By Topic

IEEE Transactions on Mobile Computing

Issue 10 • Date Oct. 2010

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Economy of Spectrum Access in Time Varying Multichannel Networks

    Publication Year: 2010, Page(s):1361 - 1376
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB) | HTML iconHTML

    We consider a wireless network consisting of two classes of potentially mobile users: primary users and secondary users. Primary users license frequency channels and transmit in their respective bands as required. Secondary users resort to unlicensed access of channels that are not used by their primary users. Primaries impose access fees on the secondaries which depend on access durations and may... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Law and Exponential Decay of Intercontact Times between Mobile Devices

    Publication Year: 2010, Page(s):1377 - 1390
    Cited by:  Papers (92)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3579 KB) | HTML iconHTML

    We examine the fundamental properties that determine the basic performance metrics for opportunistic communications. We first consider the distribution of intercontact times between mobile devices. Using a diverse set of measured mobility traces, we find as an invariant property that there is a characteristic time, order of half a day, beyond which the distribution decays exponentially. Up to this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Stable Online Algorithm for Energy-Efficient Multiuser Scheduling

    Publication Year: 2010, Page(s):1391 - 1406
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1686 KB) | HTML iconHTML

    In this paper, we consider the problem of energy-efficient uplink scheduling with delay constraint for a multiuser wireless system. We address this problem within the framework of constrained Markov decision processes (CMDPs) wherein one seeks to minimize one cost (average power) subject to a hard constraint on another (average delay). We do not assume the arrival and channel statistics to be know... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DGRAM: A Delay Guaranteed Routing and MAC Protocol for Wireless Sensor Networks

    Publication Year: 2010, Page(s):1407 - 1423
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3575 KB) | HTML iconHTML

    This paper presents an integrated MAC and routing protocol called Delay Guaranteed Routing and MAC (DGRAM) for delay-sensitive wireless sensor network (WSN) applications. DGRAM is a TDMA-based protocol designed to provide deterministic delay guarantee in an energy-efficient manner. The design is based on slot reuse to reduce latency of a node in accessing the medium, while ensuring that the medium... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Location Estimation Using Fuzzy-Based IMM and Data Fusion

    Publication Year: 2010, Page(s):1424 - 1436
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1658 KB) | HTML iconHTML

    The location of mobile station is an important issue for wireless communication systems. A location estimation scheme using fuzzy-based Interacting Multiple Model (IMM) smoother is proposed in this paper. It combines the time-of-arrival (TOA) and the received signal strength (RSS) measurements to achieve high location accuracy. The fuzzy technique is used to interpolate several linear equations to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimize Storage Placement in Sensor Networks

    Publication Year: 2010, Page(s):1437 - 1450
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1444 KB) | HTML iconHTML

    Data storage has become an important issue in sensor networks as a large amount of collected data need to be archived for future information retrieval. Storage nodes are introduced in this paper to store the data collected from the sensors in their proximities. The storage nodes alleviate the heavy load of transmitting all data to a central place for archiving and reduce the communication cost ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth Recycling in IEEE 802.16 Networks

    Publication Year: 2010, Page(s):1451 - 1464
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1862 KB) | HTML iconHTML

    IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS). Bandwidth is reserved for each application to ensure the QoS. For variable bit rate (VBR) applications, however, it is difficult for the subscriber stations (SSs) to predict the amount of incoming data. To ensure the QoS guaranteed services, the SS may reserve bandwidth more than the am... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decentralized Variational Filtering for Target Tracking in Binary Sensor Networks

    Publication Year: 2010, Page(s):1465 - 1477
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2707 KB) | HTML iconHTML

    The prime motivation of our work is to balance the inherent trade-off between the resource consumption and the accuracy of the target tracking in wireless sensor networks. Toward this objective, the study goes through three phases. First, a cluster-based scheme is exploited. At every sampling instant, only one cluster of sensors that located in the proximity of the target is activated, whereas the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Layer Quality Assessment of Scalable Video Services on Mobile Embedded Systems

    Publication Year: 2010, Page(s):1478 - 1490
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3962 KB) | HTML iconHTML

    The recent development of high-speed data transmission over wireless cellular networks has enabled the delivery of multimedia broadcasting services to mobile users. These services involve a range of interactions among different system components, including the wireless channel, the network, and mobile devices, making it crucial for the service provider to verify the model, design, and behavior of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Interlaced Extended Information Filter for Self-Localization in Sensor Networks

    Publication Year: 2010, Page(s):1491 - 1504
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2547 KB) | HTML iconHTML

    Wireless Sensor Networks (WSNs) are at the forefront of emerging technologies due to the recent advances in Microelectromechanical Systems (MEMSs). The inherent multidisciplinary nature of WSN attracted scientists coming from different areas stemming from networking to robotics. WSNs are considered to be unattended systems with applications ranging from environmental sensing, structural monitoring... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TMC Information for authors

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu