By Topic

IEEE Transactions on Mobile Computing

Issue 8 • Date Aug. 2011

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (427 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (299 KB)
    Freely Available from IEEE
  • Modeling and Improving TCP Performance over Cellular Link with Variable Bandwidth

    Publication Year: 2011, Page(s):1057 - 1070
    Cited by:  Papers (15)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1523 KB) | HTML iconHTML

    To facilitate a viable evolution of cellular networks toward extensive packet data traffic, the High Speed Downlink Packet Access (HSDPA) technology is introduced. The various link adaptation techniques employed by HSDPA augment the bandwidth variation, which is identified as one of the most important factors resulting in the deterioration of TCP performance. In this paper, we firstly build an ana... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Best Channel Feedback and Its Adaptive Algorithms for Multicarrier Wireless Data Systems

    Publication Year: 2011, Page(s):1071 - 1082
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1071 KB) | HTML iconHTML

    Multiuser diversity techniques are used in multicarrier data systems to enhance downlink cell throughput. This requires downlink channel information from the users that is opportunistically used by a base station to send data to the users with good channel condition. Channel feedback from the user to the base station incurs high overhead especially when many users are in the cell and each user nee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Zero Retransmission Overhead: A Symbol Level Network Coding Approach to Retransmission

    Publication Year: 2011, Page(s):1083 - 1095
    Cited by:  Papers (5)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (942 KB) | HTML iconHTML

    We present SYNC, a physical layer transmission scheme that drastically reduces the cost of retransmission by introducing network coding concepts to symbol level operation. It piggybacks a new packet on each retransmitted packet, and exploits the previously received packet (possibly with error) at the receiver to recover both the retransmitted packet and the piggybacked packet. The piggybacking is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure

    Publication Year: 2011, Page(s):1096 - 1112
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1948 KB) | HTML iconHTML

    Stealthy packet dropping is a suite of four attacks-misrouting, power control, identity delegation, and colluding collision-that can be easily launched against multihop wireless ad hoc networks. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate node. However, the malicious node gives the impression to its neighbors that it perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Network Mobility (SeNEMO) for Real-Time Applications

    Publication Year: 2011, Page(s):1113 - 1130
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2841 KB) | HTML iconHTML

    The IETF NEtwork MObility (NEMO) working group has considered how to enable an entire network to move from one location to another. Mobile Virtual Private Network (VPN) has been developed to secure mobile user's communication between untrusted external networks and the protected private internal network. However, the IETF's mobile VPN does not address how to support NEMO. In addition, it is not su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integration Gain of Heterogeneous WiFi/WiMAX Networks

    Publication Year: 2011, Page(s):1131 - 1143
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    We study the integrated WiFi/WiMAX networks, where users are equipped with dual-radio interfaces that can connect to either a WiFi or a WiMAX network. Previous research on integrated heterogeneous networks (e.g., WiFi/cellular) usually considers one network as the main and the other as the auxiliary. The performance of the integrated network is compared with the "main” network. The gain is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAP: Multiauctioneer Progressive Auction for Dynamic Spectrum Access

    Publication Year: 2011, Page(s):1144 - 1161
    Cited by:  Papers (75)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1304 KB) | HTML iconHTML

    Cognitive radio (CR) is a promising paradigm to achieve efficient utilization of the limited spectrum resource by allowing the unlicensed users to access the licensed spectrum, and dynamic spectrum access (DSA) is one of the fundamental functions of CR networks. Market-driven spectrum auction has been recognized as an effective way to achieve DSA. In spectrum auction, the primary spectrum owners (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks

    Publication Year: 2011, Page(s):1162 - 1174
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1337 KB) | HTML iconHTML

    Several intrusion detection techniques (IDTs) proposed for mobile ad hoc networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents quantitative evaluations of false positives and their impact on monitoring-based intrusion detection for ad hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad hoc network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal and Efficient Graph-Based Resource Allocation Algorithms for Multiservice Frame-Based OFDMA Networks

    Publication Year: 2011, Page(s):1175 - 1186
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1142 KB) | HTML iconHTML

    This paper addresses the resource allocation problem in Orthogonal Frequency Division Multiple Access (OFDMA)-based wireless networks. The resource allocation problem is posed as an optimization problem with individual user constraints. This formulation provides a special structure that lends to efficient solution of the problem. We develop an optimal algorithm based on standard graph theory and L... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compatibility between Three Well-Known Broadcast Tree Construction Algorithms and Various Metrics

    Publication Year: 2011, Page(s):1187 - 1199
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (874 KB) | HTML iconHTML

    Broadcast routing is a critical component in the routing design. While there are plenty of routing metrics and broadcast routing schemes in current literature, it remains an unsolved problem as to which metrics are compatible with a specific broadcast routing scheme. In particular, in the wireless broadcast routing context where transmission has an inherent broadcast property, there is a potential... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society OnlinePlus: Publishing Evolved [advertisement]

    Publication Year: 2011, Page(s): 1200
    Request permission for commercial reuse | PDF file iconPDF (215 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2011, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (299 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (427 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu