By Topic

IEEE Transactions on Mobile Computing

Issue 1 • Date Jan. 2008

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (249 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

    Publication Year: 2008, Page(s):1 - 18
    Cited by:  Papers (158)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2472 KB) | HTML iconHTML

    Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An important challenge in the wide deployment of location-based services (LBSs) is the privacy-aware management of location information, providing saf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes

    Publication Year: 2008, Page(s):19 - 33
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    We consider the problem of establishing a route and sending packets between a source/destination pair in ad hoc networks composed of rational selfish nodes whose purpose is to maximize their own utility. In order to motivate nodes to follow the protocol specification, we use side payments that are made to the forwarding nodes. Our goal is to design a fully distributed algorithm such that (1) a nod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks

    Publication Year: 2008, Page(s):34 - 49
    Cited by:  Papers (49)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2672 KB) | HTML iconHTML

    Two well-known problems that can cause performance degradations in IEEE 802.11 wireless networks are the exposed-node (EN) and hidden-node (HN) problems. Although there have been isolated and incidental studies of EN and HN, a comprehensive treatment has not been attempted. The contributions of this paper are threefold: First, we provide rigorous mathematical definitions for EN and HN in wireless ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Multichannel MAC Protocols

    Publication Year: 2008, Page(s):50 - 65
    Cited by:  Papers (147)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3639 KB) | HTML iconHTML

    This paper compares, through analysis and simulation, a number of multichannel MAC protocols. We first classify these protocols into four categories based on their principles of operation: dedicated control channel, common hopping, split phase, and parallel rendezvous protocols. We then examine the effects of the number of channels and devices, channel switching times, and traffic patterns on the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Localized Application-Driven Topology Control for Energy-Efficient Wireless Peer-to-Peer File Sharing

    Publication Year: 2008, Page(s):66 - 80
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2869 KB) | HTML iconHTML

    Wireless peer-to-peer (P2P) file sharing is widely envisioned as one of the major applications of ad hoc networks in the near future. This trend is largely motivated by the recent advances in high-speed wireless communication technologies and high traffic demand for P2P file sharing applications. To achieve the ambitious goal of realizing a practical wireless P2P network, we need a scalable topolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sequence-Based Localization in Wireless Sensor Networks

    Publication Year: 2008, Page(s):81 - 94
    Cited by:  Papers (43)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2803 KB) | HTML iconHTML

    We introduce a novel sequence-based localization technique for wireless sensor networks. We show that the localization space can be divided into distinct regions that can each be uniquely identified by sequences that represent the ranking of distances from the reference nodes to that region. For n reference nodes in the localization space, combinatorially, O(n") sequences are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Call Admission Control Mechanism for Multimedia Traffic over Next-Generation Wireless Cellular Networks

    Publication Year: 2008, Page(s):95 - 112
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4245 KB) | HTML iconHTML

    The subject of Call Admission Control (CAC) for wireless networks has been studied extensively in the literature. Another subject on which many researchers have focused their attention is that of video traffic modeling. However, user mobility, combined with the rapidly growing number of "greedy" multimedia applications, in terms of bandwidth and Quality of Service (QoS) requirements, form a challe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Beaconing in Multihop Wireless PAN with Distributed Control

    Publication Year: 2008, Page(s):113 - 126
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2544 KB) | HTML iconHTML

    Distributed media access control (MAC) architecture has many merits to make it a favorable candidate for high-data-rate wireless personal area networks (WPANs) with physical layer (PHY) based on ultrawideband (UWB) technology. This paper focuses on the WiMedia MAC, which is the first distributed MAC for WPANs, approved as a standard. In such a MAC, all devices transmit their beacons to provide tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boundary Mapping and Boundary-State Routing (BSR) in Ad Hoc Networks

    Publication Year: 2008, Page(s):127 - 139
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2280 KB) | HTML iconHTML

    This paper presents a geographic routing protocol, boundary state routing (BSR), which consists of two components. The first is an improved forwarding strategy, greedy-bounded compass, which can forward packets around concave boundaries, where the packet moves away from the destination without looping. The second component is a boundary mapping protocol (BMP), which is used to maintain link state ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2007 Reviewers List

    Publication Year: 2008, Page(s):140 - 143
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Join the IEEE Computer Society [advertisement]

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • 2007 Annual Index

    Publication Year: 2008, Page(s): not in print
    Request permission for commercial reuse | PDF file iconPDF (230 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (249 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu