By Topic

Mobile Computing, IEEE Transactions on

Issue 2 • Date Feb. 2011

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2011 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (292 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2011 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (149 KB)  
    Freely Available from IEEE
  • A Spectrum Decision Framework for Cognitive Radio Networks

    Publication Year: 2011 , Page(s): 161 - 174
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2285 KB) |  | HTML iconHTML  

    Cognitive radio networks have been proposed as a solution to both spectrum inefficiency and spectrum scarcity problems. However, they face to a unique challenge based on the fluctuating nature of heterogeneous spectrum bands as well as the diverse service requirements of various applications. In this paper, a spectrum decision framework is proposed to determine a set of spectrum bands by consideri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Fault-Tolerant Quality of Wireless Networks

    Publication Year: 2011 , Page(s): 175 - 190
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3271 KB) |  | HTML iconHTML  

    A mobile ad hoc network (MANET) consists of a group of communicating hosts that form an arbitrary network topology by means of any of several wireless communication media. MANET communications represent a diversification in communication technology necessary to solve the stringent end-to-end requirements of QoS-based communication networks. Of the many challenges in this complex distributed system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention

    Publication Year: 2011 , Page(s): 191 - 204
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1495 KB) |  | HTML iconHTML  

    In today's wireless networks, stations using the IEEE 802.11 Standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, we present a Medium Access Control (MAC) scheme for wirel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients

    Publication Year: 2011 , Page(s): 205 - 215
    Cited by:  Papers (22)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1027 KB) |  | HTML iconHTML  

    When implementing data encryption and decryption in a symmetric cryptosystem, secure distribution of the secret key to legitimate nodes can be a challenge. In this paper, we consider establishing secret keys using the common wireless channel, with particular emphasis on the spatial and temporal correlations of the channel coefficients. Specifically, we investigate the influence of channel correlat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rendezvous for Cognitive Radios

    Publication Year: 2011 , Page(s): 216 - 227
    Cited by:  Papers (73)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1349 KB) |  | HTML iconHTML  

    Cognitive radios have been touted as a solution to communicating in a Dynamic Spectrum Access environment. This paper examines how cognitive radios initially find one another among the expanse of ever-changing open spectrum, termed the rendezvous problem. Specifically, it addresses the problem of rendezvous under varying levels of system capabilities, spectrum policies, and environmental condition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OFDM-Based Common Control Channel Design for Cognitive Radio Ad Hoc Networks

    Publication Year: 2011 , Page(s): 228 - 238
    Cited by:  Papers (20)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (864 KB) |  | HTML iconHTML  

    Cognitive radio (CR) technology allows devices to opportunistically use the vacant portions of the licensed wireless spectrum. However, the available spectrum changes dynamically with the primary user (PU) activity, necessitating frequent PU sensing coordination and exchanging network topology information in a multihop CR ad hoc network. To facilitate these tasks, an always-on, out-of-band common ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive Medium Access: Exploration, Exploitation, and Competition

    Publication Year: 2011 , Page(s): 239 - 253
    Cited by:  Papers (66)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1005 KB) |  | HTML iconHTML  

    This paper considers the design of efficient strategies that allow cognitive users to choose frequency bands to sense and access among multiple bands with unknown parameters. First, the scenario in which a single cognitive user wishes to opportunistically exploit the availability of frequency bands is considered. By adopting tools from the classical bandit problem, optimal as well as low complexit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Geocast for Mobile Ad Hoc Networks

    Publication Year: 2011 , Page(s): 254 - 266
    Cited by:  Papers (17)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1216 KB) |  | HTML iconHTML  

    Geographic addressing of packets within mobile ad hoc networks enables novel applications, including hard real-time engagement simulation in military training systems, geographic command and control functions in training and emergency communications, and commercial messaging applications as well. The most scalable implementation of geoaddressing is via a geocast protocol, where nodes selectively r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anticollision Protocols for Single-Reader RFID Systems: Temporal Analysis and Optimization

    Publication Year: 2011 , Page(s): 267 - 279
    Cited by:  Papers (33)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1004 KB) |  | HTML iconHTML  

    One of the major challenges in the use of Radio Frequency-based Identification (RFID) on a large scale is the ability to read a large number of tags quickly. Central to solving this problem is resolving collisions that occur when multiple tags reply to the query of a reader. To this purpose, several MAC protocols for passive RFID systems have been proposed. These typically build on traditional MAC... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Games for Vehicular Networks

    Publication Year: 2011 , Page(s): 280 - 290
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2676 KB) |  | HTML iconHTML  

    Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoretic framework where defensive measures are optimized with respect to threats posed by malicious attackers. The formulations are chosen to be abstract on purpose in order to maximize applicability of the models and solutions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discriminant Minimization Search for Large-Scale RF-Based Localization Systems

    Publication Year: 2011 , Page(s): 291 - 304
    Cited by:  Papers (8)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1226 KB) |  | HTML iconHTML  

    In large-scale fingerprinting localization systems, fine-grained location estimation and quick location determination are conflicting concerns. To achieve finer grained localization, we have to collect signal patterns at a larger number of training locations. However, this will incur higher computation cost during the pattern-matching process. In this paper, we propose a novel discriminant minimiz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TMC Information for authors

    Publication Year: 2011 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (149 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2011 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (292 KB)  
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu