By Topic

IEEE Transactions on Mobile Computing

Issue 1 • Jan. 2007

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (275 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2007, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • EIC Editorial: State of the Transactions

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Online Data Gathering for Maximizing Network Lifetime in Sensor Networks

    Publication Year: 2007, Page(s):2 - 11
    Cited by:  Papers (74)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1036 KB) | HTML iconHTML

    Energy-constrained sensor networks have been deployed widely for monitoring and surveillance purposes. Data gathering in such networks is often a prevalent operation. Since sensors have significant power constraints (battery life), energy efficient methods must be employed for data gathering to prolong network lifetime. We consider an online data gathering problem in sensor networks, which is stat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SoftMAC: Layer 2.5 Collaborative MAC for Multimedia Support in Multihop Wireless Networks

    Publication Year: 2007, Page(s):12 - 25
    Cited by:  Papers (28)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2141 KB) | HTML iconHTML

    In this paper, we present the challenges in supporting multimedia, in particular, VoIP services over multihop wireless networks using commercial IEEE 802.11 MAC DCF hardware, and propose a novel software solution, called Layer 2.5 SoftMAC. Our proposed SoftMAC resides between the IEEE 802.11 MAC layer and the IP layer to coordinate the real-time (RT) multimedia and best-effort (BE) data packet tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of the IEEE 802.16 MAC for QoS Support

    Publication Year: 2007, Page(s):26 - 38
    Cited by:  Papers (112)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3498 KB) | HTML iconHTML

    The IEEE 802.16 is a standard for broadband wireless communication in metropolitan area networks (MAN). To meet the QoS requirements of multimedia applications, the IEEE 802.16 standard provides four different scheduling services: unsolicited grant service (UGS), real-time polling service (rtPS), non-real-time polling service (nrtPS), and Best Effort (BE). The paper is aimed at verifying, via simu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inner-Circle Consistency for Wireless Ad Hoc Networks

    Publication Year: 2007, Page(s):39 - 55
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4062 KB) | HTML iconHTML

    This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where local node interaction is used to neutralize errors/attacks at the source, both preventing errors/attacks from propagating in the network and improving the fidelity of the propagated information. We achieve this goal by combi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Route Reservation in Ad Hoc Wireless Networks

    Publication Year: 2007, Page(s):56 - 71
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2170 KB) | HTML iconHTML

    This paper investigates whether and when route reservation-based (RB) communication can yield better delay performance than non-reservation-based (NRB) communication in ad hoc wireless networks. In addition to posing this fundamental question, the requirements (in terms of route discovery, medium access control (MAC) protocol, and pipelining, etc.) for making RB switching superior to NRB switching... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bottom-Up Construction of Bluetooth Topology under a Traffic-Aware Scheduling Scheme

    Publication Year: 2007, Page(s):72 - 86
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5128 KB) | HTML iconHTML

    We propose a Bluetooth topology construction protocol that works in conjunction with a priority-based polling scheme. A master assigns a priority to its slaves including bridges for each polling cycle and then polls them as many times as the assigned priority. The slaves can spend their idle time either in a power-saving mode or perform new node discovery. The topology construction algorithm works... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variable-Range Transmission Power Control in Wireless Ad Hoc Networks

    Publication Year: 2007, Page(s):87 - 99
    Cited by:  Papers (76)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1694 KB) | HTML iconHTML

    In this paper, we investigate the impact of variable-range transmission power control on the physical and network connectivity, on network capacity, and on power savings in wireless multihop networks. First, using previous work by Steele (1988), we show that, for a path attenuation factor a = 2, the average range of links in a planar random network of A m2 having n nodes is ~aradicA/n1.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wormhole-Based Antijamming Techniques in Sensor Networks

    Publication Year: 2007, Page(s):100 - 114
    Cited by:  Papers (68)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2801 KB) | HTML iconHTML

    Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to "radio channel jamming"-based denial-of-service (DoS) attacks. An adversary can easily mask the events that the sensor network should detect by stealthily jamming an appropriate subset of the nodes; in this way, he prevents them from reporting what they are sensing to the network op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SyncWUF: An Ultra Low-Power MAC Protocol for Wireless Sensor Networks

    Publication Year: 2007, Page(s):115 - 125
    Cited by:  Papers (31)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3187 KB) | HTML iconHTML

    In wireless sensor networks, power consumption is one of the key design issues because a large number of sensor nodes are powered by cheap batteries. Switching the RF transceiver, which is one of the biggest power consumers in a sensor node, to low-power sleep mode as much as possible has been proven to be a very efficient way to save power with a factor of tens or even hundreds. So far, several s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Joint Session Admission Control in Integrated WLAN and CDMA Cellular Networks with Vertical Handoff

    Publication Year: 2007, Page(s):126 - 139
    Cited by:  Papers (51)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2301 KB) | HTML iconHTML

    This paper considers optimizing the utilization of radio resources in a heterogeneous integrated system consisting of two different networks: a wireless local area network (WLAN) and a wideband code division multiple access (CDMA) network. We propose a joint session admission control scheme for multimedia traffic that maximizes overall network revenue with quality of service (QoS) constraints over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2006 Reviewers List

    Publication Year: 2007, Page(s):140 - 142
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Search for Editor-in-Chief

    Publication Year: 2007, Page(s): 143
    Request permission for commercial reuse | PDF file iconPDF (775 KB)
    Freely Available from IEEE
  • Join the IEEE Computer Society!

    Publication Year: 2007, Page(s): 144
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2007, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (275 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu