{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:46:50Z","timestamp":1762004810437,"version":"3.41.0"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2016,5,23]],"date-time":"2016-05-23T00:00:00Z","timestamp":1463961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2016,7,21]]},"abstract":"<jats:p>With limited battery supply, power is a scarce commodity in wireless sensor networks. Thus, to prolong the lifetime of the network, it is imperative that the sensor resources are managed effectively. This task is particularly challenging in heterogeneous sensor networks for which decisions and compromises regarding sensing strategies are to be made under time and resource constraints. In such networks, a sensor has to reason about its current state to take actions that are deemed appropriate with respect to its mission, its energy reserve, and the survivability of the overall network. Sensor Management controls and coordinates the use of the sensory suites in a manner that maximizes the success rate of the system in achieving its missions. This article focuses on formulating and developing an autonomous energy-aware sensor management system that strives to achieve network objectives while maximizing its lifetime. A team-theoretic formulation based on the Belief-Desire-Intention (BDI) model and the Joint Intention theory is proposed as a mechanism for effective and energy-aware collaborative decision-making. The proposed system models the collective behavior of the sensor nodes using the Joint Intention theory to enhance sensors\u2019 collaboration and success rate. Moreover, the BDI modeling of the sensor operation and reasoning allows a sensor node to adapt to the environment dynamics, situation-criticality level, and availability of its own resources. The simulation scenario selected in this work is the surveillance of the Waterloo International Airport. Various experiments are conducted to investigate the effect of varying the network size, number of threats, threat agility, environment dynamism, as well as tracking quality and energy consumption, on the performance of the proposed system. The experimental results demonstrate the merits of the proposed approach compared to the state-of-the-art centralized approach adapted from Atia et al. [2011] and the localized approach in Hilal and Basir [2015] in terms of energy consumption, adaptability, and network lifetime. The results show that the proposed approach has 12 \u00d7 less energy consumption than that of the popular centralized approach.<\/jats:p>","DOI":"10.1145\/2910574","type":"journal-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T21:47:58Z","timestamp":1464126478000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Collaborative Energy-Aware Sensor Management System Using Team Theory"],"prefix":"10.1145","volume":"15","author":[{"given":"Allaa R.","family":"Hilal","sequence":"first","affiliation":[{"name":"University of Waterloo, ON, Canada"}]},{"given":"Otman","family":"Basir","sequence":"additional","affiliation":[{"name":"University of Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2016,5,23]]},"reference":[{"volume-title":"Sensor Neyworks: Where Theory Meets Practice","author":"Akselrod D.","key":"e_1_2_1_1_1"},{"volume-title":"Proceedings of the IEEE International Conference on SMC. 157--164","author":"Akselrod D.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.06.003"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2160055"},{"key":"e_1_2_1_5_1","unstructured":"Michael Bratman. 1987. Intention Plans and Practical Reason. Center for the Study of Language and Information.  Michael Bratman. 1987. Intention Plans and Practical Reason. Center for the Study of Language and Information."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024133006761"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6710069"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2008.928590"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3182\/20091006-3-US-4006.00011"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2159496"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2046896"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Charu Gandhi and Vivek Arya. 2014. A survey of energy-aware routing protocols and mechanisms for mobile ad hoc networks. Intelligent Computing Networking and Informatics: Proceedings of the International Conference on Advanced Computing Networking and Informatics Durga Prasad Mohapatra and Srikanta Patnaik (Eds.). Vol. 243. Springer India New Delhi 111--117. http:\/\/dx.doi.org\/10.1007\/978-81-322-1665-0_11.  Charu Gandhi and Vivek Arya. 2014. A survey of energy-aware routing protocols and mechanisms for mobile ad hoc networks. Intelligent Computing Networking and Informatics: Proceedings of the International Conference on Advanced Computing Networking and Informatics Durga Prasad Mohapatra and Srikanta Patnaik (Eds.). Vol. 243. Springer India New Delhi 111--117. http:\/\/dx.doi.org\/10.1007\/978-81-322-1665-0_11.","DOI":"10.1007\/978-81-322-1665-0_11"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138128"},{"key":"e_1_2_1_14_1","unstructured":"Allaa Hilal. 2013. An Intelligent Sensor Management Framework for Pervasive Surveillance. Ph.D. Dissertation. University of Waterloo Waterloo ON.  Allaa Hilal. 2013. An Intelligent Sensor Management Framework for Pervasive Surveillance. Ph.D. Dissertation. University of Waterloo Waterloo ON."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2334071"},{"key":"e_1_2_1_16_1","unstructured":"Allaa R. Hilal and Otman A. Basir. 2013. Pervasive Surveillance System Management. CRC Press Boca Raton FL 199--228.  Allaa R. Hilal and Otman A. Basir. 2013. Pervasive Surveillance System Management. CRC Press Boca Raton FL 199--228."},{"volume-title":"Computing and Communications Conference (IPCCC\u201908)","year":"2008","author":"Hilal Allaa R.","key":"e_1_2_1_17_1"},{"volume-title":"HASM: A hybrid architecture for sensor management in a distributed surveillance context","year":"2011","author":"Hilal Allaa R.","key":"e_1_2_1_18_1"},{"volume-title":"Proceedings of the IEEE International Systems Conference. 361--366","author":"Hilal Allaa R.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAN.2011.5778820"},{"volume-title":"Retrieved","year":"2015","key":"e_1_2_1_21_1"},{"volume-title":"Proceedings of the American Control Conference. 4934--4940","author":"Jenkins K. L.","key":"e_1_2_1_22_1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)00020-2"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2008.10.037"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/3468.553230"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2058098"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.893905"},{"volume-title":"Proceedings of the SPIE International Society for Optical Engineering. 1--11","author":"Mark","key":"e_1_2_1_28_1"},{"volume-title":"Proceedings of the SPIE, Detection and Sensing of Mines, Explosive Objects, and Obscured Targets. 1--12","author":"Mark","key":"e_1_2_1_29_1"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2004.12.008"},{"volume-title":"Proceedings of the IEEE Conference on Acoustics, Speech, and Signal Processing","author":"Kreucher C.","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.893247"},{"volume":"5820","volume-title":"Proceedings of the SPIE Defense Transformation and Network-Centric Systems Symposium","author":"Kreucher C.","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.897908"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2008.2000980"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2006818"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2007.05.004"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2014168"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/724597"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.06.I9P0319"},{"volume-title":"Communnications and Photonics Conference (SIECPC\u201911)","year":"2011","author":"Nazir Babar","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/11550648_8"},{"volume-title":"Retrieved","year":"2008","author":"Pokahr Alexander","key":"e_1_2_1_43_1"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2014.6734874"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.090210.091119"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2010.5706776"},{"volume-title":"Proceedings of the 2nd International Conference on Principles of Knowledge Representation and Reasoning. 473--484","author":"Rao A.","key":"e_1_2_1_47_1"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.03.027"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.3390\/s140202822"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2010.01.001"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2679"},{"key":"e_1_2_1_52_1","unstructured":"Mehdi Shajari and Ali A. Ghorbani. 2004. Application of belief-desire-intention agents in intrusion detection and response. In PST. Citeseer 181--191.  Mehdi Shajari and Ali A. Ghorbani. 2004. Application of belief-desire-intention agents in intrusion detection and response. In PST. Citeseer 181--191."},{"key":"e_1_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Kei-Chen Tung Jonathan Lu and Hsin-Hung Lin. 2010. A distributed sleep scheduling algorithm with range adjustment for wireless sensor networks. Computational Collective Intelligence. Technologies and Applications 387--397.   Kei-Chen Tung Jonathan Lu and Hsin-Hung Lin. 2010. A distributed sleep scheduling algorithm with range adjustment for wireless sensor networks. Computational Collective Intelligence. Technologies and Applications 387--397.","DOI":"10.1007\/978-3-642-16696-9_42"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292826"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.896099"},{"key":"e_1_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Michael Wooldridge and Michael Fisher. 1994. A decision procedure for a temporal belief logic. Temporal Logic 317--331.   Michael Wooldridge and Michael Fisher. 1994. A decision procedure for a temporal belief logic. Temporal Logic 317--331.","DOI":"10.1007\/BFb0013996"},{"key":"e_1_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Michael Wooldridge and Nicholas Jennings. 1996. Towards a theory of cooperative problem solving. Distributed Software Agents and Applications 40--53.  Michael Wooldridge and Nicholas Jennings. 1996. Towards a theory of cooperative problem solving. Distributed Software Agents and Applications 40--53.","DOI":"10.1007\/3-540-61157-6_20"},{"volume-title":"Proceedings of the 2004 IEEE International Conference on Mobile Data Management. IEEE, 346--357","year":"2004","author":"Xu Yingqi","key":"e_1_2_1_58_1"},{"key":"e_1_2_1_60_1","unstructured":"Feng Zhao and Leonidas Guibas. 2004. Wireless Sensor Networks: An Information Processing Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann San Francisco CA.   Feng Zhao and Leonidas Guibas. 2004. Wireless Sensor Networks: An Information Processing Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann San Francisco CA."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2011.31003"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2910574","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2910574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:09Z","timestamp":1750221549000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2910574"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,23]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,7,21]]}},"alternative-id":["10.1145\/2910574"],"URL":"https:\/\/doi.org\/10.1145\/2910574","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2016,5,23]]},"assertion":[{"value":"2014-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}