By Topic

IEEE Transactions on Mobile Computing

Issue 2 • Date Feb. 2012

Filter Results

Displaying Results 1 - 19 of 19
  • [Cover 2]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (297 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (384 KB)
    Freely Available from IEEE
  • Guest Editorial: Special Section on Outstanding Papers from DySPAN 2011

    Publication Year: 2012, Page(s): 177
    Request permission for commercial reuse | PDF file iconPDF (32 KB) | HTML iconHTML
    Freely Available from IEEE
  • TV White Space in Europe

    Publication Year: 2012, Page(s):178 - 188
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2730 KB) | HTML iconHTML

    In this paper, we study the availability of TV white spaces in Europe. Specifically, we focus on the 470-790 MHz UHF band, which will predominantly remain in use for TV broadcasting after the analog-to-digital switch-over and the assignment of the 800 MHz band to licensed services have been completed. The expected number of unused, available TV channels in any location of the 11 countries we studi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SenseLess: A Database-Driven White Spaces Network

    Publication Year: 2012, Page(s):189 - 203
    Cited by:  Papers (59)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1199 KB) | HTML iconHTML

    The 2010 FCC ruling on white spaces proposes relying on a database of incumbents as the primary means of determining white space availability at any white space device (WSD). While the ruling provides broad guidelines for the database, the specifics of its design, features, implementation, and use are yet to be determined. Furthermore, architecting a network where all WSDs rely on the database rai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Origins of Heavy-Tailed Delay in Dynamic Spectrum Access Networks

    Publication Year: 2012, Page(s):204 - 217
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1080 KB) | HTML iconHTML

    This paper provides an asymptotic analysis of the transmission delay experienced by SUs for dynamic spectrum access (DSA) networks. It is shown that DSA induces only light-tailed delay if both the busy time of PU channels and the message size of SUs are light tailed. On the contrary, if either the busy time or the message size is heavy tailed, then the SUs' transmission delay is heavy tailed. For ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource-Optimized Quality-Assured Ambiguous Context Mediation Framework in Pervasive Environments

    Publication Year: 2012, Page(s):218 - 229
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (943 KB) | HTML iconHTML Multimedia Media

    Pervasive computing applications often involve sensor-rich networking environments that capture various types of user contexts such as locations, activities, vital signs, and so on. Such context information is useful in a variety of applications, for example, monitoring health information to promote independent living in "aging-in-place” scenarios, or providing safety and security of people... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relay-Assisted Transmission with Fairness Constraint for Cellular Networks

    Publication Year: 2012, Page(s):230 - 239
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (959 KB) | HTML iconHTML Multimedia Media

    We consider the problem of relay-assisted transmission for cellular networks. In the considered system, a source node together with n relay nodes are selected in a proportionally fair (PF) manner to transmit to the base station (BS), which uses the maximal ratio combining (MRC) to combine the signals received from the source node in the first half slot and the n relay nodes in the second half slot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stateless Multicast Protocol for Ad Hoc Networks

    Publication Year: 2012, Page(s):240 - 253
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1986 KB) | HTML iconHTML

    Multicast routing protocols typically rely on the a priori creation of a multicast tree (or mesh), which requires the individual nodes to maintain state information. In dynamic networks with bursty traffic, where long periods of silence are expected between the bursts of data, this multicast state maintenance adds a large amount of communication, processing, and memory overhead for no benefit to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Geometry and Motion-Based Positioning Algorithms for Mobile Tracking in NLOS Environments

    Publication Year: 2012, Page(s):254 - 263
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (814 KB) | HTML iconHTML Multimedia Media

    This paper presents positioning algorithms for cellular network-based vehicle tracking in severe non-line-of-sight (NLOS) propagation scenarios. The aim of the algorithms is to enhance positional accuracy of network-based positioning systems when the GPS receiver does not perform well due to the complex propagation environment. A one-step position estimation method and another two-step method are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees

    Publication Year: 2012, Page(s):264 - 277
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1116 KB) | HTML iconHTML

    Wireless Mesh Network (WMN) has become an important edge network to provide Internet access to remote areas and wireless connections in a metropolitan scale. In this paper, we study the problem of identifying the maximum available bandwidth path, a fundamental issue in supporting quality-of-service in WMNs. Due to interference among links, bandwidth, a well-known bottleneck metric in wired network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network

    Publication Year: 2012, Page(s):278 - 291
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2146 KB) | HTML iconHTML

    In a mobile ad hoc network, the mobility and resource constraints of mobile nodes may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation. Most of them assume that all mobile nodes collaborate fully in terms of sharing their memory space. In reality, however, some nodes may selfishly decide only to coop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differentiated Protection of Video Layers to Improve Perceived Quality

    Publication Year: 2012, Page(s):292 - 304
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3294 KB) | HTML iconHTML

    Scalable video transmission over a network is easily adaptable to different types of mobile experiencing different network conditions. However the transmission of differentiated video packets in an error-prone wireless environment remains problematic. We propose and analyze a cross-layer error control scheme that exploits priority-aware block interleaving (PBI) in the MAC layer for video broadcast... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet

    Publication Year: 2012, Page(s):305 - 319
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2213 KB) | HTML iconHTML

    The pervasive adoption of IEEE 802.11 radios in the past decade has made possible for the easy Internet access from a vehicle, notably drive-thru Internet. Originally designed for the static indoor applications, the throughput performance of IEEE 802.11 in the outdoor vehicular environment is, however, still unclear especially when a large number of fast-moving users transmitting simultaneously. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

    Publication Year: 2012, Page(s):320 - 336
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (842 KB) | HTML iconHTML

    While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. Exis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User

    Publication Year: 2012, Page(s):337 - 351
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (990 KB) | HTML iconHTML Multimedia Media

    A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a small number of wireless devices (i.e., two) or otherwise rely on the presence of an auxiliary device (such as a programmable camera, computer, or Faraday cage). In this paper, we design a solution that allows a user unaid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transactions Information Page

    Publication Year: 2012, Page(s): 352
    Request permission for commercial reuse | PDF file iconPDF (339 KB)
    Freely Available from IEEE
  • [Cover3]

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (297 KB)
    Freely Available from IEEE
  • [Cover 4]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (384 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu