IEEE Transactions on Mobile Computing

Issue 1 • Jan. 2006

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • EIC Editorial: State of the Transactions

    Publication Year: 2006, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (543 KB)
    Freely Available from IEEE
  • A distributed protocol for dynamic address assignment in mobile ad hoc networks

    Publication Year: 2006, Page(s):4 - 19
    Cited by:  Papers (55)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB) | HTML iconHTML

    A Mobile Ad hoc NETwork (MANET) is a group of mobile nodes that form a multihop wireless network. The topology of the network can change randomly due to unpredictable mobility of nodes and propagation characteristics. Previously, it was assumed that the nodes in the network were assigned IP addresses a priori. This may not be feasible as nodes can enter and leave the network dynamically. A dynamic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyses of bounces on power distribution networks using an unconditionally stable finite-difference time-domain method

    Publication Year: 2006, Page(s):20 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    An unconditionally stable finite-difference time-domain (US-FDTD) method is utilized for analyzing the bounces on structures of power distribution networks (PDNs), which is a critical issue in the electromagnetic compatibility analysis of mobile devices. The US-FDTD method does not utilize the explicit leapfrog time scheme of conventional FDTD method and can solve problems with fine structures wel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring mesh and tree-based multicast. Routing protocols for MANETs

    Publication Year: 2006, Page(s):28 - 42
    Cited by:  Papers (65)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1632 KB) | HTML iconHTML

    Recently, it became apparent that group-oriented services are one of the primary application classes targeted by MANETs. As a result, several MANET-specific multicast routing protocols have been proposed. Although these protocols perform well under specific mobility scenarios, traffic loads, and network conditions, no single protocol has been shown to be optimal in all scenarios. The goal of this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility helps peer-to-peer security

    Publication Year: 2006, Page(s):43 - 51
    Cited by:  Papers (55)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during which appropriate cryptographic protocols are run. We illustrate the operation of the solution in two scenarios, both in the framework of mobile... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility patterns in microcellular wireless networks

    Publication Year: 2006, Page(s):52 - 63
    Cited by:  Papers (40)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1161 KB) | HTML iconHTML

    This study investigates mobility patterns in microcellular wireless networks, based on measurements from the 802.11 based system that blankets the Carnegie Mellon University campus. We characterize the distribution of dwell time, which is the length of time that a mobile device remains in a cell until the next handoff, and sign-on interarrival time, which is the length of time between successive s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of pipeline paging under paging delay constraint for wireless systems

    Publication Year: 2006, Page(s):64 - 76
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1408 KB) | HTML iconHTML

    In this paper, we present a simple pipeline paging (PP) scheme, in which multiple paging requests (PRs) can be served in a pipeline manner in different paging areas. We analytically model the blanket paging (BP) scheme, the sequential paging (SP) scheme, and the PIP scheme so that discovery rate, total delay, paging delay, and cost are derived analytically as functions of traffic load. Extensive s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting cooperative caching in ad hoc networks

    Publication Year: 2006, Page(s):77 - 89
    Cited by:  Papers (238)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB) | HTML iconHTML

    Most researches in ad hoc networks focus on routing and not much work has been done on data access. A common technique used to improve the performance of data access is caching. Cooperative caching, which allows the sharing and coordination of cached data among multiple nodes, can further explore the potential of the caching techniques. Due to mobility and resource constraints of ad hoc networks, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2005 Reviewers List

    Publication Year: 2006, Page(s):90 - 92
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2006, Page(s):93 - 95
    Request permission for commercial reuse | PDF file iconPDF (2268 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2006, Page(s): 96
    Request permission for commercial reuse | PDF file iconPDF (315 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2006, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Marwan Krunz
Kenneth VonBehren Endowed Professor
Site Co-Director, NSF BWAC Center
Dept. of Electrical & Computer Engineering
The University of Arizona
Tucson, AZ 85721, USA
krunz@email.arizona.edu

Associate Editor-in-Chief
Kevin Almeroth
Computer Science Department
Univ. of California, Santa Barbara, USA
almeroth@cs.ucsb.edu