<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Location-Aware JADE Agents in Indoor Scenarios</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stefania Monica</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Parma</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Italy Email:</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>stefania.monica</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>federico.bergenti}@unipr.it</string-name>
        </contrib>
      </contrib-group>
      <fpage>17</fpage>
      <lpage>19</lpage>
      <abstract>
        <p>-This paper presents a novel JADE add-on that enables the implementation of location-aware agents by interfacing an underlying ranging technology which provides accurate distance measures both indoor and outdoor. First, the paper motivates the work and it presents the features and the architecture of the add-on. Then, the paper provides a detailed description of the implemented localization algorithms and it validates them in an indoor scenario. The experimental results show that accurate indoor localization can be achieved and that the presented addon can be used to support location-aware agents with sufficient accuracy for targeted educational and ludic applications.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>I. INTRODUCTION</p>
      <p>The use of software agents on mobile devices dates back
to first cellular telephone prototypes capable of running Java
applications, and JADE was one of the first tools that enabled
FIPA agents on devices that were then called Java-enabled
phones [1]. We used to call them nomadic agents [2] at the
time—to make a clear distinction with then popular mobile
agents—and they were considered one of the most promising
applications of agent technology. More recently, the porting
of JADE to Android devices [3], and the widespread adoption
of JADE and related technologies in crucial parts of
largescale networks [4], revitalized the idea of having FIPA agents
on mobile appliances to support large communities of users
in their daily activities, which include both collaborative (see,
e.g., [5], [6]) and competitive tasks (see, e.g., [7], [8]). Notably,
the appliances of today offer much more resources than
first Java-enabled phones, and the challenge of implementing
agents for mobile devices is no longer about fitting complex
software into constrained-resource devices; rather, it is about
interfacing agents with the physical world they live in to
ensure that user can be provided with contextualized services.
This paper tackles the problem of interfacing agents with
the physical world by presenting a novel software module
which can be used to develop JADE agents that can sense
the presence of nearby localization beacons or agents, both in
outdoor and indoor scenarios. We prototyped such a module
as a conventional JADE add-on which uses Ultra Wide Band
(UWB) signals (see, e.g., [9]) to measure the distances between
the appliance where the agent is running and target beacons
or other appliances.</p>
      <p>
        The acronym UWB was first used by the US Department
of Defense in late ’80s and it became popular after the
Federal Communications Commission allowed the unlicensed
use o
        <xref ref-type="bibr" rid="ref7">f UWB devices in February 2002</xref>
        under specific emission
constraints [10]. In 2004, IEEE established standardization
group IEEE 802.15.4a with the aim of defining a new physical
layer for the already existing IEEE 802.15.4 standard for
Wireless Personal Area Networ
        <xref ref-type="bibr" rid="ref27">ks (WPANs). In 2007</xref>
        the new
IEEE 802.15.4a standard was finally completed and since then
it provides a standardized physical layer for short-range, low
data rate communications, and for high-precision ranging using
low-power devices [11].
      </p>
      <p>The use of UWB signals is particularly promising for
high-precision localization because it ensures high ranging
accuracy. As a matter of fact, due to their large bandwidth,
UWB signals are characterized by very short duration pulses—
usually in the order of one nanosecond—which guarantee
accurate Time of Flight (ToF) estimation for signals traveling
between nodes. This implies that the distance between a
transmitter and a receiver can be accurately determined, yielding
high ranging accuracy. At the opposite, pulses received via
multiple paths using conventional narrow-band signals can
easily overlap, causing wrong ToF estimates, hence wrong
range estimates [11]. Besides their short pulses, UWB
signals are also characterized by low duty cycle which leads
to low energy consumption. Moreover, since UWB signals
occupy a large portion of the spectrum, in order to avoid
interference problems with other devices operating in the
same frequency spectrum, UWB systems normally use
lowpower transmissions. Finally, UWB signals are characterized
by their capability of penetrating through obstacles thanks to
the large frequency spectrum that characterizes them (which
includes low-frequency components as well as high-frequency
ones) [12]. Such a feature is particularly interesting in indoor
environments where the presence of walls and objects can
cause Non-Line-of-Sight (NLoS) effects between sensors.</p>
      <p>
        Such unique aspects make UWB technology a good
candidate for accurate and low-power positioning systems. One
of the main drawbacks that caused the slow adoption of
UWB technology for accurate indoor localization was that
UWB transceivers were normally very expensive because of
the intrinsic challenges that their design and construction
involve, which also include high frequency logics for
measuring very short delay
        <xref ref-type="bibr" rid="ref15 ref23 ref24">s. Only recently, in 2013</xref>
        , a company
named BeSpoon (www.bespoon.com) started producing add-on
modules for smartphones integrating an UWB transceiver and
an antenna at a price compatible with the consumers’ demands.
They also provide a smartphone, called spoonphone, which
natively accommodates the UWB module and which provides
needed drivers for Android. This makes the development of
accurate ranging techniques attractive also for general-purpose
technologies, like JADE, which are not intended to tackle the
issues of interfacing with proprietary, and expensive, hardware.
      </p>
      <p>This paper is organized as follows. Section II describes
the architecture of the add-on and it details the implemented
localization algorithms. Section III describes the experimental
campaign that we performed to validate the usability of the
proposed approach. Section IV concludes the paper.
be found according to simple geometric considerations. As
a matter of fact, the TN lies on each of the circumferences</p>
      <p>M M M
{Ci}i=1, centered in {si}i=1 with radii {ri}i=1 and, therefore,
its coordinates satisfy the following system of equations
 (x − x1)2 + (y − y1)2 = r1</p>
      <p>2


 (x − xM )2 + (y − yM )2 = rM2 .
(4)</p>
      <p>DISTANCE- AND POSITION-AWARE JADE AGENTS
The presented add-on for JADE uses the tools and
techniques that JADE provides to integrate an underlying ranging
technology, like UWB signaling, with the common agent loop.
In details, it provides two customizable JADE behaviours that
can be used to access the services of the add-on.</p>
      <p>The first behaviour, called RangeChangeBehaviour,
is in charge of connecting with the underlying ranging
technology to measure the distances with targeted beacons or
smart appliances. The behaviour can accommodate any ranging
technology, provided that an implementation of a specific
interface is available. In the presented prototype we opt for an
implementation that we developed using BeSpoon APIs which
acquires real-time information from the UWB transceiver
installed in a spoonphone. The RangeChangeBehaviour
is scheduled when an above-threshold change in the distances
from selected beacons or smart appliances occurs, or when
the agent decides to change the set of devices that it monitors.
In details, the implemented prototype uses hardware-specific
unique identifiers associated with transceivers that allow
targeting beacons and smart appliances indifferently. This way the
agent developer is free to track beacons and smart appliances
with a single, generic mechanism.</p>
      <p>The second behaviour that ships with the add-on is called
LocationChangeBehaviour and it uses the first
behaviour to acquire needed ranging information to inform an
agent about its current location in a predefined reference
frame. The behaviour can be configured to acquire needed
information for performing localization from a set of beacons,
commonly known as Anchor Nodes (ANs), and its main duty
is to invoke a pluggable localization algorithm to estimate the
location of the agent every time the distances from ANs change
significantly. The developer is free to implement custom
localization algorithms but the add-on contains two general-purpose
algorithms that can be used if no additional information besides
the distance from a fixed number of ANs is available. Such
algorithms are discussed in details below.</p>
      <p>For the sake of simplicity, the implemented localization
algorithms currently consider only a bi-dimensional scenario,
i.e., they assume that all the nodes lay on the same plane.
The same algorithms can be extended to the case of a
threedimensional scenario (e.g., see [13]). Both implemented
localization algorithms are based on the ToF between some nodes
with known positions, the ANs, and the Target Node (TN),
whose position is to be estimated.</p>
      <p>Denoting as M the number of ANs, we indicate the
coordinates of the ANs as
si = [xi, yi]T
i ∈ {1, . . . , M }.</p>
      <p>(1)
The (unknown) TN position and its estimate are denoted as
u = [x, y]T and uˆ = [xˆ, yˆ]T , respectively. Moreover, the true
and the estimated distances between the i−th AN and the TN
are denoted as
ri , ||u − si|| =
rˆi , ||uˆ − si|| =
q
q
(u − si)T (u − si)
(uˆ − si)T (uˆ − si)
i ∈ {1, . . . , M }
i ∈ {1, . . . , M }.</p>
      <p>Observe that if the coordinates of the ANs and the true
distances {ri}iM=1 are known, the true position of the TN can</p>
      <p>Since the true distances are unknown, we can only rely on
ˆ M
their estimates {rˆi}iM=1. The circumferences {Ci}i=1 centered</p>
      <p>M M
in {si}i=1 with radii {rˆi}i=1 lead to the system of equations
 (x − x1)2 + (y − y1)2 = rˆ1</p>
      <p>2


 (x − xM )2 + (y − yM )2 = rˆM2 .</p>
      <p>Obviously, due to the errors that affect the range estimates
ˆ M
{rˆi}iM=1, the circumferences {Ci}i=1 would hardly intersect
in a unique point, hence proper localization algorithms need
to be used. For such algorithms we assume that the errors
M
which affect the range measurements {rˆi}i=1 can be modeled
as independent additive random variables {νi}iM=1, namely
rˆi = ri + νi
i ∈ {1, . . . , M }.</p>
      <p>Let us define as ν the vector whose i−th element is νi and let
us denote as Q its covariance matrix.</p>
      <p>Many range-based localization algorithms have been
proposed in the literature, and they can be broadly classified
into passive and active [14]. Passive localization relies on
the fact that wireless communications strongly depend on the
environment and it is based on the analysis of the scattering
caused by obstacles found along signal propagation and/or of
the variance of a measured signal. Such analysis allows finding
changes in the received signals that can be used to detect and
locate targets [15].</p>
      <p>In active techniques, instead, all nodes are equipped with
sensors and with an electronic device which sends needed
information to support a proper localization algorithm. Since
all implemented algorithms follow in this category, we focus
on range-based localization with active tags, which can be
based on the ToF, the Angle of Arrival (AoA), or the
Received Signal Strength (RSS) of the signals [10]. As explained
in the introduction, we are mostly interested in ToF-based
localization algorithms because are particularly well suited
when dealing with UWB signaling. In details, if two
synchronized nodes communicate, the node receiving the signal can
determine the Time of Arrival (ToA) of the incoming signal
from the timestamp of the sending node. If the nodes are not
synchronized, Time Difference of Arrival (TDoA) techniques
can be employed, which are based on the estimation of the
difference between the arrival times of UWB signals traveling
between the TN and ANs. A large number of ToF-based
localization techniques have been proposed in the literature.
Among them, it is worth mentioning iterative methods [16],
graph-based methods [17], closed-form algorithms [18] and
optimization methods [19]. Observe that the accuracy of some
of such algorithms may strongly depend on the number of
ANs [20] and on their topology [21].</p>
      <p>In the following subsections, the two implemented
localization algorithms are described in details, namely: the
Circumference Intersection (CI) algorithm and the Two-Stage
Maximum-Likelihood (TSML) algorithm. From now on, we
assume that M = 3 ANs are used to locate the TN.
A. Circumference Intersection (CI) algorithm</p>
      <p>This subsection describes the CI localization algorithm,
which is a very intuitive algorithm that can be considered as
the basis of other more elaborate algorithms (see, e.g. [22]).</p>
      <p>In order to better explain the CI algorithm, let us make
a few geometric considerations on the considered problem.
As already observed, the position of the TN coincides with
the (unique) intersection of the three circumferences in (2).
Since such circumferences are unknown, in order to find the
TN position estimate uˆ = [xˆ, yˆ] it is necessary to consider
proper localization approaches based on the set of equations
(3). According to the CI algorithm, since the circumferences
do not intersect in a single point, we intersect pairs of them.</p>
      <p>More precisely, we define the following three sets—each of
which contains two points—obtained by intersecting the three
different pairs of circumferences</p>
      <p>I1 = {p12, q12}
I2 = {p13, q13}
I3 = {p23, q23}
,
,
,</p>
      <p>C1 ∩ Cˆ2
ˆ
C1 ∩ Cˆ3
ˆ
C2 ∩ Cˆ3.
ˆ</p>
      <p>We then choose a point from each of the three sets, namely
p1 ∈ I1, p2 ∈ I2, and p3 ∈ I3, so that the three selected points
are the nearest ones to each other. More precisely, since such
points belong to circumference intersections, it can be shown
that they can be chosen as
||p1 − p2||
||p1 − p3||
=
=
minp∈I1,q∈I2 ||p − q||
minq∈I3 ||p1 − q||.</p>
      <p>Given these three points, the TN position estimate is chosen
as their baricenter.</p>
      <p>We remark that the intersection between two
circumferences can be empty. Assume, for instance, that in (5) the
set I1 is empty, namely the circumferences Cˆ1 and Cˆ2 do not
intersect. In this case, the two nearest points of Cˆ1 and Cˆ2 are
found, and if their distance is below a given threshold, they
are considered the two intersection points and the set I1 is
redefined as the set containing such two points. Otherwise,
the TN position estimate is found based on the remaining
intersections, whenever possible.</p>
      <p>B. Two-Stage Maximum-Likelihood (TSML) algorithm</p>
      <p>This subsection describes a TSML method that uses ToA
information, hence known as TSLM-ToA method [23]. Such
method is a well-known localization algorithm, and it is
particularly interesting because it was shown that it can attain
the Cramer-Rao Lower Bound, which is a lower bound for
the variance of an estimator [24]. A detailed derivation of this
method can be found in [25].</p>
      <p>The starting point of the TSML algorithm is once again the
quadratic system (3), where we set M = 3 as in the case of the
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
Let us also introduce ω1 and h1 the vectors analogous to
ωˆ1 and to hˆ1, respectively, where estimated quantities are
substituted by true ones, namely</p>
      <p>1
where Q is the covariance matrix of the ToA range
measurements {ri}iM=1, B is a diagonal matrix whose elements are</p>
      <p>M
{ri}i=1, and the last equality follows from the fact that, from
(4) and (13), ψ can be written as
ψ1 = hˆ1 − h1 = 2B ν + ν
ν ' 2B ν
where denotes the entrywise product and the last
approximation is obtained neglecting second order perturbations.
With this choice of the weighting matrix one obtains that
Cov[ωˆ1] = (G1T W 1 G1)−1.</p>
      <p>CI algorithm. In order to solve it, a two-step approach based
on Maximum-Likelihood (ML) technique can be considered.
First, let us define as ai the Euclidean norm of the coordinate
vector of the i−th AN, namely
ai , ||si|| =
q
xi2 + yi2
i ∈ {1, . . . , 3}.</p>
      <p>Moreover, let us introduce the new variable
so that system (3) can be rewritten, in matrix notation, as
where
nˆ , ||uˆ||2 = xˆ2 + yˆ2</p>
      <p>G1 ωˆ1 = hˆ1
 x1
G1 = −2  ...</p>
      <p> xˆ 
ωˆ1 =  yˆ 
nˆ</p>
      <p>x3
 x 
ω1 =  y 
n</p>
      <p>While (12) might look like a linear system, it is not, since
the third element of the solution vector ωˆ1 depends on the
first two according to (11). The solution ωˆ1 of the system (12)
can be determined through an ML approach. In particular, as
suggested in [18], let us define the error vector
Given a positive definite matrix W 1, the weighted Least Square
(LS) solution of (12) that minimizes ψ1T W 1ψ1 is</p>
      <p>ωˆ1 = (G1T W 1 G1)−1G1T W 1 hˆ1.</p>
      <p>The simplest choice of the weighting matrix W 1 is the identity
matrix. In [25] it is shown that the choice of W 1 which
minimizes the variance of ωˆ1 is</p>
      <p>W 1 , Cov[ψ1]−1 = (4B Q B)−1
(5)
(6)
(7)
(8)
(9)
1.2
1.1
7
6
5
4
2
1
0</p>
      <p>The second stage of the algorithm is meant to take into
account the dependence of nˆ on the other elements of the
unknown vector in the system of equations (12) and it involves
the solution of the system
with [ωˆ1]j denoting the j−th component of ωˆ1. The linear
system (19) can be solved, once again, through the ML
technique. Defining the error vector
ψ2 , hˆ2 − G ω
2 2
the weighted LS solution of (19) that minimizes the weighted
norm of ψ2 with a positive definite matrix W 2 is
ωˆ2 = (G2T W 2 G2)−1G2T W 2 hˆ2.</p>
      <p>As considered to solve (12), the simplest choice of the
weighting matrix W 2 is the identity matrix. In [25], it is shown that
the choice of W 2 which minimizes the variance of ωˆ2 is</p>
      <p>W 2 , Cov[ψ2]−1 = (4B2 Cov[ωˆ1] B2)−1
where B2 = diag(x, y, 0.5). Finally, the position estimate can
be expressed as
uˆ = U hp[ωˆ2]1, p[ωˆ2]2
iT
where U = diag(sign(ωˆ1)).</p>
      <p>III. EXPERIMENTAL SETUP AND RESULTS</p>
      <p>This section shows localization results obtained with the
two implemented algorithms, as described in the previous
section, using a JADE agent running on a spoonphone used as
TN. We use three localization beacons as ANs and we put them
at three corners of a rectangular room whose sides measures
(19)
(20)
(21)
(22)
(23)
(24)
0.9 1 1.1 1.2 0.9 1 1.1 1.2
x [m] x [m]
(a) (b)
Fig. 2. The 1000 position estimates of TN1 obtained using: (a) the CI
algorithm; and (b) the TSML algorithm.
3 m and 6 m. Using the same notation introduced in Section
II, the ANs position in the experimental setup are denoted as
s1 = [0, 0]T
s2 = [3, 0]T
s3 = [0, 6]T
(25)
where the coordinates are expressed in meters. In Fig. 1 the
ANs positions are shown (blue stars) in the considered room.</p>
      <p>Inside the same room, we consider three different TN
positions, denoted as red stars in Fig. 1. First, we put the TN
in the points whose coordinates, expressed in meters, are
Observe that this point, denoted as TN1 in Fig. 1, is close to
one of the corners of the room and close to AN1. The second
TN position we consider is
which corresponds to the point in the middle of the room,
denoted as TN2 in Fig. 1. Finally, the coordinates of the last
TN position, expressed in meters, are
u1 = [1, 1]T .
u2 = [1.5, 3]T
u3 = [2, 5]T .</p>
      <p>Observe that this point is symmetric of u1 with respect to the
center of the room.</p>
      <p>For each TN position {TNi}i3=1, we first acquire the three
distance estimates between the TN and the three ANs and
we use such distances to feed the two localization algorithms
described in Section II. This process is iterated NI = 1000
times, thus obtaining 1000 position estimates for each of the
two localization algorithms and for each TN position. For each
iteration j ∈ {1, . . . , NI } we define the distance between the
true TN position and its estimate in the j-th iteration as
dj = ||uˆj − u||
where uˆj is the TN position estimate in the j-th iteration.
(26)
(27)
(28)
(29)</p>
      <p>We can define the minimum, the maximum, and the average
distance between the true TN position and its estimates as
dmin =
dmax =
davg =</p>
      <p>min
j∈{1,...,NI }</p>
      <p>max
j∈{1,...,NI }
1 XNI dj .</p>
      <p>NI j=1
dj
dj
(30)
The performance of the localization algorithms is evaluated in
terms of the values in (30).</p>
      <p>Fig. 2 is relative to the position estimates of the target TN1
of Fig. 1. More precisely, Fig. 2 (a) shows the 1000 position
estimates obtained using the CI algorithm and Fig. 2 (b) shows
the 1000 position estimates obtained according to the TSML
algorithm. A comparison between Fig. 2 (a) and Fig. 2 (b)
shows that the CI algorithm performs slightly better that the
TSML algorithm in terms of the distance between the true
position and the estimated ones. As a matter of fact, from
Table I it can be observed that while the average distance
davg when using the CI algorithm is 5.7 cm, the value of
davg obtained with the TSML algorithm is 7.2 cm. Analogous
considerations hold when considering dmin and dmax. More
precisely, the value of dmin relative to the CI algorithm is
only 0.03 cm and it becomes 1.4 cm when using the TSML
algorithm, while the values of dmax correspond to 12.2 cm
and 13.8 cm, respectively.</p>
      <p>Fig. 3 refers to the position estimates of the target TN2
of Fig. 1, corresponding to the case where the TN is in the
middle of the room. The 1000 position estimates obtained
using the CI algorithm are shown in Fig. 3 (a) while Fig. 2 (b)
shows the 1000 position estimates obtained with the TSML
algorithm. In this case, the performance of the two algorithms
are similar, as also shown in Table I, which shows that the
values of davg obtained with the CI and the TSML algorithms
differ by only 2 mm. Observe that in this case the values of
davg are greater than those obtained when considering TN1,
meaning that the localization in the center of the room is less
accurate. In particular, Table I shows that the distances between</p>
      <p>Finally, Fig. 4 is relative to the position estimates of the
target TN3 of Fig. 1 obtained: (a) using the CI algorithm;
and (b) using the TSML algorithm. In this case, the average
distance davg between the true TN position and its estimates
is 11.5 cm when using the CI algorithm and 12.2 cm with the
TSML algorithm, as shown in Table I. The performance of
the two algorithms are similar also in terms of dmin and dmax.
Observe that the values of dmax are greater than those obtained
in the previous two TN positions. The values of dmin, instead,
are greater than those relative to TN1 but they are smaller than
those relative to TN2.</p>
      <p>This paper presents a novel JADE add-on that enables the
implementation of distance- and location-aware agents. Using
this add-on an agent can measure the distance that separates
the smart appliance that hosts it from target beacons and other
smart appliances. Experimental results summarized in Table I
show that the average error in locating the smart appliance in
an empty room is less than 15 cm, which ensures sufficient
accuracy for considered education and ludic applications.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <source>Cooperative Information Systems</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>34</issue>
          , pp.
          <fpage>231</fpage>
          -
          <lpage>244</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Poggi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Burg</surname>
          </string-name>
          , and G. Caire, “
          <article-title>Deploying FIPAcompliant systems on handheld devices,” IEEE Internet Computing</article-title>
          , vol.
          <volume>5</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>20</fpage>
          -
          <lpage>25</lpage>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          , G. Caire, and
          <string-name>
            <given-names>D.</given-names>
            <surname>Gotta</surname>
          </string-name>
          ,
          <string-name>
            <surname>A“</surname>
          </string-name>
          <article-title>gents on the move: JADE for Android devices</article-title>
          ,” in Procs. Workshop From Objects to Agents,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          , G. Caire, and
          <string-name>
            <given-names>D.</given-names>
            <surname>Gotta</surname>
          </string-name>
          , “
          <article-title>Large-scale network and service management with WANTS,” in Industrial Agents: Emerging Applications of Software Agents in Industry</article-title>
          . Elsevier,
          <year>2015</year>
          , pp.
          <fpage>231</fpage>
          -
          <lpage>246</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Poggi</surname>
          </string-name>
          ,
          <article-title>A“gent-based approach to manage negotiation protocols in flexible CSCW systems</article-title>
          ,” in Procs.
          <source>4th Intl Conf.</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>Autonomous</given-names>
            <surname>Agents</surname>
          </string-name>
          ,
          <year>2000</year>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>268</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Poggi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Somacher</surname>
          </string-name>
          ,
          <article-title>A“ collaborative platform for fixed and mobile networks,” Communications of the ACM</article-title>
          , vol.
          <volume>45</volume>
          , no.
          <issue>11</issue>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>44</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          , G. Caire, and
          <string-name>
            <given-names>D.</given-names>
            <surname>Gotta</surname>
          </string-name>
          ,
          <string-name>
            <surname>A“</surname>
          </string-name>
          <article-title>n overview of the AMUSE social gaming platform</article-title>
          ,” in Procs. Workshop From Objects to Agents,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          , G. Caire, and
          <string-name>
            <given-names>D.</given-names>
            <surname>Gotta</surname>
          </string-name>
          ,
          <article-title>A“gent-based social gaming with AMUSE,” in Procs</article-title>
          . 5th
          <string-name>
            <surname>Int'l Conf</surname>
          </string-name>
          .
          <source>Ambient Systems, Networks and Technologies (ANT</source>
          <year>2014</year>
          )
          <article-title>and</article-title>
          4th
          <string-name>
            <surname>Int'l Conf</surname>
          </string-name>
          .
          <source>Sustainable Energy Information Technology (SEIT</source>
          <year>2014</year>
          )
          <article-title>, ser</article-title>
          . Procedia Computer Science.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Elsevier</surname>
          </string-name>
          ,
          <year>2014</year>
          , pp.
          <fpage>914</fpage>
          -
          <lpage>919</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Ferrari</surname>
          </string-name>
          ,
          <article-title>A“ccurate indoor localization with UWB wireless sensor networks</article-title>
          ,
          <source>” in Proceedings of the 23rd IEEE International Conference on Enabling Technologies</source>
          :
          <article-title>Infrastructure for Collaborative Enterprises (WETICE 2014), track on Capacity-Driven Processes</article-title>
          and
          <article-title>Services for the Cyber-Physical Society (CPS), Parma</article-title>
          , Italy,
          <year>June 2014</year>
          , pp.
          <fpage>287</fpage>
          -
          <lpage>289</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sahinoglu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gezici</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Guvenc</surname>
          </string-name>
          ,
          <article-title>Ultra-wideband positioning systems: Theoretical limits, ranging algorithms and protocols</article-title>
          . Cambridge, U.K.: Cambridge University Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. V.</given-names>
            <surname>Orlik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sahinoglu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Molisch</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Kinney</surname>
          </string-name>
          , “
          <article-title>UWB systems for wireless sensor networks</article-title>
          ,
          <source>” Proceedings of the IEEE</source>
          , vol.
          <volume>97</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>313</fpage>
          -
          <lpage>331</lpage>
          ,
          <year>February 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Gezici</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. V.</given-names>
            <surname>Poor</surname>
          </string-name>
          , “
          <article-title>Position estimation via Ultra-Wide-Band signals</article-title>
          ,
          <source>” Proceedings of the IEEE</source>
          , vol.
          <volume>97</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>386</fpage>
          -
          <lpage>403</lpage>
          ,
          <year>February 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and G. Ferrari, “
          <article-title>Optimized anchors placement: An analytical approach in UWB-based TDOA localization</article-title>
          ,”
          <source>in Proceedings of the 9th International Wireless Communications &amp; Mobile Computing Conference (IWCMC</source>
          <year>2013</year>
          ), Cagliari, Italy,
          <year>July 2013</year>
          , pp.
          <fpage>982</fpage>
          -
          <lpage>987</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Darabi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Banerjee</surname>
          </string-name>
          , and J. Liu, “
          <article-title>Survey of wireless indoor positioning techniques and systems</article-title>
          ,
          <source>” IEEE Transactions on Systems, Man, and Cybernetics</source>
          , Part C:
          <article-title>Applications</article-title>
          and Reviews, vol.
          <volume>37</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>1067</fpage>
          -
          <lpage>1080</lpage>
          ,
          <year>November 2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <source>[15] [16] [17] [18] [19] [20] [21] [22] [23]</source>
          [24]
          <string-name>
            <given-names>D.</given-names>
            <surname>Dardari and R. D'Errico</surname>
          </string-name>
          , “
          <article-title>Passive ultrawide bandwidth RFID,”</article-title>
          <source>in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '08)</source>
          , New Orleans, LA,
          <year>December 2008</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Mensing</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Plass</surname>
          </string-name>
          , “
          <article-title>Positioning algorithms for cellular networks using TDOA,”</article-title>
          <source>in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP</source>
          <year>2006</year>
          ), Toulouse, France, May
          <year>2006</year>
          , pp.
          <fpage>513</fpage>
          -
          <lpage>516</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Chenshu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Tao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yiyang</surname>
          </string-name>
          , G. Wei, and
          <string-name>
            <given-names>L.</given-names>
            <surname>Yunhao</surname>
          </string-name>
          , “
          <article-title>Detecting outlier measurements based on graph rigidity for wireless sensor network localization</article-title>
          ,
          <source>” IEEE Transactions on Vehicular Technology</source>
          , vol.
          <volume>62</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>374</fpage>
          -
          <lpage>383</lpage>
          ,
          <year>January 2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chan and K. C. Ho</surname>
          </string-name>
          ,
          <article-title>A“ simple and efficient estimator for hyperbolic location</article-title>
          ,
          <source>” IEEE Transactions on Signal Processing</source>
          , vol.
          <volume>42</volume>
          , no.
          <issue>8</issue>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          1905-
          <fpage>1915</fpage>
          ,
          <year>August 1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and G. Ferrari, “
          <article-title>Swarm intelligent approaches to autolocalization of nodes in static UWB networks</article-title>
          ,
          <source>” Applied Soft Computing</source>
          , vol.
          <volume>25</volume>
          , pp.
          <fpage>426</fpage>
          -
          <lpage>434</lpage>
          ,
          <year>December 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and G. Ferrari, “
          <article-title>Impact of the number of beacons in PSO-based auto-localization in UWB networks,” in Proceedings of the International Conference on the Applications of Evolutionary Computation (EvoApplications '13), track on Nature-inspired Techniques for Communication Networks and other Parallel and Distributed Systems (EvoCOMNET '13</article-title>
          ), Vienna, Austria,
          <year>April 2013</year>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>51</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and G. Ferrari, “
          <article-title>Particle swarm optimization for autolocalization of nodes in wireless sensor networks</article-title>
          ,
          <source>” in Proceedings of the 11th International Conference on Adaptive and Natural Computing Algorithms (ICANNGA '13)</source>
          , Lausanne, Switzerland,
          <year>April 2013</year>
          , pp.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Ferrari</surname>
          </string-name>
          ,
          <string-name>
            <surname>A“</surname>
          </string-name>
          <article-title>n experimental model for UWB distance measurements and its application to localization problems</article-title>
          ,”
          <source>in Proceedings of the IEEE International Conference on Ultra Wide Band (ICUWB</source>
          <year>2014</year>
          ), Paris, France,
          <year>September 2014</year>
          , pp.
          <fpage>297</fpage>
          -
          <lpage>302</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and G. Ferrari, “
          <article-title>A swarm intelligence approach to 3D distance-based indoor UWB localization,” in Proceedings of the International Conference on the Applications of Evolutionary Computation (EvoApplications '15), track on Nature-inspired Techniques for Communication Networks and other Parallel and Distributed Systems (EvoCOMNET '15</article-title>
          ), Copenaghen, Denmark,
          <year>April 2015</year>
          , pp.
          <fpage>42</fpage>
          -
          <lpage>51</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>K. C. Ho</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Lu</surname>
          </string-name>
          , and L. Kovavisaruch, “
          <article-title>Source localization using TDOA and FDOA measurements in the presence of receiver location errors: Analysis and solution</article-title>
          ,
          <source>” IEEE Transactions on Signal Processing</source>
          , vol.
          <volume>55</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>684</fpage>
          -
          <lpage>696</lpage>
          ,
          <year>February 2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Zetik</surname>
          </string-name>
          , and R. S. Thoma¨, “
          <article-title>Performance comparison of TOA and TDOA based location estimation algorithms in</article-title>
          LOS environment,”
          <source>in Proceedings of the 5th Workshop on Positioning, Navigation and Communication (WPNC</source>
          <year>2008</year>
          ), Hannover, Germany,
          <year>March 2008</year>
          , pp.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>