\select@language {brazil}
\contentsline {chapter}{Resumo}{iii}{chapter*.2}
\contentsline {chapter}{Abstract}{v}{chapter*.3}
\contentsline {chapter}{Lista de Figuras}{xii}{chapter*.5}
\contentsline {chapter}{Lista de Tabelas}{xiii}{chapter*.6}
\contentsline {chapter}{Gloss\'ario}{xv}{section*.7}
\contentsline {chapter}{\numberline {1}Introdu\c c\~ao}{1}{chapter.1}
\contentsline {section}{\numberline {1.1}Objetivos}{4}{section.1.1}
\contentsline {section}{\numberline {1.2}Contribui\c c\~oes}{4}{section.1.2}
\contentsline {section}{\numberline {1.3}Organiza\c c\~ao}{5}{section.1.3}
\contentsline {chapter}{\numberline {2}Conceitos }{7}{chapter.2}
\contentsline {section}{\numberline {2.1}Redes de Sensores Sem Fio}{7}{section.2.1}
\contentsline {subsection}{\numberline {2.1.1}Caracter\IeC {\'\i }sticas}{10}{subsection.2.1.1}
\contentsline {subsection}{\numberline {2.1.2}Classifica\c c\~ao}{11}{subsection.2.1.2}
\contentsline {section}{\numberline {2.2}Modelos de Armazenamento}{12}{section.2.2}
\contentsline {subsection}{\numberline {2.2.1}Local}{13}{subsection.2.2.1}
\contentsline {subsection}{\numberline {2.2.2}Centrado em Dados}{14}{subsection.2.2.2}
\contentsline {subsection}{\numberline {2.2.3}Externo}{14}{subsection.2.2.3}
\contentsline {subsection}{\numberline {2.2.4}Resumo}{15}{subsection.2.2.4}
\contentsline {section}{\numberline {2.3}Pol\IeC {\'\i }ticas}{15}{section.2.3}
\contentsline {subsection}{\numberline {2.3.1}Classifica\c c\~ao}{18}{subsection.2.3.1}
\contentsline {section}{\numberline {2.4}Sum\'ario}{19}{section.2.4}
\contentsline {chapter}{\numberline {3}Trabalhos Relacionados}{21}{chapter.3}
\contentsline {section}{\numberline {3.1}Sistemas de Armazenamento}{21}{section.3.1}
\contentsline {subsection}{\numberline {3.1.1}CAG}{21}{subsection.3.1.1}
\contentsline {subsection}{\numberline {3.1.2}GHT}{22}{subsection.3.1.2}
\contentsline {subsection}{\numberline {3.1.3}HDMST}{24}{subsection.3.1.3}
\contentsline {subsection}{\numberline {3.1.4}DACS}{25}{subsection.3.1.4}
\contentsline {subsection}{\numberline {3.1.5}SCOOP}{26}{subsection.3.1.5}
\contentsline {subsection}{\numberline {3.1.6}Discuss\~ao sobre os Sistemas de Armazenamento}{29}{subsection.3.1.6}
\contentsline {section}{\numberline {3.2}Pol\IeC {\'\i }ticas para RSSFs}{31}{section.3.2}
\contentsline {subsection}{\numberline {3.2.1}SRM}{32}{subsection.3.2.1}
\contentsline {subsection}{\numberline {3.2.2}PARAW}{33}{subsection.3.2.2}
\contentsline {subsection}{\numberline {3.2.3}PTSN}{34}{subsection.3.2.3}
\contentsline {subsection}{\numberline {3.2.4}CaPI}{36}{subsection.3.2.4}
\contentsline {subsection}{\numberline {3.2.5}Discuss\~ao sobre os Sistemas baseados em Pol\IeC {\'\i }ticas}{38}{subsection.3.2.5}
\contentsline {section}{\numberline {3.3}Sum\'ario}{38}{section.3.3}
\contentsline {chapter}{\numberline {4}DYSTO}{39}{chapter.4}
\contentsline {section}{\numberline {4.1}Asser\c c\~oes}{40}{section.4.1}
\contentsline {section}{\numberline {4.2}Modelo de Rede}{41}{section.4.2}
\contentsline {section}{\numberline {4.3}Etapas do Sistema}{43}{section.4.3}
\contentsline {subsection}{\numberline {4.3.1}Leitura de Dados de Sensoreamento}{43}{subsection.4.3.1}
\contentsline {subsection}{\numberline {4.3.2}Gera\c c\~ao e envio de mensagens de Sum\'ario}{44}{subsection.4.3.2}
\contentsline {subsection}{\numberline {4.3.3}Piggybacking de mensagens de Sum\'ario}{45}{subsection.4.3.3}
\contentsline {subsection}{\numberline {4.3.4}C\'alculo e Distribui\c c\~ao do \gls {ia}}{46}{subsection.4.3.4}
\contentsline {subsection}{\numberline {4.3.5}Mensagens de Dados}{49}{subsection.4.3.5}
\contentsline {subsection}{\numberline {4.3.6}Mensagens de Consultas}{49}{subsection.4.3.6}
\contentsline {section}{\numberline {4.4}Experimentos}{49}{section.4.4}
\contentsline {subsection}{\numberline {4.4.1}Configura\c c\~oes de Simula\c c\~ao}{51}{subsection.4.4.1}
\contentsline {subsection}{\numberline {4.4.2}Experimento 1: Co-ocorr\^encias}{52}{subsection.4.4.2}
\contentsline {subsection}{\numberline {4.4.3}Experimento 2: \textit {Threshold} de Dados $Th_d$}{54}{subsection.4.4.3}
\contentsline {subsection}{\numberline {4.4.4}Experimento 3: \textit {Threshold} de Histograma $Th_h$}{56}{subsection.4.4.4}
\contentsline {subsection}{\numberline {4.4.5}Experimento 4: \textit {Piggybacking}}{58}{subsection.4.4.5}
\contentsline {subsection}{\numberline {4.4.6}Experimento 5: Geral}{59}{subsection.4.4.6}
\contentsline {section}{\numberline {4.5}Conclus\~ao}{60}{section.4.5}
\contentsline {chapter}{\numberline {5}DYSTOPOL}{61}{chapter.5}
\contentsline {section}{\numberline {5.1}Modelo de Rede}{61}{section.5.1}
\contentsline {section}{\numberline {5.2}Defini\c c\~ao de Pol\IeC {\'\i }ticas}{62}{section.5.2}
\contentsline {subsection}{\numberline {5.2.1}Condi\c c\~ao}{63}{subsection.5.2.1}
\contentsline {subsection}{\numberline {5.2.2}A\c c\~ao}{64}{subsection.5.2.2}
\contentsline {subsection}{\numberline {5.2.3}Dom\IeC {\'\i }nio}{65}{subsection.5.2.3}
\contentsline {subsection}{\numberline {5.2.4}Sujeito}{65}{subsection.5.2.4}
\contentsline {section}{\numberline {5.3}Arquitetura}{65}{section.5.3}
\contentsline {subsection}{\numberline {5.3.1}Tipos de Mensagens}{67}{subsection.5.3.1}
\contentsline {section}{\numberline {5.4}Experimentos}{68}{section.5.4}
\contentsline {subsection}{\numberline {5.4.1}Configura\c c\~oes de Simula\c c\~ao}{68}{subsection.5.4.1}
\contentsline {subsection}{\numberline {5.4.2}Experimento 1: DYSTO VS DYSTOPOL}{68}{subsection.5.4.2}
\contentsline {subsection}{\numberline {5.4.3}Experimento 2: Dynamic Thresholds}{70}{subsection.5.4.3}
\contentsline {subsection}{\numberline {5.4.4}Experimento 3: Mensagens de Alerta}{71}{subsection.5.4.4}
\contentsline {section}{\numberline {5.5}Conclus\~ao}{72}{section.5.5}
\contentsline {chapter}{\numberline {6}Conclus\~oes}{75}{chapter.6}
\contentsline {section}{\numberline {6.1}Trabalhos Futuros}{76}{section.6.1}
\contentsline {chapter}{\numberline {7}Ap\^endice I}{79}{chapter.7}
\contentsline {chapter}{Refer\^encias Bibliogr\'aficas}{85}{chapter*.54}
