By Topic

IEEE Transactions on Mobile Computing

Issue 11 • Date Nov. 2006

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (335 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2006, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Dynamic Power Optimization Targeting User Delays in Interactive Systems

    Publication Year: 2006, Page(s):1473 - 1488
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2909 KB) | HTML iconHTML

    Power has become a major concern for mobile computing systems such as laptops and handhelds, on which a significant fraction of software usage is interactive instead of compute-intensive. For interactive systems, an analysis shows that more than 90 percent of system energy and time is spent waiting for user input. Such idle periods provide vast opportunities for dynamic power management (DPM) and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Device Security Using Transient Authentication

    Publication Year: 2006, Page(s):1489 - 1502
    Cited by:  Papers (17)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1648 KB) | HTML iconHTML

    Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Flow Control and Medium Access in Multihop Ad Hoc Networks

    Publication Year: 2006, Page(s):1503 - 1514
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2551 KB) | HTML iconHTML

    Recent studies have shown that the performance of wireless multihop ad hoc networks is very poor. In this paper, we first demonstrate that one important reason of the poor performance is the close coupling between medium contention and network congestion. Therefore, we present a framework of distributed flow control and medium access control to address both medium contention and network congestion... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Replication for Improving Data Accessibility in Ad Hoc Networks

    Publication Year: 2006, Page(s):1515 - 1532
    Cited by:  Papers (96)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3638 KB) | HTML iconHTML

    In ad hoc networks, due to frequent network partition, data accessibility is lower than that in conventional fixed networks. In this paper, we solve this problem by replicating data items on mobile hosts. First, we propose three replica allocation methods assuming that each data item is not updated. In these three methods, we take into account the access frequency from mobile hosts to each data it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks

    Publication Year: 2006, Page(s):1533 - 1546
    Cited by:  Papers (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (691 KB) | HTML iconHTML

    Routing is one of the most basic networking functions in mobile ad hoc networks. Hence, an adversary can easily paralyze the operation of the network by attacking the routing protocol. This has been realized by many researchers and several "secure" routing protocols have been proposed for ad hoc networks. However, the security of those protocols has mainly been analyzed by informal means only. In ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost-Effective Caching for Mobility Support in IEEE 802.1X Frameworks

    Publication Year: 2006, Page(s):1547 - 1560
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2939 KB) | HTML iconHTML

    This paper is concerned with caching support of access points (APs) for fast handoff within IEEE 802.11 networks. A common flavor of current schemes is to let a mobile station preauthenticate or distribute the security context of the station proactively to neighboring APs. Each target AP caches the received context beforehand and can save itself backend-network authentication if the station reasso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tree-Based Data Broadcast in IEEE 802.15.4 and ZigBee Networks

    Publication Year: 2006, Page(s):1561 - 1574
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4817 KB) | HTML iconHTML

    This paper studies efficient and simple data broadcast in IEEE 802.15.4-based ad hoc networks (e.g., ZigBee). Since finding the minimum number of rebroadcast nodes in general ad hoc networks is NP-hard, current broadcast protocols either employ heuristic algorithms or assume extra knowledge such as position or two-hop neighbor table. However, the ZigBee network is characterized as low data rate an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Client-Centered, Energy-Efficient Wireless Communication on IEEE 802.11b Networks

    Publication Year: 2006, Page(s):1575 - 1590
    Cited by:  Papers (17)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2908 KB) | HTML iconHTML

    In mobile devices, the wireless network interface card (WNIC) consumes a significant portion of overall system energy. One way to reduce energy consumed by a device is to transition its WNIC to a lower-power steep mode when data is not being received or transmitted. In this paper, we investigate client-centered techniques for energy efficient communication, using IEEE 802.11b, within the network l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gap Processing Time Analysis of Stall Avoidance Schemes for High-Speed Downlink Packet Access with Parallel HARQ Mechanisms

    Publication Year: 2006, Page(s):1591 - 1605
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2372 KB) | HTML iconHTML

    The parallel multichannel stop-and-wait (SAW) hybrid automatic repeat request (HARQ) mechanism is one of key technologies for high-speed downlink packet access in the wideband code division multiple access system. However, this parallel HARQ mechanism may encounter a serious stall problem, resulting from the error of the negative acknowledgement (NACK) changing to the acknowledgement (ACK) in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User-Centered Approach to Active Replica Management in Mobile Environments

    Publication Year: 2006, Page(s):1606 - 1619
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2828 KB) | HTML iconHTML

    A replication scheme determines the number and location of replicas in a distributed system. Traditional static replication schemes do not perform well in mobile environments due to the assumptions of fixed hosts, relatively static access patterns, and the lack of considerations on users' behalf. For effective data management in mobile environments, we define the notion of activity-data dependency... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing Correlated Data with Fusion Cost in Wireless Sensor Networks

    Publication Year: 2006, Page(s):1620 - 1632
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1179 KB) | HTML iconHTML

    In this paper, we propose a routing algorithm called minimum fusion Steiner tree (MFST) for energy efficient data gathering with aggregation (fusion) in wireless sensor networks. Different from existing schemes, MFST not only optimizes over the data transmission cost, but also incorporates the cost for data fusion, which can be significant for emerging sensor networks with vectorial data and/or se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TMC Information for authors

    Publication Year: 2006, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2006, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (335 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu