By Topic

Mobile Computing, IEEE Transactions on

Issue 5 • Date May 2007

Filter Results

Displaying Results 1 - 11 of 11
  • [Front cover]

    Publication Year: 2007 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (252 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2007 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (117 KB)  
    Freely Available from IEEE
  • Randomly Ranked Mini Slots for Fair and Efficient Medium Access Control in Ad Hoc Networks

    Publication Year: 2007 , Page(s): 481 - 493
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2310 KB) |  | HTML iconHTML  

    Ad hoc networks offer infrastructure-free operation, where no entity can provide reliable coordination among nodes. Medium access Control (MAC) protocols in such a network must overcome the inherent unreliability of the network and provide high throughput and adequate fairness to the different flows of traffic. In this paper, we propose a MAC protocol that can achieve an excellent balance between ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Path Coverage Properties of Random Sensor Networks

    Publication Year: 2007 , Page(s): 494 - 506
    Cited by:  Papers (15)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1912 KB) |  | HTML iconHTML  

    In a sensor network, the points in the operational area that are suitably sensed are a two-dimensional spatial coverage process. For randomly deployed sensor networks, typically, the network coverage of two-dimensional areas is analyzed. However, in many sensor network applications, e.g., tracking of moving objects, the sensing process on paths, rather than in areas, is of interest. With such an a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks

    Publication Year: 2007 , Page(s): 507 - 521
    Cited by:  Papers (23)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1749 KB) |  | HTML iconHTML  

    In autonomous mobile ad hoc networks, nodes belong to different authorities and pursue different goals; therefore, cooperation among them cannot be taken for granted. Meanwhile, some nodes may be malicious, whose objective is to damage the network. In this paper, we present a joint analysis of cooperation stimulation and security in autonomous mobile ad hoc networks under a game theoretic framewor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing WLAN Capacity by Strategic Placement of Tetherless Relay Points

    Publication Year: 2007 , Page(s): 522 - 535
    Cited by:  Papers (22)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2118 KB) |  | HTML iconHTML  

    With the proliferation of wireless local area network (WLAN) technologies, wireless Internet access via public hotspots will become a necessity in the near future. In outdoor areas where the installation of a large number of wired access points is practically or economically infeasible, mobile users located at the edge of the network communicate with the access point at a very low rate and, in tur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs

    Publication Year: 2007 , Page(s): 536 - 550
    Cited by:  Papers (47)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1609 KB) |  | HTML iconHTML  

    We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the ro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OPHMR: An Optimized Polymorphic Hybrid Multicast Routing Protocol for MANET

    Publication Year: 2007 , Page(s): 551 - 562
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2566 KB) |  | HTML iconHTML  

    We propose in this paper an optimized, polymorphic, hybrid multicast routing protocol for MANET. This new polymorphic protocol attempts to benefit from the high efficiency of proactive behavior (in terms of quicker response to transmission requests) and the limited network traffic overhead of the reactive behavior, while being power, mobility, and vicinity-density (in terms of number of neighbor n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bidding Protocols for Deploying Mobile Sensors

    Publication Year: 2007 , Page(s): 563 - 576
    Cited by:  Papers (52)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (4754 KB) |  | HTML iconHTML  

    Constructing a sensor network with a mix of mobile and static sensors can achieve a balance between sensor coverage and sensor cost. In this paper, we design two bidding protocols to guide the movement of mobile sensors in such sensor networks to increase the coverage to a desirable level. In the protocols, static sensors detect coverage holes locally by using Voronoi diagrams and bid mobile senso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TMC Information for authors

    Publication Year: 2007 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (117 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2007 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (252 KB)  
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu