Volume 8 Issue 3 • March 2009
Filter Results
-
[Front cover]
Publication Year: 2009, Page(s): c1|
PDF (272 KB)
-
[Inside front cover]
Publication Year: 2009, Page(s): c2|
PDF (122 KB)
-
Information Density Estimation for Content Retrieval in MANETs
Publication Year: 2009, Page(s):289 - 303
Cited by: Papers (5) | Patents (1)The paper focuses on a cooperative environment in wireless ad hoc networks, where mobile nodes share information in a peer-to-peer fashion. Nodes follow a pure peer-to-peer approach (i.e., without the intervention of servers), thus requiring an efficient query/response propagation algorithm to prevent network congestion. The main contribution of the paper is the proposal of a novel solution, calle... View full abstract»
-
A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice
Publication Year: 2009, Page(s):304 - 321
Cited by: Papers (21) | Patents (2)Location based services(LBS) are becoming increasingly important to the success and attractiveness of next generation wireless systems. However, a natural tension arises between the need for user privacy and the flexible use of location information. In this paper we present a framework to support privacy enhanced location based services. We classify the services according to several basic criteria... View full abstract»
-
Cost- and Collision-Minimizing Forwarding Schemes for Wireless Sensor Networks: Design, Analysis and Experimental Validation
Publication Year: 2009, Page(s):322 - 337
Cited by: Papers (17)The paper presents an original integrated MAC and routing scheme for wireless sensor networks. Our design objective is to elect the next hop for data forwarding by jointly minimizing the amount of signaling to complete a contention and maximizing the probability of electing the best candidate node. Towards this aim, we represent the suitability of a node to be the relay by means of locally calcula... View full abstract»
-
Cooperative Asynchronous Multichannel MAC: Design, Analysis, and Implementation
Publication Year: 2009, Page(s):338 - 352
Cited by: Papers (63)Medium access control (MAC) protocols have been studied under different contexts for decades. In decentralized contexts, transmitter-receiver pairs make independent decisions, which are often suboptimal due to insufficient knowledge about the communication environment. In this paper, we introduce distributed information sharing (DISH), which is a distributed flavor of control-plane cooperation, as... View full abstract»
-
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)
Publication Year: 2009, Page(s):353 - 368
Cited by: Papers (34)In the last few years, the growing popularity of mobile devices has made them attractive to virus and worm writers. One communication channel often exploited by mobile malware is the Bluetooth interface. In this paper, we present a detailed analytical model that characterizes the propagation dynamics of Bluetooth worms. Our model captures not only the behavior of the Bluetooth protocol but also th... View full abstract»
-
Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks
Publication Year: 2009, Page(s):369 - 383
Cited by: Papers (23) | Patents (1)In wireless ad hoc networks (WANets), multihop routing may result in a radio knowing the content of transmissions of nearby radios. This knowledge can be used to improve spatial reuse in the network, thereby enhancing network throughput. Consider two radios, Alice and Bob, that are neighbors in a WANet not employing spread-spectrum multiple access. Suppose that Alice transmits a packet to Bob for ... View full abstract»
-
Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks
Publication Year: 2009, Page(s):384 - 397
Cited by: Papers (18)The problem of cache sharing for supporting data access in mobile ad hoc networks is studied in this paper. The key to this problem is to discover a requested data item in an efficient manner. In the paper, we propose two caching protocols, IXP and DPIP, which distinguish themselves from the existing ones in that they fully exploit in-zone broadcasts to facilitate cache sharing operation. In parti... View full abstract»
-
Passive Online Detection of 802.11 Traffic Using Sequential Hypothesis Testing with TCP ACK-Pairs
Publication Year: 2009, Page(s):398 - 412
Cited by: Papers (6)In this paper, we propose two online algorithms to detect 802.11 traffic from packet-header data collected passively at a monitoring point. These algorithms have a number of applications in real-time wireless LAN management, for instance, in detecting unauthorized access points and detecting/predicting performance degradations. Both algorithms use sequential hypothesis tests and exploit fundamenta... View full abstract»
-
An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks
Publication Year: 2009, Page(s):413 - 425
Cited by: Papers (39)While multi-hop broadcast protocols, such as Trickle, Deluge and MNP, have gained tremendous popularity as a means for fast and convenient propagation of data/code in large scale wireless sensor networks, they can, unfortunately, serve as potential platforms for virus spreading if the security is breached. To understand the vulnerability of such protocols and design defense mechanisms against pigg... View full abstract»
-
IEEE Computer Society 2009 Membership Application
Publication Year: 2009, Page(s):426 - 428|
PDF (226 KB)
-
Build Your Career in Computing [advertisement]
Publication Year: 2009, Page(s): 429|
PDF (84 KB)
-
IEEE Computer Society Career Center
Publication Year: 2009, Page(s): 430|
PDF (308 KB)
-
IEEE Computer Society Certified Software Development Professional
Publication Year: 2009, Page(s): 431|
PDF (76 KB)
-
Silver Bullet Security Podcast Series
Publication Year: 2009, Page(s): 432|
PDF (1080 KB)
-
TMC Information for authors
Publication Year: 2009, Page(s): c3|
PDF (122 KB)
-
[Back cover]
Publication Year: 2009, Page(s): c4|
PDF (272 KB)
Aims & Scope
Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.
Meet Our Editors
Editor-in-Chief
Marwan Krunz
Kenneth VonBehren Endowed Professor
Site Co-Director, NSF BWAC Center
Dept. of Electrical & Computer Engineering
The University of Arizona
Tucson, AZ 85721, USA
krunz@email.arizona.edu
Associate Editor-in-Chief
Kevin Almeroth
Computer Science Department
Univ. of California, Santa Barbara, USA
almeroth@cs.ucsb.edu