time but is not
orders of magnitude reduction in the energy required yet free. Because application-specific integrated cir-
to transmit data from one location in a WINS net- cuits (ASICs) can clock at much lower speeds and use
work to another; the energy cost is then dominated by less numerical precision, they consume several orders
the reception and retransmission energy costs of the of magnitude less energy than digital signal processors
radio transceivers for dense peer-to-peer networks. (DSPs). While the line between dedicated processors
Radio systems involve a close connection between and general-purpose (more easily programmed)
networking strategy and physical layer. The connec- machines is constantly shifting, generally speaking, a
tion is even stronger in light of the multiple-access mixed architecture is needed for computational sys-
nature of the channel, since interference among users tems dealing with connections to the physical world.
is often the limiting impairment; the management of The ratio in die area between the two approaches—
multiple-access interference is explored in [6]. ASIC and DSP—scales with technological change, so
Energy consumption in integrated circuits. Unfor- ASICs maintain a cost advantage over many chip gen-
tunately, there are limits to the energy efficiency of erations. Convenient programmability across several
complimentary metal oxide semiconductor (CMOS) orders of magnitude of energy consumption and data
communications and signal-processing circuits. Over- processing requirements is a worthy research goal for
all system costs cannot be low if the energy system is pervasive computing. In the meantime, while
large. A CMOS transistor pair draws power each time researchers continue to pursue that goal, multiproces-
it is flipped. The power used is roughly proportional sor systems are needed in WINS.
to the product of the switching frequency, the area of
the transistor (related to device capacitance), and the Signal-Processing Architectures
square of the voltage swing. Thus, power consump- Security applications require constant vigilance by at
tion for any given operation drops roughly as the least a subset of the sensors. We want a low false-
fourth power of feature size. The components that alarm rate and a high detection probability. So as

54 May 2000/Vol. 43, No. 5 COMMUNICATIONS OF THE ACM


long as data is queued, we can usually run energy- 100MIPS/W power could efficiency execute 3 million
efficient procedures providing high detection proba- instructions for the same amount of energy. If the appli-
bilities—and high false-alarm rates. Energy cation and infrastructure permit, it pays to process the
thresholding and limited frequency analysis on low- data locally to reduce traffic volume and make use of
sampling-rate magnetic, acoustic, infrared, and seis- multihop routing and advanced communications tech-
mic sensors are excellent candidates for low-power niques, such as coding, to reduce energy costs.
ASICs. Higher-energy processing and sensing can be Indeed, exploitation of the application makes pos-
invoked if certainty levels are not high enough. sible low-power design. For example, consider the sit-
Next, a WINS node might seek information from uation of a remote security operation (see Figure 1).
nearby sensors for data fusion (the weighted merging The figure’s screen images display remote WINS
of detection decisions) or coherent beamforming Internet operation. The browser screen images (a) and
(the complex weighting of raw data from multiple (b) display events captured by an intelligent WINS
sensors for improved detection and target location). node. For this system, the WINS node carries two
This cooperative behavior is a later step, since com- sensors with seismic and imaging capability. The basic
munication of raw data is very costly in terms of idea is that the seismic sensor is constantly vigilant, as
energy, as is its processing. Finally, a classification it requires little power. Simple energy detection can be
decision might be made using a large neural network used to trigger the camera’s operation. The image and
or some other sophisticated procedure to provide the the seismic record surrounding the event can then be
required degree of certainty. In the worst case, raw communicated to a remote observer. In this way, the
data may be hopped back to a remote site where a remote node needs to perform simple processing at
human would perform the pattern recognition. We low power, and the radio does not need to support the
can stop at any point in this chain when certainty continuous transmission of images. The networking
thresholds are met. allows human (or computer) observers to be remote
Two design principles emerge from this effort to from both the scene and the storage of archival
achieve reliable decisions with low energy consump- records. The image data allows verification of events
tion. First, we should play the probability game only and is usually required in security applications involv-
to the extent we have to. Most of the time, there are ing human response.
no targets and thus no need to apply our most expen- The seismic record and image of a vehicle (a) and a
sive algorithm (data to humans), but there are too running human (b) creating the record are both
many circumstances in which the least-expensive shown in the figure. The WINS node and WINS-
algorithm would fail. A processing hierarchy can lead gateway node control Web pages (c) and (d), allowing
to huge cost reductions while assuring the required direct and remote control (via the WINS network and
level of reliability. Second, the processing hierarchy is the Internet) of event-recognition algorithms. For
intertwined with networking and data storage issues. example, the seismic energy threshold for triggering
For how long and at what location data is queued an image can be controlled remotely. The number of
depends on where in the processing hierarchy the images transmitted can be reduced with an increased
operation resides, whether a node communicates and sensor suite of short-range detectors, including
to which set of neighboring nodes depends on the sig- infrared and magnetic, and by adding more sophisti-
nal processing task. The communication costs in turn cated processing within the nodes.
influence the processing strategy, including our will- Collaborative processing can extend the effective
ingness to communicate and whether the processing is range of sensors and enable new functions. For exam-
centralized or distributed. Optimization is mandated ple, consider the problem of target location. With a
by the physical constraints of the WINS network. dense array, target position can be tracked by having
Therefore the physical layer intrudes up through the all nodes detecting a disturbance make a report. The
network and signal-processing layers to applications. centroid of all nodes reporting the target is one possi-
To make concrete the effect of these constraints, ble estimate of the target’s position. This detection
assume the following: a 1GHz carrier frequency; an technique requires the exchange of very few bits of
antenna elevation of 1/2 wavelength; an efficient digi- information per node. Much more precise position
tal modulation, such as binary-phase-shift-keying estimates can be achieved through beamforming,
(BPSK) transmission, 10-6 error probability, fourth- which requires the exchange of time-stamped raw data
power distance loss, Rayleigh fading, and an ideal (no- among the nodes. Although the related processing is
noise) receiver. The energy cost of transmitting 1Kb a also much more costly, it yields higher SNR-processed
distance of 100 meters is approximately 3 joules. By data for subsequent classification decisions, long-
contrast, a general-purpose processor with range position location, and even some self-location

COMMUNICATIONS OF THE ACM May 2000/Vol. 43, No. 5 55


and calibration options for the nodes [11]. one low-power protocol suite embodying these prin-
Depending on the application, it might be better ciples has been developed, including boot-up, MAC,
to have sparse clusters of beamforming-capable nodes, energy-aware routing, and interaction with mobile
rather than a dense deployment of less-intelligent units [8]. Its development indicates the feasibility of
nodes, or it may be better still to enable both sets of achieving distributed low-power operation in a flat
functions simultaneously. For example, we may over- multihop network.
lay a less dense array of intelligent nodes command- Also clear is that for a wide range of applications,
ing the capture of coherent data for purposes of some way has to be found to conveniently link sensor
beamforming. Allowing for heterogeneity from the networks to the Internet. Inevitably, some layering of
outset greatly expands the processing horizons. the protocols (and devices) is needed to make use of
these standard interfaces. For example, the WINS
WINS Network Architecture NG (next-generation) node architecture design (dis-
Unlike conventional wireless networks, a WINS cussed later) addresses the constraints on robust oper-
network has to support large numbers of sensors in ation, dense and deep distribution, interoperability
a local area with short range and low average bit-rate with conventional networks and databases, operating
communication (fewer than than 1–100Kbps). The power, scalability, and cost (see Figure 2). WINS gate-
network design has to address the requirement of ways provide support for the WINS network and
servicing dense sensor distributions, emphasizing access between conventional network physical layers
recovery of environmental information. In WINS and their protocols and between the WINS physical
networks, as a rule, we seek to exploit the short-dis- layer and its low-power protocols. WINS system
tance separation between nodes to provide multihop design exploits the reduced link range available
communication through the power advantages out- through multihopping to provide advantages the sys-
lined earlier. Since for short hops, transceiver power tem architect can choose from the following set:

> If the application and infrastructure permit, it pays to


process the data locally to reduce traffic volume and make use
of multihop routing and advanced communication techniques
to reduce energy costs.

consumption for reception is nearly the same as that reduced operating power, improved bit rate,
of transmission, the protocol should be designed so improved bit error rate, improved communication
radios are off as much of the time as possible. That privacy (by way of reduced transmit power), simpli-
is, a device’s medium access control (MAC) address fied protocols, and reduced cost. These benefits are
in a network should include some variant of time- not obtained simultaneously but need to be extracted
division multiple access. individually, depending on design emphasis.
A time-division protocol requires that the radios In network design today, architects also have to
exchange short messages periodically to maintain address: How can Internet protocols, including TCP
local synchronism. It is not necessary for all nodes to and IPv6, be employed within sensor networks? While
have the same global clock, but the local variations it is desirable to not have to develop new protocols or
from link to link should be small to minimize the perform protocol conversion at gateways, several fac-
guard times between slots and enable cooperative sig- tors demand custom solutions. First, IPv6 is not truly
nal processing functions, including fusion and beam- self-assembling; while addresses can be obtained from
forming. The messages can combine network a server, this particular protocol presupposes attach-
performance information, maintenance of synchro- ment at lower levels already. Second, present-day
nization, and reservation requests for bandwidth for Internet protocols take little account of the unreliabil-
longer packets. The abundant bandwidth resulting ity of physical channels or the need to conserve energy,
from the spatial reuse of frequencies and local pro- focusing instead on support for a wide range of traffic.
cessing ensures relatively few conflicts in these Embedded systems can achieve far higher efficiencies
requests, so simple mechanisms can be used. At least by exploiting the traffic’s limited nature.

56 May 2000/Vol. 43, No. 5 COMMUNICATIONS OF THE ACM


Another question they Figure 2. WINS network architecture.
have to address is: Where
should the processing and
storage take place? Commu-
nication costs a great deal
compared to processing;
therefore energy constraints
dictate doing as much pro-
cessing at the source as possi-
ble. Moreover, reducing the
amount of data to transmit
simplifies network design
significantly, permitting scal-
ability to thousands of nodes
per Internet gateway.
Figure 3. WINS node architecture.
WINS Node Architectures signal processing
sensor processing
WINS development was initiated in 1993 at the

interface
for event detection wireless
network
University of California, Los Angeles; the first gen- event classification interface
actuator control
eration of field-ready WINS devices and software and identification

was fielded there three years later (see Figure 2a).


continuously vigilant operation low-duty cycle operation
The DARPA-sponsored low-power wireless inte-
grated microsensors (LWIM) project demonstrated
the feasibility of multihop, self-assembled, wireless
networks. This first network also demonstrated the WINS node then communicates an attribute of the
feasibility of algorithms for operating wireless sensor identified event, possibly the address of the event in
nodes and networks at micropower levels. In another an event look-up table stored in all network nodes.
DARPA-funded joint development program These infrequent events can be managed by the
(involving UCLA and the Rockwell Science Center higher-level processor—in the first version of WINS
of Thousand Oaks, Calif.), a modular development NG, a Windows CE-based device selected for the
platform was devised to enable evaluation of more availability of low-cost developer tools. By providing
sophisticated networking and signal-processing algo- application programming interfaces enabling the
rithms and to deal with many types of sensors, viewing and controlling of the lower-level functions, a
though with less emphasis on power conservation developer is either shielded from real-time functions
than LWIM [1]. These experiments taught us to rec- or is allowed to delve into them as desired to improve
ognize the importance of separating the real-time an application’s efficiency. Future generations will also
functions that have to be optimized for low power support plug-in Linux devices; other development
from the higher-level functions requiring extensive will include very small but limited sensing devices that
software development but that are invoked with interact with WINS NG nodes in heterogeneous net-
light-duty cycles. works, supporting, say, intelligent tags (see Borriello’s
The WINS NG node architecture was subse- and Want’s “Embedded Computation Meets the
quently developed by Sensor.com, founded by the World Wide Web” in this issue). These small devices
authors in 1998 in Los Angeles, to enable continuous might scavenge their energy from the environment by
sensing, signal processing for event detection, local means of photocells or piezoelectric materials, captur-
control of actuators, event identification, and com- ing energy from vibrations and achieving perpetual
munication at low power (see Figure 3). Since the life spans. A clear technical path exists today, offering
event-detection process is continuous, the sensor, data increased circuit integration and improved packaging.
converter, data buffer, and signal processing all have to This path should produce very low-cost and compact
operate at micropower levels, using a real-time system. devices in the near future.
If an event is detected, a process may be alerted to
identify the event. Protocols for node operation then Conclusion
determine whether extra energy should be expended These physical considerations are making it possible
for further processing and whether a remote user or for us to pursue the innovative design of densely dis-
neighboring WINS node should be alerted. The tributed sensor networks and the resulting advantages

COMMUNICATIONS OF THE ACM May 2000/Vol. 43, No. 5 57


of layered and heterogeneous processing and net- (Monterey, Calif., Aug. 10–12). IEEE, New York, 1998, 11–15.
6. Pottie, G. Wireless multiple access adaptive communication tech-
working architectures for related applications. The niques. In Encyclopedia of Telecommunications, F. Froelich and A. Kent
close intertwining of network processing is a central Eds. Marcel Dekker, Inc., New York, 1999, 1–41.
7. Rappaport, T. Wireless Communications: Principles and Practice. Pren-
feature of systems connecting the physical and virtual tice Hall, Upper Saddle River, N.J., 1996.
worlds. Development platforms are now available 8. Sohrabi, K., Gao, J., Ailawadhi, V., and Pottie, G. A self-organizing
that will increasingly allow a broader community to sensor network. In Proceedings of the 37th Allerton Conference on Com-
munication, Control, and Computing (Monticello, Ill., Sept. 27–29).
engage in fundamental research in networking and Dept. of Electrical and Computer Engineering, University of Illinois at
new applications, advancing developers and users Urbana-Champaign, 1999.
9. Sohrabi, K., Manriquez, B., and Pottie, G. Near-ground wideband
alike toward truly pervasive computing. c channel measurements. In Proceedings of the 49th Vehicular Technology
Conference (Houston, May 16–20). IEEE, New York, 1999, 571–574.
References 10. Van Trees, H. Detection, Estimation and Modulation Theory. John
1. Agre, J., Clare, L., Pottie, G., and Romanov, N. Development platform Wiley & Sons, Inc., New York, 1968.
for self-organizing wireless sensor networks. In Proceedings of 11. Yao, K., Hudson, R., Reed, C., Chen, D., and Lorenzelli, F. Blind
Aerosense’99 (Orlando Fla., Apr. Apr. 8–9). International Society of beamforming on a randomly distributed sensor array system. IEEE J.
Optical Engineering, Bellingham, Wa., 1999, 257–268. Select. Areas Comm. 16, 8 (Oct. 1998), 1555–1567.
2. Asada, G., Dong, M., Lin, T., Newberg, F., Pottie, G., Marcy, H., and 12. Yu, T., Chen, D., Pottie, G., and Yao, K. Blind decorrelation and
Kaiser, W. Wireless integrated network sensors: Low-power systems on a deconvolution algorithm for multiple-input, multiple-output system.
chip. In Proceedings of the 24th IEEE European Solid-State Circuits Confer- In Proceed. Internat. Soc. Opt. Eng. 3807 (July 1999), 200–209.
ence (Den Hague, The Netherlands, Sept. 21–25). Elsevier, 1998, 9–12.
3. Bult, K., Burstein, A., Chang, D., Dong, M., Fielding, M., Kruglick, G.J. Pottie (pottie@ee.ucla.edu) is an associate professor in the
E., Ho, J., Lin, F., Lin, T.-H., Kaiser, W., Marcy, H., Mukai, R., Nel- Electrical Engineering Department at the University of California, Los
son, P., Newberg, F., Pister, K., Pottie, G., Sanchez, H., Stafsudd, O., Angeles, and a founder of Sensoria Corp. in Los Angeles.
Tan, K., Ward, C., Xue, S., and Yao, J. Low-power systems for wire- W.J. Kaiser (kaiser@ee.ucla.edu) is a professor in and department
less microsensors. In Proceedings of the International Symposium on Low- chair of the Electrical Engineering Department at the University of
Power Electronics and Design (Monterey, Calif., Aug. 12–14). IEEE, California, Los Angeles, and a founder of Sensoria Corp. in Los Angeles.
New York, 1996, 17–21.
4. Dong, M., Yung, G., and Kaiser, W. Low-power signal processing Permission to make digital or hard copies of all or part of this work for personal or class-
architectures for network microsensors. In Proceedings of the 1997 room use is granted without fee provided that copies are not made or distributed for
International Symposium on Low-Power Electronics and Design (Mon- profit or commercial advantage and that copies bear this notice and the full citation on
terey, Calif., Aug. 18–20). IEEE, New York, 1997, 173–177. the first page. To copy otherwise, to republish, to post on servers or to redistribute to
5. Lin, T.-H., Sanchez, H., Rofougaran, R., and Kaiser, W. CMOS front- lists, requires prior specific permission and/or a fee.
end components for micropower RF wireless systems. In Proceedings of
the 1998 International Symposium on Low-Power Electronics and Design © 2000 ACM 0002-0782/00/0500 $5.00

The
Com puter
Alan Watt, Fabio Policarpo
Image
To Order 1998
Call Toll Free: 751 pages Hardcover
1.800.342.6626 (USA & Canada) ISBN 0-201-42298-0
1.212.626.0500 (outside US) ACM Order Number : 702980
Fax: 1.212.944.1318 Member Pr ice: $53.95
Nonmember Pr ice: $59.95

To order online: h t t p : / / w w w. a c m . o r g / c a t a l o g /

Association for Computing Machiner y acm


ad2 The First Society in Computing

58 May 2000/Vol. 43, No. 5 COMMUNICATIONS OF THE ACM

You might also like