Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Approximate data mapping in refresh-free DRAM for energy-efficient computing in modern mobile systems
Computer Communications (COMS), Volume 216, Issue CPages 151–158https://doi.org/10.1016/j.comcom.2023.12.037AbstractIn the context of modern mobile and embedded communication systems, the increasing storage density of dynamic random access memory (DRAM) poses significant challenges in energy management, with DRAM refresh emerging as a major factor in energy ...
- research-articleDecember 2021
PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments
Journal of Information Security and Applications (JISA), Volume 63, Issue Chttps://doi.org/10.1016/j.jisa.2021.103026AbstractDifferent mobile-based web applications have become popular among mobile users due to the enormous evolution of mobile communication technologies and hardware technologies. Mobile users can access various web services using mobile ...
- research-articleNovember 2017
Smart vending machines in the era of internet of things
Future Generation Computer Systems (FGCS), Volume 76, Issue CPages 215–220https://doi.org/10.1016/j.future.2016.10.029The aim of this paper is to propose a real-world deployment in building an Internet of Things (IoT) system for vending machines. We also introduce a new approach for mobile proximity payment for unattended point of sales. The basic idea is to have a ...
- articleDecember 2014
Seamless Mobility Management Schemes for IPv6-based Wireless Networks
Mobile Networks and Applications (MNET), Volume 19, Issue 6Pages 745–757https://doi.org/10.1007/s11036-014-0540-9Mobility management is one major challenge for wireless network design. Advanced wireless technologies provide mobile nodes with multi-mode radio interfaces, so subscribers can benefit from disparate mobile communication systems. Meanwhile, researchers ...
- research-articleFebruary 2013
On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets
Computers and Security (CSEC), Volume 32, Issue CPages 115–129Many peer-to-peer security protocols in mobile communications utilise shared secrets. Synchronous storage of shared secrets is imperative for the successful operation of security protocols, as asynchronous storage of shared secrets may lead to service ...
-
- research-articleMay 2012
Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation
IEEE Transactions on Mobile Computing (ITMV), Volume 11, Issue 5Pages 739–752https://doi.org/10.1109/TMC.2011.269WiFi continues to be a prime source of energy consumption in mobile devices. This paper observes that, despite a rich body of research in WiFi energy management, there is room for improvement. Our key finding is that WiFi energy optimizations have ...
- research-articleMarch 2012
Network Connectivity with a Family of Group Mobility Models
IEEE Transactions on Mobile Computing (ITMV), Volume 11, Issue 3Pages 504–517https://doi.org/10.1109/TMC.2011.37We investigate the communication range of the nodes necessary for network connectivity, which we call bidirectional connectivity, in a simple setting. Unlike in most of existing studies, however, the locations or mobilities of the nodes may be ...
- articleFebruary 2012
Cross-layer routing for peer database querying over mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 56, Issue 2Pages 504–520https://doi.org/10.1016/j.comnet.2011.10.004The widespread of mobile ad hoc networking calls for a careful design of network functions in order to meet the application requirements and economize on the limited resources. In this paper we address the problem of distributing query messages among ...
- articleOctober 2011
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software (JSSO), Volume 84, Issue 10Pages 1717–1725https://doi.org/10.1016/j.jss.2011.05.006Recently, several authentication techniques have been developed for the global mobility network (GLOMONET), which provides mobile users with global roaming services. Due to the hardware limitations, the mobile user cannot support the heavy encryption ...
- articleJanuary 2011
Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 55, Issue 1Pages 173–192https://doi.org/10.1016/j.comnet.2010.08.009The benefits of jointly managing the combined set of radio resources offered by heterogeneous networks consisting of several radio access technologies (RATs) have been profusely studied and assessed in recent years. This notion has been coined as common ...
- articleNovember 2010
Planning and Deployment of WiMAX Networks
Wireless Personal Communications: An International Journal (WPCO), Volume 55, Issue 3Pages 305–323https://doi.org/10.1007/s11277-009-9803-3Incorporation of measurement based techniques in Worldwide Interoperability for Microwave Access (WiMAX) are required to improve IEEE 802.16 engineering methodologies. Wireless planning methodologies are presented, supported by a planning tool which ...
- articleOctober 2010
Spectrum sharing in cognitive radio networks with imperfect sensing: A discrete-time Markov model
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 54, Issue 14Pages 2519–2536https://doi.org/10.1016/j.comnet.2010.04.005An efficient and utmost utilization of currently scarce and underutilized radio spectrum resources has stimulated the introduction of what has been coined Cognitive Radio (CR) access methodologies and implementations. While the long-established approach ...
- ArticleJuly 2010
Reducing User Perceived Latency in Mobile Processes
ICWS '10: Proceedings of the 2010 IEEE International Conference on Web ServicesPages 235–242https://doi.org/10.1109/ICWS.2010.12Employees are increasingly participating in business processes using mobile devices. Often, this is supported by a mobile web application, which accesses various web services in the back-end. The high latency of the mobile network (e.g., EDGE) is ...
- research-articleOctober 2009
Range-Free Localization Using Expected Hop Progress in Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 20, Issue 10Pages 1540–1552https://doi.org/10.1109/TPDS.2008.239Localization algorithm continues to be an important and challenging topic in today's wireless sensor networks (WSNs). In this paper, a novel range-free localization algorithm using expected hop progress (LAEP) to predict the location of any sensor in a ...
- research-articleJuly 2009
Design of Fair Scheduling Schemes for the QoS-Oriented Wireless LAN
IEEE Transactions on Mobile Computing (ITMV), Volume 8, Issue 7Pages 880–894https://doi.org/10.1109/TMC.2008.156How to simultaneously achieve fairness and quality-of-service (QoS) guarantee in QoS-oriented wireless local area networks (LANs) is an important and challenging issue. Targeting at this goal and jointly taking priority setting, fairness, and cross-...
- research-articleJuly 2009
Distributed Relay Selection and Power Control for Multiuser Cooperative Communication Networks Using Stackelberg Game
IEEE Transactions on Mobile Computing (ITMV), Volume 8, Issue 7Pages 975–990https://doi.org/10.1109/TMC.2008.153The performance in cooperative communication depends on careful resource allocation such as relay selection and power control, but the traditional centralized resource allocation requires precise measurements of channel state information (CSI). In this ...
- research-articleJune 2009
Large Connectivity for Dynamic Random Geometric Graphs
IEEE Transactions on Mobile Computing (ITMV), Volume 8, Issue 6Pages 821–835https://doi.org/10.1109/TMC.2009.42We provide the first rigorous analytical results for the connectivity of dynamic random geometric graphs—a model for mobile wireless networks in which vertices move in random directions in the unit torus. The model presented here follows the one ...
- research-articleMay 2009
Enhanced delegation-based authentication protocol for PCSs
IEEE Transactions on Wireless Communications (TWC), Volume 8, Issue 5Pages 2166–2171https://doi.org/10.1109/TWC.2009.070032Lee and Yeh recently presented a delegation-based authentication protocol for portable communication systems (PCSs), which is claimed to provide non-repudiation in on-line authentication. This investigation indicates that their protocol has a weakness ...
- research-articleMay 2009
Analysis of Cross-Layer Interaction in Multirate 802.11 WLANs
IEEE Transactions on Mobile Computing (ITMV), Volume 8, Issue 5Pages 682–693https://doi.org/10.1109/TMC.2008.166Recent works in empirical 802.11 wireless LAN performance evaluation have shown that cross-layer interactions in WLANs can be subtle, sometimes leading to unexpected results. Two such instances are: (i) significant throughput degradation resulting from ...
- research-articleMarch 2009
Information Density Estimation for Content Retrieval in MANETs
IEEE Transactions on Mobile Computing (ITMV), Volume 8, Issue 3Pages 289–303https://doi.org/10.1109/TMC.2008.110The paper focuses on a cooperative environment in wireless ad hoc networks, where mobile nodes share information in a peer-to-peer fashion. Nodes follow a pure peer-to-peer approach (i.e., without the intervention of servers), thus requiring an ...