By Topic

IEEE Transactions on Mobile Computing

Issue 11 • Date Nov. 2010

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (243 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Editorial: Inttroduction of New Associate Editors

    Publication Year: 2010, Page(s):1505 - 1507
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • Duty Cycle Control for Low-Power-Listening MAC Protocols

    Publication Year: 2010, Page(s):1508 - 1521
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2527 KB) | HTML iconHTML

    Energy efficiency is of the utmost importance in wireless sensor networks. The family of Low-Power-Listening MAC protocols was proposed to reduce one form of energy dissipation-idle listening, a radio state for which the energy consumption cannot be neglected. Low-Power-Listening MAC protocols are characterized by a duty cycle: a node probes the channel every t_i {rm s} of sleep. A low duty cycle ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Microscopic Spectrum Opportunities in Cognitive Radio Networks via Coordinated Channel Access

    Publication Year: 2010, Page(s):1522 - 1534
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2255 KB) | HTML iconHTML

    Under the current opportunistic spectrum access (OSA) paradigm, a common belief is that a cognitive radio (CR) can use a channel only when this channel is not being used by any neighboring primary radio (PR). Therefore, the existence of a spectrum opportunity hinges on the absence of active cochannel PRs in a macroscopic region. In this paper, we propose the concept of microscopic spectrum opportu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rate Adaptation in Congested Wireless Networks through Real-Time Measurements

    Publication Year: 2010, Page(s):1535 - 1550
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2410 KB) | HTML iconHTML

    Rate adaptation is a critical component that impacts the performance of IEEE 802.11 wireless networks. In congested networks, traditional rate adaptation algorithms have been shown to choose lower data-rates for packet transmissions, leading to reduced total network throughput and capacity. A primary reason for this behavior is the lack of real-time congestion measurement techniques that can assis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accuracy Performance Analysis between War Driving and War Walking in Metropolitan Wi-Fi Localization

    Publication Year: 2010, Page(s):1551 - 1562
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3444 KB) | HTML iconHTML

    Wi-Fi ingerprint-based localization is currently the most promising approach to building metropolitan-scale localization systems for both indoor and outdoor environments. A Wi-Fi fingerprint localization system makes use of a radio map that contains Wi-Fi signals received at various locations, and uses the map for location estimation. Thus, the accuracy of a Wi-Fi fingerprint localization system g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Nodal Encounter Patterns in Wireless LAN Traces

    Publication Year: 2010, Page(s):1563 - 1577
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3181 KB) | HTML iconHTML

    In this paper, we analyze multiple wireless LAN (WLAN) traces from university and corporate campuses. In particular, we consider important events between mobile nodes in wireless networks-encounters. We seek to understand encounter patterns in the mobile network from a holistic view, using a graph analysis approach. Such an analysis sheds light on the diverse, nonhomogeneous nature of users in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks

    Publication Year: 2010, Page(s):1578 - 1591
    Cited by:  Papers (58)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1862 KB) | HTML iconHTML

    Severe energy constraints of battery-powered sensor nodes necessitate energy-efficient communication in Wireless Sensor Networks (WSNs). However, the vast majority of the existing solutions are based on the classical layered protocol approach, which leads to significant overhead. It is much more efficient to have a unified scheme, which blends common protocol layer functionalities into a cross-lay... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme

    Publication Year: 2010, Page(s):1592 - 1607
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3511 KB) | HTML iconHTML

    This paper focuses on multihop range-free localization in anisotropic wireless sensor networks. In anisotropic networks, geometric distance between a pair of sensor nodes is not always proportional to their hop count distance, which undermines the assumption of many existing range-free localization algorithms. To tolerate network anisotropy, we propose a pattern-driven localization scheme, which i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrity Regions: Authentication through Presence in Wireless Networks

    Publication Year: 2010, Page(s):1608 - 1621
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1595 KB) | HTML iconHTML

    Despite years of intensive research, the main deterrents of widely deploying secure communication between wireless nodes remains the cumbersome key setup process. In this paper, we address this problem and we introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of preestablished or precertified keys. Integrity regions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-Layer Sleep Scheduling Design in Service-Oriented Wireless Sensor Networks

    Publication Year: 2010, Page(s):1622 - 1633
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2414 KB) | HTML iconHTML

    Service-oriented wireless sensor networks have recently been proposed to provide an integrated platform, where new applications can be rapidly developed through flexible service composition. In wireless sensor networks, sensors are periodically switched into the sleep mode for energy saving. This, however, will cause the unavailability of nodes, which, in turn, incurs disruptions to the service co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Data-Driven Link Estimation Methods in Low-Power Wireless Networks

    Publication Year: 2010, Page(s):1634 - 1648
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2372 KB) | HTML iconHTML

    Link estimation is a basic element of routing in low-power wireless networks, and data-driven link estimation using unicast MAC feedback has been shown to outperform broadcast-beacon-based link estimation. Nonetheless, little is known about how different data-driven link estimation methods affect routing behaviors. To address this issue, we classify existing data-driven link estimation methods int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Biased Random Walk Routing Protocol for Wireless Sensor Networks: The Lukewarm Potato Protocol

    Publication Year: 2010, Page(s):1649 - 1661
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2457 KB) | HTML iconHTML

    Low-latency data delivery is an important requirement for achieving effective monitoring through wireless sensor networks. When sensor nodes employ duty cycling, sending a message along the shortest path, however, does not necessarily result in minimum delay. In this paper, we first study the lowest latency path problem, i.e., the characteristics of a path with minimum delay that connects a source... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Computing Now [advertisement]

    Publication Year: 2010, Page(s): 1662
    Request permission for commercial reuse | PDF file iconPDF (404 KB)
    Freely Available from IEEE
  • Build Your Career in Computing [advertisement]

    Publication Year: 2010, Page(s): 1663
    Request permission for commercial reuse | PDF file iconPDF (348 KB)
    Freely Available from IEEE
  • IEEE Computer Society Digital Library [advertisement]

    Publication Year: 2010, Page(s): 1664
    Request permission for commercial reuse | PDF file iconPDF (271 KB)
    Freely Available from IEEE
  • IEEE Computer Society Career Center

    Publication Year: 2010, Page(s): 1665
    Request permission for commercial reuse | PDF file iconPDF (313 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (243 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu