By Topic

IEEE Transactions on Mobile Computing

Issue 7 • July 2009

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (329 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Performance Evaluation of Impulse Radio UWB Networks Using Common or Private Acquisition Preambles

    Publication Year: 2009, Page(s):865 - 879
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2369 KB) | HTML iconHTML

    For impulse-radio ultrawideband (IR-UWB) networks without global synchronization, the first step for correct packet reception is packet detection and timing acquisition: Before recovering the payload of the packet, the destination must detect that the packet is on the medium and determine when exactly the payload begins. Packet detection and timing acquisition rely on the presence of an acquisitio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Fair Scheduling Schemes for the QoS-Oriented Wireless LAN

    Publication Year: 2009, Page(s):880 - 894
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2937 KB) | HTML iconHTML

    How to simultaneously achieve fairness and quality-of-service (QoS) guarantee in QoS-oriented wireless local area networks (LANs) is an important and challenging issue. Targeting at this goal and jointly taking priority setting, fairness, and cross-layer design into account, four scheduling schemes designed for the QoS-oriented wireless LAN mainly based on concepts of deficit count and allowance a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint Throughput Optimization for Wireless Mesh Networks

    Publication Year: 2009, Page(s):895 - 909
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1011 KB) | HTML iconHTML

    In this paper, we address the problem of joint channel assignment, link scheduling, and routing for throughput optimization in wireless networks with multi-radios and multi-channels. We mathematically formulate this problem by taking into account the interference, the number of available radios the set of usable channels, and other resource constraints at nodes. We also consider the possible combi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks

    Publication Year: 2009, Page(s):910 - 922
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2455 KB) | HTML iconHTML

    The unreachability problem (i.e., the so-called void problem) that exists in the greedy routing algorithms has been studied for the wireless sensor networks. Some of the current research work cannot fully resolve the void problem, while there exist other schemes that can guarantee the delivery of packets with the excessive consumption of control overheads. In this paper, a greedy anti-void routing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How Does Multiple-Packet Reception Capability Scale the Performance of Wireless Local Area Networks?

    Publication Year: 2009, Page(s):923 - 935
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1666 KB) | HTML iconHTML

    Due to its simplicity and cost efficiency, wireless local area network (WLAN) enjoys unique advantages in providing high-speed and low-cost wireless services in hot spots and indoor environments. Traditional WLAN medium-access-control (MAC) protocols assume that only one station can transmit at a time: simultaneous transmissions of more than one station cause the destruction of all packets involve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Phase Transition Width of K-Connectivity in Wireless Multihop Networks

    Publication Year: 2009, Page(s):936 - 949
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2489 KB) | HTML iconHTML

    In this paper, we study the phase transition behavior of k-connectivity (k=1,2,...) in wireless multihop networks where a total of n nodes are randomly and independently distributed following a uniform distribution in the unit cube [0,1]d (d = 1,2,3), and each node has a uniform transmission range r(n). It has been shown that the phase transition of k-connectivity becomes sharper as the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks

    Publication Year: 2009, Page(s):950 - 967
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2556 KB) | HTML iconHTML

    In a mobile ad hoc network, data replication drastically improves data availability. However, since mobile hosts' mobility causes frequent network partitioning, consistency management of data operations on replicas becomes a crucial issue. In such an environment, the global consistency of data operations on replicas is not desirable by many applications. Thus, new consistency maintenance based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message Authentication in Computationally Constrained Environments

    Publication Year: 2009, Page(s):968 - 974
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    RFID and wireless sensor networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. On the other hand, such components should support security applications such as message integrity, authentication, and time stamping. The latter are efficiently implemented by hash message authentication... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Relay Selection and Power Control for Multiuser Cooperative Communication Networks Using Stackelberg Game

    Publication Year: 2009, Page(s):975 - 990
    Cited by:  Papers (227)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2526 KB) | HTML iconHTML

    The performance in cooperative communication depends on careful resource allocation such as relay selection and power control, but the traditional centralized resource allocation requires precise measurements of channel state information (CSI). In this paper, we propose a distributed game-theoretical framework over multiuser cooperative communication networks to achieve optimal relay selection and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signaling for Multimedia Conferencing in Stand-Alone Mobile Ad Hoc Networks

    Publication Year: 2009, Page(s):991 - 1005
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3450 KB) | HTML iconHTML

    Mobile ad hoc networks (MANETs) are infrastructure-less and can be set up anywhere, anytime. They can host a wide range of applications in rescue operations, military, private, and commercial settings. Multimedia conferencing is the basis of a wealth of "killerrdquo applications that can be deployed in MANETs. Some examples are audio/video conferencing, multiplayer games, and online public debatin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society CSDP Certification [advertisement]

    Publication Year: 2009, Page(s): 1006
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Join the IEEE Computer Society [advertisement]

    Publication Year: 2009, Page(s): 1007
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Build Your Career in Computing [advertisement]

    Publication Year: 2009, Page(s): 1008
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (329 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Marwan Krunz
Kenneth VonBehren Endowed Professor
Site Co-Director, NSF BWAC Center
Dept. of Electrical & Computer Engineering
The University of Arizona
Tucson, AZ 85721, USA
krunz@email.arizona.edu

Associate Editor-in-Chief
Kevin Almeroth
Computer Science Department
Univ. of California, Santa Barbara, USA
almeroth@cs.ucsb.edu