By Topic

Mobile Computing, IEEE Transactions on

Issue 8 • Date Aug. 2007

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2007 , Page(s): c1
    Request Permissions | PDF file iconPDF (251 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2007 , Page(s): c2
    Request Permissions | PDF file iconPDF (116 KB)  
    Freely Available from IEEE
  • Broadcast Approach for UMTS Mobility Database Recovery

    Publication Year: 2007 , Page(s): 865 - 871
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1523 KB) |  | HTML iconHTML  

    The universal mobile telecommunications system (UMTS) provides high bandwidth packet data services to mobile users. To support mobility management, an MM context is established for every mobile station in its corresponding serving GPRS support node (SGSN). When the SGSN fails, all MM contexts in the SGSN are corrupted. These MM contexts must be recovered or data delivery to the mobile stations wil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Mobility Management for Target Tracking in Mobile Sensor Networks

    Publication Year: 2007 , Page(s): 872 - 887
    Cited by:  Papers (46)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2718 KB) |  | HTML iconHTML  

    Mobility management is a major challenge in mobile ad hoc networks (MANETs) due in part to the dynamically changing network topologies. For mobile sensor networks that are deployed for surveillance applications, it is important to use a mobility management scheme that can empower nodes to make better decisions regarding their positions such that strategic tasks such as target tracking can benefit ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks

    Publication Year: 2007 , Page(s): 888 - 902
    Cited by:  Papers (26)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1820 KB) |  | HTML iconHTML  

    Introducing node mobility into the network also introduces new anonymity threats. This important change of the concept of anonymity has recently attracted attentions in mobile wireless security research. This paper presents identity-free routing and on- demand routing as two design principles of anonymous routing in mobile ad hoc networks. We devise ANODR (ANonymous On-Demand Routing) as the neede... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Route Optimization in Hierarchical Mobile IPv6 Networks

    Publication Year: 2007 , Page(s): 903 - 914
    Cited by:  Papers (26)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2074 KB) |  | HTML iconHTML  

    By introducing a mobility anchor point (MAP), Hierarchical Mobile IPv6 (HMIP6) reduces the signaling overhead and handoff latency associated with Mobile IPv6. However, if a mobile node (MN)'s session activity is high and its mobility is relatively low, HMIPv6 may degrade end-to-end data throughput due to the additional packet tunneling at the MAP. In this paper, we propose an adaptive route optimi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nomadic Service Assignment

    Publication Year: 2007 , Page(s): 915 - 928
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1811 KB) |  | HTML iconHTML  

    We consider the problem of dynamically assigning application sessions of mobile users or user groups to service points. Such assignments must balance the trade-off between two conflicting goals. On the one hand, we would like to connect a user to the closest server in order to reduce network costs and service latencies. On the other hand, we would like to minimize the number of costly session migr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structure-Free Data Aggregation in Sensor Networks

    Publication Year: 2007 , Page(s): 929 - 942
    Cited by:  Papers (49)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2209 KB) |  | HTML iconHTML  

    Data aggregation protocols can reduce the communication cost, thereby extending the lifetime of sensor networks. Prior works on data aggregation protocols have focused on tree-based or cluster-based structured approaches. Although structured approaches are suited for data gathering applications, they incur high maintenance overhead in dynamic scenarios for event-based applications. The goal of our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical Routing in Delay-Tolerant Networks

    Publication Year: 2007 , Page(s): 943 - 959
    Cited by:  Papers (58)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3516 KB) |  | HTML iconHTML  

    Delay-tolerant networks (DTNs) have the potential to interconnect devices in regions that current networking technology cannot reach. To realize the DTN vision, routes must be found over multiple unreliable, intermittently-connected hops. In this paper we present a practical routing protocol that uses only observed information about the network. We designed a metric that estimates the average wait... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource Allocation and Outage Control for Solar-Powered WLAN Mesh Networks

    Publication Year: 2007 , Page(s): 960 - 970
    Cited by:  Papers (19)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1668 KB) |  | HTML iconHTML  

    In this paper, resource allocation and outage control are considered for solar-powered WLAN mesh networks. Solar-powered nodes are a very cost effective option in WLAN mesh deployments where continuous power sources are not practical. In such nodes, the cost of the solar panel and battery can be a significant fraction of the total and, therefore, reducing AP power consumption is very important. A ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS-Aware and Energy-Conserving Transcoding Proxy Using On-Demand Data Broadcasting

    Publication Year: 2007 , Page(s): 971 - 987
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2611 KB) |  | HTML iconHTML  

    Most research works in transcoding proxies in mobile computing environments are on the basis of the traditional client-server architecture and do not employ the data broadcast technique. In addition, the issues of QoS provision and energy conservation are also not addressed in the prior studies. In view of this, we design in this paper a QoS-aware and energy-conserving transcoding proxy by utilizi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Low Power Listening for Wireless Sensor Networks

    Publication Year: 2007 , Page(s): 988 - 1004
    Cited by:  Papers (61)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1992 KB) |  | HTML iconHTML  

    Most sensor networks require application-specific network-wide performance guarantees, suggesting the need for global and flexible network optimization. The dynamic and nonuniform local states of individual nodes in sensor networks complicate global optimization. Here, we present a cross-layer framework for optimizing global power consumption and balancing the load in sensor networks through greed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comment on "Multibeam Antenna-Based Topology Control with Directional Power Intensity for Ad Hoc Networks"

    Publication Year: 2007 , Page(s): 1005 - 1006
    Request Permissions | Click to expandAbstract | PDF file iconPDF (418 KB)  

    An explicit analytical expression is derived for computing the expected number of symmetric neighbors considered by Huang and Shen [1]. The expression involves a well-known special function. The practical advantages of using the analytical expression are established. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 180,000 aritlces in the IEEE Computer Society Digital Library [advertisement]

    Publication Year: 2007 , Page(s): 1007
    Request Permissions | PDF file iconPDF (114 KB)  
    Freely Available from IEEE
  • Join the IEEE Computer Society

    Publication Year: 2007 , Page(s): 1008
    Request Permissions | PDF file iconPDF (110 KB)  
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2007 , Page(s): c3
    Request Permissions | PDF file iconPDF (116 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2007 , Page(s): c4
    Request Permissions | PDF file iconPDF (251 KB)  
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu