By Topic

IEEE Transactions on Mobile Computing

Issue 4 • July-Aug. 2005

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2005, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • An enhanced inter-access point protocol for uniform intra and intersubnet handoffs

    Publication Year: 2005, Page(s):321 - 334
    Cited by:  Papers (17)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1312 KB) | HTML iconHTML

    An enhanced IEEE 802.11 inter-access point protocol (IAPP) is proposed to provide a unified solution for both intra and intersubnet handoff processes. The proposed enhancement relies on the access point's (AP's) interoperability with other APs, provided by the IP-based IAPP, so as to enable the intra and intersubnet link-layer frame buffering-and-forwarding. This enhancement not only eliminates fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AO2P: ad hoc on-demand position-based private routing protocol

    Publication Year: 2005, Page(s):335 - 348
    Cited by:  Papers (52)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1352 KB) | HTML iconHTML

    Privacy is needed in ad hoc networks. An ad hoc on-demand position-based private routing algorithm, called AO2P, is proposed for communication anonymity. Only the position of the destination is exposed in the network for route discovery. To discover routes with the limited routing information, a receiver contention scheme is designed for determining the next hop. Pseudo identifiers are used for da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion control policies for IP-based CDMA radio access networks

    Publication Year: 2005, Page(s):349 - 362
    Cited by:  Papers (7)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB) | HTML iconHTML

    As CDMA-based cellular networks mature, the current point-to-point links used in connecting base stations to network controllers evolve to an IP-based radio access network (RAN) for reasons of lower cost due to statistical multiplexing gains, better scalability and reliability, and the projected growth in data applications. In this paper, we study the impact of congestion in a best-effort IP RAN o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contention-aware admission control for ad hoc networks

    Publication Year: 2005, Page(s):363 - 377
    Cited by:  Papers (172)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1224 KB) | HTML iconHTML

    An admission control algorithm must coordinate between flows to provide guarantees about how the medium is shared. In wired networks, nodes can monitor the medium to see how much bandwidth is being used. However, in ad hoc networks, communication from one node may consume the bandwidth of neighboring nodes. Therefore, the bandwidth consumption of flows and the available resources to a node are not... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EBA: an enhancement of the IEEE 802.11 DCF via distributed reservation

    Publication Year: 2005, Page(s):378 - 390
    Cited by:  Papers (89)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1144 KB) | HTML iconHTML

    The IEEE 802.11 standard for wireless local area networks (WLANs) employs a medium access control (MAC), called distributed coordination function (DCF), which is based on carrier sense multiple access with collision avoidance (CSMA/CA). The collision avoidance mechanism utilizes the random backoff prior to each frame transmission attempt. The random nature of the backoff reduces the collision prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On supporting power-efficient streaming applications in wireless environments

    Publication Year: 2005, Page(s):391 - 403
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    Reducing the power consumption of the wireless network interface (WNl) is an effective way to prolong the battery lifetime of the mobile terminal. It takes some time for the WNI to transit from the power-saving mode to the active mode. This transition delay and the error-prone wireless link bring many challenges for designing power-aware and QoS-aware service models. In this paper, we present a no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the stationary distribution of speed and location of random waypoint

    Publication Year: 2005, Page(s):404 - 405
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB) | HTML iconHTML

    In "Stationary distributions for the random waypoint mobility model" (TMC, Vol. 3, No, 1), Navidi and Camp find the stationary distribution of the random waypoint model, with or without pause on a rectangular area. In this short note, we show that, under the stationary regime, speed and location are independent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement]

    Publication Year: 2005, Page(s): 406
    Request permission for commercial reuse | PDF file iconPDF (374 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2005, Page(s): 407
    Request permission for commercial reuse | PDF file iconPDF (663 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2005, Page(s): 408
    Request permission for commercial reuse | PDF file iconPDF (513 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2005, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2005, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu