By Topic

IEEE Transactions on Mobile Computing

Issue 3 • Date May-June 2005

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2005, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • EIC Editorial

    Publication Year: 2005, Page(s):225 - 227
    Request permission for commercial reuse | PDF file iconPDF (192 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A MAC protocol to reduce sensor network energy consumption using a wakeup radio

    Publication Year: 2005, Page(s):228 - 242
    Cited by:  Papers (162)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1024 KB) | HTML iconHTML

    For increasing the life of sensor networks, each node must conserve energy as much as possible. In this paper, we propose a protocol in which energy is conserved by amortizing the energy cost of communication over multiple packets. In addition, we allow sensors to control the amount of buffered packets since storage space is limited. To achieve this, a two-radio architecture is used which allows a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ARC: an integrated admission and rate control framework for competitive wireless CDMA data networks using noncooperative games

    Publication Year: 2005, Page(s):243 - 258
    Cited by:  Papers (64)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB) | HTML iconHTML

    The competition among wireless data service providers brings in an option for the unsatisfied customers to switch their providers, which is called churning. The implementation of Wireless Local Number Portability (WLNP) is expected to further increase the churn rate (the probability of users switching the provider). However, the existing resource management algorithms for wireless networks fail to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient broadcasting with guaranteed coverage in mobile ad hoc networks

    Publication Year: 2005, Page(s):259 - 270
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB) | HTML iconHTML

    We study an efficient broadcast scheme in mobile ad hoc networks (MANETs). The objective is to determine a small set of forward nodes to ensure full coverage. We first study several methods that guarantee coverage when the local view of each node on its neighborhood information is updated in a timely manner. Then we consider a general case where nodes move even during the broadcast process, making... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information raining and optimal link-layer design for mobile hotspots

    Publication Year: 2005, Page(s):271 - 284
    Cited by:  Papers (28)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1336 KB) | HTML iconHTML

    In this paper, we propose a link layer design for mobile hotspots. We design a novel system architecture that enables high-speed Internet access in railway systems. The proposed design uses a number of repeaters placed along the track and multiple antennas installed on the roof of a vehicle. Each packet is decomposed into smaller fragments and relayed to the vehicle via adjacent repeaters. We also... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Node localization using mobile robots in delay-tolerant sensor networks

    Publication Year: 2005, Page(s):285 - 296
    Cited by:  Papers (137)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1080 KB) | HTML iconHTML

    We present a novel scheme for node localization in a delay-tolerant sensor network (DTN). In a DTN, sensor devices are often organized in network clusters that may be mutually disconnected. Some mobile robots may be used to collect data from the network clusters. The key idea in our scheme is to use this robot to perform location estimation for the sensor nodes it passes based on the signal streng... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Soft tamper-proofing via program integrity verification in wireless sensor networks

    Publication Year: 2005, Page(s):297 - 309
    Cited by:  Papers (35)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    Small low-cost sensor devices, each equipped with limited resources, are networked and used for various critical applications, especially those related to homeland security. Making such a sensor network secure is challenging mainly because it usually has to operate in a harsh, sometimes hostile, and unattended environment, where it is subject to capture, reverse-engineering, and manipulation. To a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The critical transmitting range for connectivity in mobile ad hoc networks

    Publication Year: 2005, Page(s):310 - 317
    Cited by:  Papers (74)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    In this paper, we have investigated the critical transmitting range for connectivity in mobile ad hoc networks. We have proven that, in the presence of bounded and obstacle free mobility, the CTR in the mobile case is at least as large as the CTR in the case of uniformly distributed points (asymptotically). For the case of RWP mobility, we have proven a more accurate characterization of the CTR an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement]

    Publication Year: 2005, Page(s): 318
    Request permission for commercial reuse | PDF file iconPDF (373 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2005, Page(s): 319
    Request permission for commercial reuse | PDF file iconPDF (663 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2005, Page(s): 320
    Request permission for commercial reuse | PDF file iconPDF (513 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2005, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2005, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu