By Topic

IEEE Transactions on Mobile Computing

Issue 1 • Date Jan. 2011

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (295 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Editorial: Farewell and Introduction to the New Editor-in-Chief

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Editorial: A Message from the New Editor-in-Chief

    Publication Year: 2011, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis

    Publication Year: 2011, Page(s):3 - 15
    Cited by:  Papers (140)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3263 KB) | HTML iconHTML

    Recently, many efforts have been made to develop more efficient Inter-Vehicle Communication (IVC) protocols for on-demand route planning according to observed traffic congestion or incidents, as well as for safety applications. Because practical experiments are often not feasible, simulation of network protocol behavior in Vehicular Ad Hoc Network (VANET) scenarios is strongly demanded for evaluat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Multihop Network Programming with Multiple One-Way Key Chains

    Publication Year: 2011, Page(s):16 - 31
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3319 KB) | HTML iconHTML

    Current network programming protocols provide an efficient way to update program images running on sensor nodes without having physical access to them. Securing these updates, however, remains a challenging and important issue, given the open environment where sensor nodes are often deployed. Several approaches addressing these issues have been reported, but their use of cryptographically strong p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PAPERS 
  • Mobility Tracking Based on Autoregressive Models

    Publication Year: 2011, Page(s):32 - 43
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1519 KB) | HTML iconHTML

    We propose an integrated scheme for tracking the mobility of a user based on autoregressive models that accurately capture the characteristics of realistic user movements in wireless networks. The mobility parameters are obtained from training data by computing Minimum Mean Squared Error (MMSE) estimates. Estimation of the mobility state, which incorporates the position, velocity, and acceleration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localization of Mobile Nodes in Wireless Networks with Correlated in Time Measurement Noise

    Publication Year: 2011, Page(s):44 - 53
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2174 KB) | HTML iconHTML

    Wireless sensor networks are an inherent part of decision making, object tracking, and location awareness systems. This work is focused on simultaneous localization of mobile nodes based on received signal strength indicators (RSSIs) with correlated in time measurement noises. Two approaches to deal with the correlated measurement noises are proposed in the framework of auxiliary particle filterin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Based Network Estimation for Energy-Efficient Ubiquitous Wireless Connectivity

    Publication Year: 2011, Page(s):54 - 66
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2666 KB) | HTML iconHTML

    Context information brings new opportunities for efficient and effective system resource management of mobile devices. In this work, we focus on the use of context information to achieve energy-efficient, ubiquitous wireless connectivity. Our field-collected data show that the energy cost of network interfaces poses a great challenge to ubiquitous connectivity, despite decent availability of cellu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Multi-Interface Multichannel Random Access Using Convex Optimization

    Publication Year: 2011, Page(s):67 - 80
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1587 KB) | HTML iconHTML

    The aggregate capacity of wireless ad hoc networks can be increased substantially if each node is equipped with multiple network interface cards (NICs) and each NIC operates on a distinct frequency channel. Most of the recently proposed channel assignment algorithms are based on combinatorial techniques. Combinatorial channel assignment schemes may sometimes result in computationally complicated a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explicit Congestion Control Algorithms for Time Varying Capacity Media

    Publication Year: 2011, Page(s):81 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5155 KB) | HTML iconHTML Multimedia Media

    Explicit congestion control (XCC) is emerging as one potential solution for overcoming limitations inherent to the current TCP algorithm, characterized by unstable throughput, high queuing delay, RTT-limited fairness, and a static dynamic range that does not scale well to high bandwidth delay product networks. In XCC, routers provide multibit feedback to sources, which, in turn, adapt throughput m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks

    Publication Year: 2011, Page(s):94 - 107
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2688 KB) | HTML iconHTML

    Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monitoring system for wireless sensor networks. In our system, we design two in-network location anonymization algorithms, namely, resource and quality-aware algorithms, that aim to enable the system to provide high-quality loca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel-Aware Routing in MANETs with Route Handoff

    Publication Year: 2011, Page(s):108 - 121
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2334 KB) | HTML iconHTML

    In wireless mobile ad hoc networks (MANETs), packet transmission is impaired by radio link fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol to accommodate channel fading. Specifically, the proposed Channel-Aware AOMDV (CA-AOMDV) uses the channel average nonfading duration as a routing m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Cognitive Radio-Based Wireless Mesh Networks

    Publication Year: 2011, Page(s):122 - 135
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2065 KB) | HTML iconHTML Multimedia Media

    Cognitive radio presents a new approach to wireless spectrum utilization and management. In this work, the potential performance improvement gained by applying cognitive radio to wireless mesh networks is investigated. Specifically, the potential benefits in terms of QoS provided to users and the efficiency of resource utilization are quantified in a system consisting of a collection of one or mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Type-Aware Error Control for Robust Interactive Video Services over Time-Varying Wireless Channels

    Publication Year: 2011, Page(s):136 - 145
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1172 KB) | HTML iconHTML

    We propose a scheme called Type-Aware Error Control (TAEC) to provide robust interactive video services over time-varying wireless channels. Basically, TAEC explores the temporal dependence of video frames by pushing out the lower impact frames. In doing so, queuing delay is controlled and the important frame is retransmitted multiple times. We consider the application of the nonstationary stochas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • In-Network Computation in Random Wireless Networks: A PAC Approach to Constant Refresh Rates with Lower Energy Costs

    Publication Year: 2011, Page(s):146 - 155
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    We propose a method to compute a probably approximately correct (PAC) normalized histogram of observations with a refresh rate of Θ(1) time units per histogram sample on a random geometric graph with noise-free links. The delay in computation is Θ(√n) time units. We further extend our approach to a network with noisy links. While the refresh rate remains Θ(1) time units... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2010 Reviewers List

    Publication Year: 2011, Page(s):156 - 160
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • 2010 Annual Index

    Publication Year: 2011, Page(s): Not in Print
    Request permission for commercial reuse | PDF file iconPDF (576 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2011, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (295 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu