By Topic

IEEE Transactions on Mobile Computing

Issue 8 • Date Aug. 2006

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (276 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • A control-theoretic approach to distributed discrete-valued decision-making in networks of sensing agents

    Publication Year: 2006, Page(s):945 - 957
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    We address the problem of global sensor fusion for the purpose of distributed decision-making, from a control-theoretic perspective. In particular, we introduce a quasi-linear stochastic distributed protocol, using which a network of sensing agents can reach agreement in order to take a collective action. Using control-theoretic methods, we design the parameters of our protocol - which include wei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controllably mobile infrastructure for low energy embedded networks

    Publication Year: 2006, Page(s):958 - 973
    Cited by:  Papers (114)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2366 KB) | HTML iconHTML

    We discuss the use of mobility to enhance network performance for a certain class of applications in sensor networks. A major performance bottleneck in sensor networks is energy since it is impractical to replace the batteries in embedded sensor nodes post-deployment. A significant portion of the energy expenditure is attributed to communications and, in particular, the nodes close to the sensor n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOM: dynamic push-pull channel allocation framework for mobile data broadcasting

    Publication Year: 2006, Page(s):974 - 990
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3581 KB) | HTML iconHTML

    In a mobile computing environment, the combined use of broadcast and on-demand channels can utilize the bandwidth effectively for data dissemination. We explore in this paper the problem of dynamic data and channel allocation with the number of communication channels and the number of data items given. We first derive the analytical models of the average access time when the data items are request... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic adaptive frequency hopping for mutually interfering wireless personal area networks

    Publication Year: 2006, Page(s):991 - 1003
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1630 KB) | HTML iconHTML

    As the wireless personal area network (WPAN) gets utilized by more individuals, the interference that collocated WPANs cause to each other, termed self-interference, will be one of the major sources that degrade WPAN's communication performance. The conventional adaptive frequency hopping (AFH) strategies avoid frequency-static interference by reducing the hopset, but this deteriorates the perform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICAM: integrated cellular and ad hoc multicast

    Publication Year: 2006, Page(s):1004 - 1015
    Cited by:  Papers (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2680 KB) | HTML iconHTML

    In third generation (3G) wireless data networks, multicast throughput decreases with the increase in multicast group size, since a conservative strategy for the base station is to use the lowest data rate of all the receivers so that the receiver with the worst downlink channel condition can decode the transmission correctly. This paper proposes ICAM, integrated cellular and ad hoc multicast, to i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Progressive image transmission over space-time coded OFDM-based MIMO systems with adaptive modulation

    Publication Year: 2006, Page(s):1016 - 1028
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3263 KB) | HTML iconHTML

    This paper considers a progressive image transmission system over wireless channels by combining joint source-channel coding (JSCC), space-time coding, and orthogonal frequency division multiplexing (OFDM). The BER performance of the space-time coded OFDM-based MIMO system based on a newly built broadband MIMO fading model is first evaluated by assuming perfect channel state information at the rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location-dependent queries in mobile contexts: distributed processing using mobile agents

    Publication Year: 2006, Page(s):1029 - 1043
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4081 KB) | HTML iconHTML

    With the current advances of mobile computing technology, we are witnessing an explosion in the development of applications that provide mobile users with a wide range of services. In this paper, we present a system that supports distributed processing of continuous location-dependent queries in mobile environments. The system that we propose presents the following main advantages: 1) it is a gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient in-network moving object tracking in wireless sensor networks

    Publication Year: 2006, Page(s):1044 - 1056
    Cited by:  Papers (49)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4292 KB) | HTML iconHTML

    The rapid progress of wireless communication and embedded microsensing MEMS technologies has made wireless sensor networks possible. In light of storage in sensors, a sensor network can be considered as a distributed database, in which one can conduct in-network data processing. An important issue of wireless sensor networks is object tracking, which typically involves two basic operations: update... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A game theoretic approach to power aware wireless data access

    Publication Year: 2006, Page(s):1057 - 1073
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4628 KB) | HTML iconHTML

    We consider a basic scenario in wireless data access: a number of mobile clients are interested in a set of data items kept at a common server. Each client independently sends requests to inform the server of its desired data items and the server replies with a broadcast channel. We are interested in studying the energy consumption characteristics in such a scenario. First, we define a utility fun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quarantine region scheme to mitigate spam attacks in wireless-sensor networks

    Publication Year: 2006, Page(s):1074 - 1086
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2905 KB) | HTML iconHTML

    The quarantine region scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal callback with two-level adaptation for wireless data access

    Publication Year: 2006, Page(s):1087 - 1102
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4630 KB) | HTML iconHTML

    Strongly consistent callback cache mechanisms have been studied for data access in wireless networks. In cache access mechanisms, update information is extremely important since an updated data object in a remote server makes the corresponding data objects invalidated in mobile terminals (MTs), and the data object cache hit information in those MTs becomes almost useless. In this paper, we propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectivity, performance, and resiliency of IP-based CDMA radio access networks

    Publication Year: 2006, Page(s):1103 - 1118
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3124 KB) | HTML iconHTML

    IP-based radio access networks (RAN) are expected to be the next generation access networks in UMTS and CDMA networks. The question of connectivity, i.e., how best to connect base stations to the radio network controllers (RNC) in an IP-based RAN, has not been addressed by researchers. Furthermore, given a connection configuration, an RNC selection algorithm that assigns an incoming call to an RNC... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE ReadyNotes from the IEEE Computer Society

    Publication Year: 2006, Page(s): 1119
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • The IEEE Computer Society celebrates its 60th anniversary

    Publication Year: 2006, Page(s): 1120
    Request permission for commercial reuse | PDF file iconPDF (1968 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2006, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (360 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu