No abstract available.
Analysis of a local-area wireless network
To understand better how users take advantage of wireless networks, we examine a twelve-week trace of a building-wide local-area wireless network. We analyze the network for overall user behavior (when and how intensively people use the network and how ...
Dynamic power management for portable systems
Portable systems require long battery lifetime while still delivering high performance. Dynamic power management (DPM) policies trade off the performance for the power consumption at the system level in portable devices. In this work we present the time-...
Experiences of developing and deploying a context-aware tourist guide: the GUIDE project
The GUIDE system has been developed to provide city visitors with a hand-held context-aware tourist guide. The system has been successfully deployed in a major tourist destination and is currently at the stage where it is publicly available to visitors ...
The Cricket location-support system
This paper presents the design, implementation, and evaluation of Cricket, a location-support system for in-building, mobile, location-dependent applications. It allows applications running on mobile and static nodes to learn their physical location by ...
Sending messages to mobile users in disconnected ad-hoc wireless networks
An ad-hoc network is formed by a group of mobile hosts upon a wireless network interface. Previous research in this area has concentrated on routing algorithms which are designed for fully connected networks. The usual way to deal with a disconnected ad-...
Directed diffusion: a scalable and robust communication paradigm for sensor networks
Advances in processor, memory and radio technology will enable small and cheap nodes capable of sensing, communication and computation. Networks of such nodes can coordinate to perform distributed sensing of environmental phenomena. In this paper, we ...
Analysis of analytical mobility models with respect to the applicability for handover modeling and to the estimation of signaling cost
This paper analyzes two analytical mobility models for their suitability to handover modeling and to the estimation of signaling cost. Some insufficiencies of the often employed Hong/Rappaport model are detected. Here, an infinite mean dwell time occurs ...
A new model for packet scheduling in multihop wireless networks
The goal of packet scheduling disciplines is to achieve fair and maximum allocation of channel bandwidth. However, these two criteria can potentially be in conflict in a generic-topology multihop wireless network where a single logical channel is shared ...
Achieving MAC layer fairness in wireless packet networks
Link-layer fairness models that have been proposed for wireline and packet cellular networks cannot be generalized for shared channel wireless networks because of the unique characteristics of the wireless channel, such as location-dependent contention, ...
Intersystem location update and paging schemes for multitier wireless networks
Global wireless networks enable mobile users to communicate regardless of their locations. One of the most important issues is location management in a highly dynamic environment because mobile users may roam between different wireless networks, network ...
Tracking mobile users with uncertain parameters
A method of reducing the wireless cost of tracking mobile users with uncertain parameters is developed in this paper. Such uncertainty arises naturally in wireless networks, since an efficient user tracking is based on a prediction of its future call ...
A scalable location service for geographic ad hoc routing
GLS is a new distributed location service which tracks mobile node locations. GLS combined with geographic forwarding allows the construction of ad hoc mobile networks that scale to a larger number of nodes than possible with previous work. GLS is ...
A unified header compression framework for low-bandwidth links
Compressing protocol headers has traditionally been an attractive way of conserving bandwidth over low-speed links, including those in wireless systems. However, despite the growth in recent years in the number of end-to-end protocols beyond TCP/IP, ...
Reduced cell switching in a mobile computing environment
With the huge growth and the market for laptop and palmtop computer purchases, a rapid increase of mobile usage in the Internet is expected. As mobile nodes move in a wireless computer network, a mobile node must determine when to switch its link-level ...
An end-to-end approach to host mobility
We present the design and implementation of an end-to-end architecture for Internet host mobility using dynamic updates to the Domain Name System (DNS) to track host location. Existing TCP connections are retained using secure and efficient connection ...
Distributed fair scheduling in a wireless LAN
Fairness is an important issue when accessing a shared wireless channel. With fair scheduling, it is possible to allocate bandwidth in proportion to weightsof the packet flows sharing the channel. This paper presents a fully distributed algorithm for ...
Downlink scheduling in CDMA data networks
Packet data is expected to dominate third generation wireless networks, unlike current generation voice networks. This opens up new and interesting problems. Physical and link layer issues have been studied extensively, while resource allocation and ...
Adaptive allocation of CDMA resources for network-level QoS assurances
In a Code Division Multiple Access (CDMA) network, multiple mobile hosts (MHs) can simultaneously transmit over the wireless channel by using different codes. To assure an acceptable quality of service for all users' flows, the network usually tunes the ...
A scalable low-latency cache invalidation strategy for mobile environments
Caching frequently accessed data items on the client side is an effective technique to improve performance in a mobile environment. Classical cache invalidation strategies are not suitable for mobile environments due to the disconnection and mobility of ...
Using semantic caching to manage location dependent data in mobile computing
Location-dependent applications are becoming very popular in mobile environments. To improve system performance and facilitate disconnection, caching is crucial to such applications. In this paper, a semantic caching scheme is used to access location ...
Pushing dependent data in clients-providers-servers systems
In a satellite and wireless networks and in advanced traffic information systems in which the up-link bandwidth is very limited, a server broadcasts data files in a round-robin manner. The data files are provided by different providers and are accessed ...
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless and hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a data packet addressed to that node. In order to avoid the need for such ...
GPSR: greedy perimeter stateless routing for wireless networks
We present Greedy Perimeter Stateless Routing (GPSR), a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet's destination to make packet forwarding decisions. GPSR makes greedy forwarding decisions using ...
Mitigating routing misbehavior in mobile ad hoc networks
This paper describes two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this problem, we propose categorizing nodes based upon their dynamically measured ...
Challenges: an application model for pervasive computing
The way mobile computing devices and applications are developed, deployed and used today does not meet the expectations of the user community and falls far short of the potential for pervasive computing. This paper challenges the mobile computing ...
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing ...
W-mail: an electronic mail system for wearable computing environments
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by considering the specific features of wearable computing environments, i.e., ...
Research challenges in environmental observation and forecasting systems
We describe Environmental Observation and Forecasting Systems (EOFS), a new class of large-scale distributed system designed to monitor, model, and forecast wide-area physical processes such as river systems. EOFS have strong social relevance in areas ...
Cited By
-
Vasile C, Bira C, Vladescu M, Cristea I and Tamas R (2023). Close-range indoor transmitter localization using a system of low-cost SDR receivers Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI, 10.1117/12.2644025, 9781510660939, (112)
-
SÁNCHEZ-CARMONA A, ROBLES S and BORREGO C (2015). Improving Podcast Distribution on Gwanda using PrivHab: a Multiagent Secure Georouting Protocol., ADCAIJ: ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 10.14201/ADCAIJ2015413453, 4:1, (34)
Index Terms
- Proceedings of the 6th annual international conference on Mobile computing and networking
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
MobiCom '18 | 187 | 42 | 22% |
MobiCom '17 | 186 | 35 | 19% |
MobiCom '16 | 226 | 31 | 14% |
MobiCom '15 | 207 | 38 | 18% |
MobiCom '14 | 220 | 36 | 16% |
MobiCom '13 | 207 | 28 | 14% |
MobiCom '03 | 281 | 27 | 10% |
MobiCom '02 | 364 | 26 | 7% |
MobiCom '01 | 281 | 30 | 11% |
MobiCom '00 | 226 | 28 | 12% |
MobiCom '99 | 170 | 28 | 16% |
MobiCom '98 | 147 | 27 | 18% |
MobiCom '97 | 101 | 26 | 26% |
MobiCom '96 | 90 | 18 | 20% |
MobiCom '95 | 79 | 20 | 25% |
Overall | 2,972 | 440 | 15% |