Volume 17 | Issue 11

The IEEE Transactions on Mobile Computing (TMC) is a bimonthly journal for publishing archival research results related to mobility of users, systems, data, and computing as well as issues in information organization and access, services, management, and applications. It emphasizes various areas of nomadic computing, multimedia applications, mobile data and knowledge management, and mobile communication systems and networking.

Submit your Manuscript

Editor

Marwan Krunz
Kenneth VonBehren Endowed Professor
Site Co-Director, NSF BWAC Center
Dept. of Electrical & Computer Engineering
The University of Arizona
Tucson, AZ 85721, USA
krunz@email.arizona.edu

Articles

Scalable routing for wireless communication systems is a compelling and challenging task. To this aim, routing algorithms exploiting geographic information have been proposed. These algorithms refer to nodes by their location, rather than their address, and use those coordinates to route greedily towards a destination. With the advent of unmanned airborne vehicle (UAV) technology, a lot of... Read more on IEEE Xplore

Designing decentralized policies for wireless communication networks is a crucial problem, which has only been partially solved in the literature so far. In this paper, we propose a Decentralized Markov Decision Process (Dec-MDP) framework to analyze a wireless sensor network with multiple users which access a common wireless channel. We consider devices with energy harvesting capabilities, that... Read more on IEEE Xplore

Through the availability of location-acquisition devices, huge volumes of spatio-temporal data recording the movement of people is provided. Discovery of the group of people who travel together can provide valuable knowledge to a variety of critical applications. Existing studies on this topic mainly focus on the movement of vehicles or animals with forcing the group members to stay always... Read more on IEEE Xplore

Advanced persistent threats (APTs) are a major threat to cyber-security, causing significant financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is applied to study the interactions between a cyber system and an APT attacker when each of them makes subjective decisions to choose their scan interval and attack interval, respectively. Both the probability... Read more on IEEE Xplore

Location-based service (LBS) has gained increasing popularity recently, but protecting users’ privacy in LBS remains challenging. Depending on whether a trusted third party (TTP) is used, existing solutions can be classified into: TTP-based and TTP-free. The former relies on a TTP for user privacy protection, which creates a single-point-failure and is thus impractical in reality. The... Read more on IEEE Xplore