By Topic

IEEE Transactions on Mobile Computing

Issue 3 • Date March 2009

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (272 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Information Density Estimation for Content Retrieval in MANETs

    Publication Year: 2009, Page(s):289 - 303
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3275 KB) | HTML iconHTML

    The paper focuses on a cooperative environment in wireless ad hoc networks, where mobile nodes share information in a peer-to-peer fashion. Nodes follow a pure peer-to-peer approach (i.e., without the intervention of servers), thus requiring an efficient query/response propagation algorithm to prevent network congestion. The main contribution of the paper is the proposal of a novel solution, calle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice

    Publication Year: 2009, Page(s):304 - 321
    Cited by:  Papers (20)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4461 KB) | HTML iconHTML

    Location based services(LBS) are becoming increasingly important to the success and attractiveness of next generation wireless systems. However, a natural tension arises between the need for user privacy and the flexible use of location information. In this paper we present a framework to support privacy enhanced location based services. We classify the services according to several basic criteria... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost- and Collision-Minimizing Forwarding Schemes for Wireless Sensor Networks: Design, Analysis and Experimental Validation

    Publication Year: 2009, Page(s):322 - 337
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2640 KB) | HTML iconHTML

    The paper presents an original integrated MAC and routing scheme for wireless sensor networks. Our design objective is to elect the next hop for data forwarding by jointly minimizing the amount of signaling to complete a contention and maximizing the probability of electing the best candidate node. Towards this aim, we represent the suitability of a node to be the relay by means of locally calcula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Asynchronous Multichannel MAC: Design, Analysis, and Implementation

    Publication Year: 2009, Page(s):338 - 352
    Cited by:  Papers (54)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2895 KB) | HTML iconHTML

    Medium access control (MAC) protocols have been studied under different contexts for decades. In decentralized contexts, transmitter-receiver pairs make independent decisions, which are often suboptimal due to insufficient knowledge about the communication environment. In this paper, we introduce distributed information sharing (DISH), which is a distributed flavor of control-plane cooperation, as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)

    Publication Year: 2009, Page(s):353 - 368
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1363 KB) | HTML iconHTML

    In the last few years, the growing popularity of mobile devices has made them attractive to virus and worm writers. One communication channel often exploited by mobile malware is the Bluetooth interface. In this paper, we present a detailed analytical model that characterizes the propagation dynamics of Bluetooth worms. Our model captures not only the behavior of the Bluetooth protocol but also th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks

    Publication Year: 2009, Page(s):369 - 383
    Cited by:  Papers (20)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3112 KB) | HTML iconHTML

    In wireless ad hoc networks (WANets), multihop routing may result in a radio knowing the content of transmissions of nearby radios. This knowledge can be used to improve spatial reuse in the network, thereby enhancing network throughput. Consider two radios, Alice and Bob, that are neighbors in a WANet not employing spread-spectrum multiple access. Suppose that Alice transmits a packet to Bob for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks

    Publication Year: 2009, Page(s):384 - 397
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2531 KB) | HTML iconHTML

    The problem of cache sharing for supporting data access in mobile ad hoc networks is studied in this paper. The key to this problem is to discover a requested data item in an efficient manner. In the paper, we propose two caching protocols, IXP and DPIP, which distinguish themselves from the existing ones in that they fully exploit in-zone broadcasts to facilitate cache sharing operation. In parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passive Online Detection of 802.11 Traffic Using Sequential Hypothesis Testing with TCP ACK-Pairs

    Publication Year: 2009, Page(s):398 - 412
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1701 KB) | HTML iconHTML

    In this paper, we propose two online algorithms to detect 802.11 traffic from packet-header data collected passively at a monitoring point. These algorithms have a number of applications in real-time wireless LAN management, for instance, in detecting unauthorized access points and detecting/predicting performance degradations. Both algorithms use sequential hypothesis tests and exploit fundamenta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks

    Publication Year: 2009, Page(s):413 - 425
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2735 KB) | HTML iconHTML

    While multi-hop broadcast protocols, such as Trickle, Deluge and MNP, have gained tremendous popularity as a means for fast and convenient propagation of data/code in large scale wireless sensor networks, they can, unfortunately, serve as potential platforms for virus spreading if the security is breached. To understand the vulnerability of such protocols and design defense mechanisms against pigg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society 2009 Membership Application

    Publication Year: 2009, Page(s):426 - 428
    Request permission for commercial reuse | PDF file iconPDF (226 KB)
    Freely Available from IEEE
  • Build Your Career in Computing [advertisement]

    Publication Year: 2009, Page(s): 429
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • IEEE Computer Society Career Center

    Publication Year: 2009, Page(s): 430
    Request permission for commercial reuse | PDF file iconPDF (308 KB)
    Freely Available from IEEE
  • IEEE Computer Society Certified Software Development Professional

    Publication Year: 2009, Page(s): 431
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Silver Bullet Security Podcast Series

    Publication Year: 2009, Page(s): 432
    Request permission for commercial reuse | PDF file iconPDF (1080 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (272 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu