Volume 15 | Issue 12

The IEEE Transactions on Mobile Computing (TMC) is a bimonthly journal for publishing archival research results related to mobility of users, systems, data, and computing as well as issues in information organization and access, services, management, and applications. It emphasizes various areas of nomadic computing, multimedia applications, mobile data and knowledge management, and mobile communication systems and networking.

Submit your Manuscript


Ramesh Govindan
Department of Computer Science
University of Southern California
3710 S. McClintock Ave., RTH 412
Los Angeles, CA 90089-2905


Presents the introductory editorial for this issue of the publication.

Existing Location-based social networks (LBSNs), e.g., Foursquare, depend mainly on GPS or cellular-based localization to infer users’ locations. However, GPS is unavailable indoors and cellular-based localization provides coarse-grained accuracy. This limits the accuracy of current LBSNs in indoor environments, where people spend 89 percent of their time. This in turn affects the user... Read more on IEEE Xplore

A code is said to possess the combination property if <inline-formula> <img src="http://ieeexplore.ieee.org/images/tex/348.gif" alt="k"> <alternatives><inline-graphic xlink:href="wang-ieq1-2591537.gif"/></alternatives></inline-formula> source packets are mapped into <inline-formula> <img src="http://ieeexplore.ieee.... Read more on IEEE Xplore

The global, ubiquitous usage of smart handsets and diverse wireless communication tools calls for a meticulous reexamination of complex and dynamic service componentization and remote invocation. In order to satisfy ever-increasing service requirements and enrich users&#x2019; experiences, efficient service composition approaches, which leverage the computing resources on nearby devices to... Read more on IEEE Xplore

We present the design, implementation, and evaluation of an RFID-based cellphone anti-lost and anti-theft measure. The cellphone owner is given an audio-visual alert at the very instant of the lost event, and the cellphone deduces the fact that it is away from its owner and executes the safety measures. This is realized by equipping the cellphone with a low-power RFID Reader and tagging the owner... Read more on IEEE Xplore