Bin Tong

Learn More
—As wireless power charging technology emerges, some basic principles in sensor network design are changed accordingly. Existing sensor node deployment and data routing strategies cannot exploit wireless charging technology to minimize overall energy consumption. Hence, in this paper, we (a) investigate the impact of wireless charging technology on sensor(More)
—When deployed for long-term tasks, the energy required to support sensor nodes' activities is far more than the energy that can be preloaded in their batteries. No matter how the battery energy is conserved, once the energy is used up, the network life terminates. Therefore, guaranteeing long-term energy supply has persisted as a big challenge. To address(More)
Dimensionality reduction has been considered as one of the most significant tools for data analysis. In general, supervised information is helpful for dimensionality reduction. However, in typical real applications, supervised information in multiple source tasks may be available , while the data of the target task are unlabeled. An interesting problem of(More)
—To achieve required sensing coverage for a very long period of time is an important and challenging problem in sensor network design. Recently, Tong et al. have proposed a node replacement and reclamation (NRR) strategy, and designed an adaptive rendezvous-based two-tier scheduling (ARTS) scheme. However, the ARTS scheme only considers point coverage but(More)
Transfer learning provides a solution in real applications of how to learn a target task where a large amount of auxiliary data from source domains are given. Despite numerous research studies on this topic, few of them have a solid theoretical framework and are parameter-free. In this paper, we propose an Extended Minimum Description Length Principle(More)
—The overlay-based network architecture has been recognized as an effective way to deal with the funneling effect in sensor networks, where sensors closer to the sink are usually responsible for relaying more network traffic. Such funneling effect is particularly harmful when the number of sensors in the network is vast. In an overlay-based sensor network,(More)
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources. Therefore, once an intruder is identified, it should be(More)
Troubleshooting search system aims at extracting relevant information to solve the problem at hand. It is often the case that documents in troubleshooting system includes an abundant amount of domain-specic categories. However, the useful information about the domain-specic categories, such as relationship between words and categories and relationship(More)
Sequences are reported for portions of two mitochondrial genes from a domestic horse and a plains zebra and compared to those published for a quagga and a mountain zebra. The extinct quagga and plains zebra sequences are identical at all silent sites, whereas the horse sequence differs from both of them by 11 silent substitutions. Postmortem changes in(More)