By Topic

IEEE Transactions on Mobile Computing

Issue 4 • April 2008

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (258 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Editorial: EIC Farewell and New EIC Introduction

    Publication Year: 2008, Page(s): 385
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Editorial: A Message from the New Editor-in-Chief

    Publication Year: 2008, Page(s): 386
    Request permission for commercial reuse | PDF file iconPDF (38 KB) | HTML iconHTML
    Freely Available from IEEE
  • Efficient Resource Allocation for Wireless Multicast

    Publication Year: 2008, Page(s):387 - 400
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2766 KB) | HTML iconHTML

    In this paper, we propose a bandwidth-efficient multicast mechanism for heterogeneous wireless networks. We reduce the bandwidth cost of an Internet protocol (IP) multicast tree by adaptively selecting the cell and the wireless technology for each mobile host to join the multicast group. Our mechanism enables more mobile hosts to cluster together and leads to the use of fewer cells to save the sca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SICC: Source-Initiated Context Construction in Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):401 - 415
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2608 KB) | HTML iconHTML

    Context-aware computing is characterized by the software's ability to continuously adapt its behavior to an environment over which it has little control. This style of interaction is imperative in ad hoc mobile networks that consist of numerous mobile hosts coordinating opportunistically via transient wireless connections. In this paper, we provide a formal abstract characterization of an applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust QoS Control for Single Carrier PMP Mode IEEE 802.16 Systems

    Publication Year: 2008, Page(s):416 - 429
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2759 KB) | HTML iconHTML

    The IEEE 802.16 WirelessMAN standard provides a comprehensive quality-of-service (QoS) control structure to enable flow isolation and service differentiation over the common wireless network interface. By specifying a particular set of service parameters, the media access control (MAC) mechanisms defined in the standard are able to offer predefined QoS provisioning on a per-connection basis. Howev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving TCP/IP Performance over Third-Generation Wireless Networks

    Publication Year: 2008, Page(s):430 - 443
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2564 KB) | HTML iconHTML

    As third-generation (3G) wireless networks with high data rate get widely deployed, optimizing the transmission control protocol (TCP) performance over these networks would have a broad and significant impact on data application performance. In this paper, we make two main contributions. First, one of the biggest challenges in optimizing the TCP performance over the 3G wireless networks is adaptin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):444 - 457
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4443 KB) | HTML iconHTML

    A k-hop dominating set is a subset of nodes such that each node that is not in the set can be reached within k hops from at least one node in the set. A connected k-hop dominating set can be used for disseminating topology update packets or route request packets, in which the flooding search space is reduced to the set, resulting in significant flooding overhead reduction in broadcast-related appl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Layer Interaction of TCP and Ad Hoc Routing Protocols in Multihop IEEE 802.11 Networks

    Publication Year: 2008, Page(s):458 - 469
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2894 KB) | HTML iconHTML

    In this research, we first investigate the cross-layer interaction between TCP and routing protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond to network events such as channel noise, mobility, and congestion in the same manner, which, in association with TCP, deteriorates the quality of an existing end-to-end connection. The poor end-to-end connectivity deterio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Location Verification with Hidden and Mobile Base Stations

    Publication Year: 2008, Page(s):470 - 483
    Cited by:  Papers (53)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2173 KB) | HTML iconHTML

    In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques, ultrasonic or radio, based on the received signal strength or signal time of flight. Through several examples, we show how this approach can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies

    Publication Year: 2008, Page(s):484 - 497
    Cited by:  Papers (134)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3072 KB) | HTML iconHTML

    In multihop wireless sensor networks that are often characterized by many-to-one (convergecast) traffic patterns, problems related to energy imbalance among sensors often appear. Sensors closer to a data sink are usually required to forward a large amount of traffic for sensors farther from the data sink. Therefore, these sensors tend to die early, leaving areas of the network completely unmonitor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Transmitter Power Control and Mobile Cache Management in Wireless Computing

    Publication Year: 2008, Page(s):498 - 512
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1424 KB) | HTML iconHTML

    We investigate efficient schemes for data communication from a server (base station and access point) to a mobile terminal over a wireless channel of randomly fluctuating quality. The terminal user generates requests for data items. If the buffer (cache) of the terminal contains the requested data, no access delay/latency is incurred. If not, the data is downloaded from the server, and until becom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Airtime Fairness for IEEE 802.11 Multirate Networks

    Publication Year: 2008, Page(s):513 - 527
    Cited by:  Papers (54)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5415 KB) | HTML iconHTML

    Under a multirate network scenario, the IEEE 802.11 DCF MAC fails to provide airtime fairness for all competing stations since the protocol is designed for ensuring max-min throughput fairness. As such, the maximum achievable throughput by any station gets bounded by the slowest transmitting peer. In this paper, we present an analytical model to study the delay and throughput characteristics of su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Join the IEEE Computer Society today! [advertisement]

    Publication Year: 2008, Page(s): 528
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (258 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Marwan Krunz
Kenneth VonBehren Endowed Professor
Site Co-Director, NSF BWAC Center
Dept. of Electrical & Computer Engineering
The University of Arizona
Tucson, AZ 85721, USA
krunz@email.arizona.edu

Associate Editor-in-Chief
Kevin Almeroth
Computer Science Department
Univ. of California, Santa Barbara, USA
almeroth@cs.ucsb.edu