By Topic

IEEE Transactions on Mobile Computing

Issue 1 • Date Jan. 2010

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (264 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • State of the Transactions

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (207 KB)
    Freely Available from IEEE
  • Robust Multilayer Control for Enhanced Wireless Telemedical Video Streaming

    Publication Year: 2010, Page(s):5 - 16
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3886 KB) | HTML iconHTML

    M-health is an emerging area of research and one of the key challenges in future research in this area is medical video streaming over wireless channels. Contrasting requirements of almost lossless compression and low available bandwidth have to be tackled in medical quality video streaming in ultrasound and radiology applications. On one side, compression techniques need to be conservative, in or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements

    Publication Year: 2010, Page(s):17 - 30
    Cited by:  Papers (81)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2189 KB) | HTML iconHTML

    Secret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropper at a third location. This paper addresses bit extraction, i.e., the extraction of secret key bits from noisy radio channel measurements at two nodes such that the two secret keys reliably agree. Problems include 1) nonsi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Juggler: Virtual Networks for Fun and Profit

    Publication Year: 2010, Page(s):31 - 43
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1703 KB) | HTML iconHTML

    There are many situations in which an additional network interface-or two-can provide benefits to a mobile user. Additional interfaces can support parallelism in network flows, improve handoff times, and provide sideband communication with nearby peers. Unfortunately, such benefits are outweighed by the added costs of an additional physical interface. Instead, virtual interfaces have been proposed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Aware Tag Anticollision Protocols for RFID Systems

    Publication Year: 2010, Page(s):44 - 59
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2901 KB) | HTML iconHTML

    Energy consumption of portable RFID readers is becoming an important issue as applications of RFID systems pervade many aspects of our lives. Surprisingly, however, these systems are not energy-aware with the focus till date being on reducing the time to read all tags by the reader. In this work, we consider the problem of tag arbitration in RFID systems with the aim of designing energy-aware anti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Anchor-Based Sensor Localization in Irregular Areas

    Publication Year: 2010, Page(s):60 - 72
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2679 KB) | HTML iconHTML

    Localization is a fundamental problem in wireless sensor networks and its accuracy impacts the efficiency of location-aware protocols and applications, such as routing and storage. Most previous localization algorithms assume that sensors are distributed in regular areas without holes or obstacles, which often does not reflect real-world conditions, especially for outdoor deployment of wireless se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Energy Optimization for Target Tracking in Wireless Sensor Networks

    Publication Year: 2010, Page(s):73 - 86
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2242 KB) | HTML iconHTML

    Energy constraint is an important issue in wireless sensor networks. This paper proposes a distributed energy optimization method for target tracking applications. Sensor nodes are clustered by maximum entropy clustering. Then, the sensing field is divided for parallel sensor deployment optimization. For each cluster, the coverage and energy metrics are calculated by grid exclusion algorithm and D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Physical Carrier Sense in Topology-Controlled Wireless Networks

    Publication Year: 2010, Page(s):87 - 97
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1953 KB) | HTML iconHTML

    Transmit power and carrier sense threshold are key MAC/PHY parameters in carrier sense multiple access (CSMA) wireless networks. Transmit power control has been extensively studied in the context of topology control. However, the effect of carrier sense threshold on topology control has not been properly investigated in spite of its crucial role. Our key motivation is that the performance of a top... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Asymmetric and Asynchronous Energy Conservation Protocol for Vehicular Networks

    Publication Year: 2010, Page(s):98 - 111
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2426 KB) | HTML iconHTML Multimedia Media

    Intelligent Transportation Systems (ITS) improve passenger/pedestrian safety and transportation productivity through the use of vehicle-to-vehicle and vehicle-to-roadside wireless communication technologies. Communication protocols in these environments must meet strict delay requirements due to the high moving speed of the vehicles. In this paper, we propose an energy-conservative MAC layer proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter and Receiver

    Publication Year: 2010, Page(s):112 - 126
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1395 KB) | HTML iconHTML

    Spectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without harming the legacy systems. In this paper, we propose novel cooperative communication models and show how deploying such cooperations between a pair of secondary transmitter and receiver assists them in identifying spectrum opportunities more reliably. These cooperations are facilitated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Speed Control of Mobile Node for Data Collection in Sensor Networks

    Publication Year: 2010, Page(s):127 - 139
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2269 KB) | HTML iconHTML

    A data mule represents a mobile device that collects data in a sensor field by physically visiting the nodes in a sensor network. The data mule collects data when it is in the proximity of a sensor node. This can be an alternative to multihop forwarding of data when we can utilize node mobility in a sensor network. To be useful, a data mule approach needs to minimize data delivery latency. In this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2009 Reviewers list

    Publication Year: 2010, Page(s):140 - 144
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (150 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (238 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu