IEEE Transactions on Mobile Computing
Papers 2822
1 page of 283 pages (2,822 results)
#1Feilong Tang (SJTU: Shanghai Jiao Tong University)H-Index: 14
#2Heteng Zhang (SJTU: Shanghai Jiao Tong University)H-Index: 1
Last.Xu Li (SJTU: Shanghai Jiao Tong University)
view all 4 authors...
In most existing routing algorithms for mobile ad hoc cognitive networks (MACNets), nodes are configured with a fixed even maximal transmission power. Links set up by such the algorithms often suffer from excessive co-channel interference, which significantly downgrades performance of MACNets because the link stability highly depends on not only node mobility but also co-channel interference. In this paper, we investigate how to improve route stability through jointly considering routing with ad...
#1Chen Chen (Xidian University)H-Index: 10
#2Jinna Hu (Xidian University)H-Index: 2
Last.Zhiyuan Ren (Xidian University)H-Index: 4
view all 5 authors...
As one of the key services for non-safety applications in Vehicular Ad-hoc Networks (VANETs), the Popular Content Distribution (PCD) has become a hot issue in recent years. In popular content distribution, the On-Board Units (OBUs) passing the Area of Interest (AoI) receive popular content broadcast by the RoadSide Units (RSUs). However, due to the high speed of OBUs, limited bandwidth, and unstable wireless connections, only a portion of the popular content can be received by OBUs. To address t...
7 CitationsSource
#1Tianchong Gao (IUPUI: Indiana University – Purdue University Indianapolis)H-Index: 2
#2Wei Peng (Intel)H-Index: 8
Last.Mohammad Al Hasan (IUPUI: Indiana University – Purdue University Indianapolis)H-Index: 14
view all 6 authors...
Android systems are widely used in mobile & wireless distributed systems. In the near future, Android is believed to dominate the mobile distributed environment. However, with the popularity of Android-based smartphones/tablets comes the rampancy of Android-based malware. In this paper, we propose a novel topological signature of Android apps based on the function call graphs (FCGs) extracted from their Android App PacKages (APKs). Specifically, by leveraging recent advances on graphlet mining, ...
2 CitationsSource
#1Kazuya Sakai (Tokyo Metropolitan University)H-Index: 9
#2Min-Te Sun (NCU: National Central University)H-Index: 18
Last.Jie Wu (TU: Temple University)H-Index: 91
view all 4 authors...
Due to instability of links in the network, the model of delay tolerant networks (DTNs) is often adopted in many emerging mobile applications. To organizations and individuals using these mobile applications, security and privacy are considered to be two of the most significant concerns. This research seeks to address anonymous communications in DTNs. While many different anonymous routing protocols have been proposed for ad hoc networks, to the best of our knowledge, only variants of onion-base...
1 CitationsSource
#1Zhenyu Yan (NTU: Nanyang Technological University)H-Index: 1
#2Rui Tan (NTU: Nanyang Technological University)H-Index: 21
Last.Jun Huang (PKU: Peking University)H-Index: 9
view all 4 authors...
Design of clock synchronization for networked nodes faces a fundamental trade-off between synchronization accuracy and universality of heterogeneous platforms, because a high synchronization accuracy generally requires platform-dependent hardware-level network packet timestamping. This paper presents TouchSync , a new indoor clock synchronization approach for wearables that achieves millisecond accuracy while preserving universality in that it uses standard system calls only, such as reading sys...
#1Xiaoying Liu (Zhejiang University of Technology)H-Index: 1
#2Kechen Zheng (Zhejiang University of Technology)H-Index: 2
Last.Yihua Zhu (Zhejiang University of Technology)H-Index: 1
view all 5 authors...
This paper characterizes the throughput and delay performance of Cognitive Radio Networks (CRNs), where both primary and secondary networks coexist in a unit torus. Specifically, the primary network consists of static primary nodes (PNs) of density nn , which have a higher priority to access the spectrum. In contrast, the secondary network consists of mobile secondary nodes (SNs) of density m=n^{\beta }m = n β with \beta \geq 1β ≥ 1 , which move according to a hybrid random walk mobilit...
1 CitationsSource
#1Snigdha Das (IIT-KGP: Indian Institute of Technology Kharagpur)H-Index: 3
#2Soumyajit Chatterjee (IIT-KGP: Indian Institute of Technology Kharagpur)H-Index: 1
Last.Bivas Mitra (IIT-KGP: Indian Institute of Technology Kharagpur)H-Index: 9
view all 4 authors...
In an organization, individuals prefer to form various formal and informal groups for mutual interactions. Therefore, ubiquitous identification of such groups and understanding their dynamics are important to monitor activities, behaviors, and well-being of the individuals. In this paper, we develop a lightweight, yet near-accurate, methodology, called GroupSense , to identify various interacting groups based on collective sensing through users’ smartphones. Group detection from sensor signals i...
1 CitationsSource
#1Haichuan Ding (UF: University of Florida)H-Index: 5
#2Yuanxiong Guo (OSU: Oklahoma State University–Stillwater)H-Index: 11
Last.Fang Yuguang (UF: University of Florida)H-Index: 66
view all 4 authors...
In this paper, we introduce a network entity called point of connection (PoC), which is equipped with customized powerful communication, computing, and storage (CCS) capabilities, and design a da ta t r ansportation ne t work (DART) of interconnected PoCs to facilitate the provision of Internet of Things (IoT) services. By exploiting the powerful CCS capabilities of PoCs, DART brings both communication and computing services much closer to end devices so that resource-constrained IoT devices cou...
3 CitationsSource
#1Hanshang Li (UNCC: University of North Carolina at Charlotte)H-Index: 6
#2Ting Li (UNCC: University of North Carolina at Charlotte)H-Index: 5
Last.Yu Wang (UNCC: University of North Carolina at Charlotte)H-Index: 42
view all 4 authors...
With the rapid increasing of smart phones and the advances of embedded sensing technologies, mobile crowd sensing (MCS) becomes an emerging sensing paradigm for large-scale sensing applications. One of the key challenges of large-scale mobile crowd sensing is how to effectively select the minimum set of participants from the huge user pool to perform the tasks and achieve a certain level of coverage while satisfying some constraints. This becomes more complex when the sensing tasks are dynamic (...
#1Jongho Won (Purdue University)H-Index: 7
#2Elisa Bertino (Purdue University)H-Index: 80
Many localization techniques for wireless sensor networks have been proposed to estimate sensor positions even when there is malicious location information which distorts the estimate. Some of those solutions efficiently estimate sensor positions using the Minimum Mean Square Estimation methods and the Degree-Of-Consistency (DOC). Although such solutions can filter out most of malicious information, if an attacker knows the position of the target sensor, the attacker can significantly alter its ...
Top fields of study
Wireless network
Distributed computing
Mobile computing
Computer network
Computer science