Officers and Executive Staff

[1]  Michele Zorzi,et al.  Cost- and Collision-Minimizing Forwarding Schemes for Wireless Sensor Networks: Design, Analysis and Experimental Validation , 2009, IEEE Trans. Mob. Comput..

[2]  Zhu Han,et al.  Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks: A Game-Theoretic Modeling Approach , 2009, IEEE Transactions on Mobile Computing.

[3]  Volker Wille,et al.  Continuous versus Discrete Model in Autodiagnosis Systems for Wireless Networks , 2008, IEEE Transactions on Mobile Computing.

[4]  Fang Liu,et al.  SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[5]  John C. S. Lui,et al.  DCAR: Distributed Coding-Aware Routing in Wireless Networks , 2010, IEEE Trans. Mob. Comput..

[6]  Yuguang Fang,et al.  Stochastic Traffic Engineering in Multihop Cognitive Wireless Mesh Networks , 2010, IEEE Transactions on Mobile Computing.

[7]  Sajal K. Das,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MOBILE COMPUTING An Epidemic Theoretic Framework for Vulnerability Analysi , 2022 .

[8]  Luca Vollero,et al.  Providing Service Guarantees in 802.11e EDCA WLANs with Legacy Stations , 2010, IEEE Transactions on Mobile Computing.

[9]  Ian F. Akyildiz,et al.  XLP: A Cross-Layer Protocol for Efficient Communication in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[10]  Sushil Jajodia,et al.  Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[11]  Hossam S. Hassanein,et al.  Fair Class-Based Downlink Scheduling with Revenue Considerations in Next Generation Broadband Wireless Access Systems , 2009, IEEE Transactions on Mobile Computing.

[12]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[13]  Polly Huang,et al.  Accuracy Performance Analysis between War Driving and War Walking in Metropolitan Wi-Fi Localization , 2010, IEEE Transactions on Mobile Computing.

[14]  Matteo Mazzotti,et al.  Robust Multilayer Control for Enhanced Wireless Telemedical Video Streaming , 2010, IEEE Transactions on Mobile Computing.

[15]  K. J. Ray Liu,et al.  A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation: Vulnerability Analysis and Cooperation Enforcement , 2010, IEEE Transactions on Mobile Computing.

[16]  Saswati Sarkar,et al.  Economy of Spectrum Access in Time Varying Multichannel Networks , 2010, IEEE Transactions on Mobile Computing.

[17]  Kai-Ten Feng,et al.  Wireless Location Tracking Algorithms for Environments with Insufficient Signal Sources , 2009, IEEE Transactions on Mobile Computing.

[18]  Pin-Han Ho,et al.  Extended Knowledge-Based Reasoning Approach to Spectrum Sensing for Cognitive Radio , 2010, IEEE Transactions on Mobile Computing.

[19]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[20]  Yuguang Fang,et al.  Impacts of Topology and Traffic Pattern on Capacity of Hybrid Wireless Networks , 2009, IEEE Transactions on Mobile Computing.

[21]  Kai-Ten Feng,et al.  Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks , 2009, IEEE Transactions on Mobile Computing.

[22]  Weijia Jia,et al.  Optimal Patterns for Four-Connectivity and Full Coverage in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[23]  Sujit Dey,et al.  Model-Based Techniques for Data Reliability in Wireless Sensor Networks , 2009, IEEE Transactions on Mobile Computing.

[24]  Zhi Ding,et al.  Optimal Transmission Strategies for Dynamic Spectrum Access in Cognitive Radio Networks , 2009, IEEE Transactions on Mobile Computing.

[25]  Raouf Boutaba,et al.  Toward Reliable and Efficient Reporting in Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[26]  Andrea Conti,et al.  Mathematical Evaluation of Environmental Monitoring Estimation Error through Energy-Efficient Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[27]  Kang G. Shin,et al.  In-Band Spectrum Sensing in IEEE 802.22 WRANs for Incumbent Protection , 2010, IEEE Transactions on Mobile Computing.

[28]  Allen B. MacKenzie,et al.  Effect of Selfish Node Behavior on Efficient Topology Design , 2008, IEEE Transactions on Mobile Computing.

[29]  Polychronis Koutsakis,et al.  A New Call Admission Control Mechanism for Multimedia Traffic over Next-Generation Wireless Cellular Networks , 2008, IEEE Transactions on Mobile Computing.

[30]  Tei-Wei Kuo,et al.  A Maximum-Residual Multicast Protocol for Large-Scale Mobile Ad Hoc Networks , 2009, IEEE Transactions on Mobile Computing.

[31]  Deepa Kundur,et al.  On the Relevance of Node Isolation to the K-Connectivity of Wireless Optical Sensor Networks , 2009, IEEE Transactions on Mobile Computing.

[32]  Paolo Santi,et al.  WiQoSM: An Integrated QoS-Aware Mobility and User Behavior Model for Wireless Data Networks , 2008, IEEE Transactions on Mobile Computing.

[33]  Bin Tang,et al.  Benefit-Based Data Caching in Ad Hoc Networks , 2008, IEEE Trans. Mob. Comput..

[34]  Marco Fiore,et al.  Information Density Estimation for Content Retrieval in MANETs , 2009, IEEE Transactions on Mobile Computing.

[35]  Thomas F. La Porta,et al.  Data dissemination with ring-based index for wireless sensor networks , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[36]  Kyriakos Mouratidis,et al.  Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments , 2009, IEEE Transactions on Mobile Computing.

[37]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[38]  Prashant J. Shenoy,et al.  Chameleon: Application-Level Power Management , 2008, IEEE Transactions on Mobile Computing.

[39]  Ekram Hossain,et al.  Tandem Queue Models with Applications to QoS Routing in Multihop Wireless Networks , 2008, IEEE Transactions on Mobile Computing.

[40]  Wendi B. Heinzelman,et al.  Schedule Adaptation of Low-Power-Listening Protocols for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[41]  Xia Li,et al.  TCP Performance in IEEE 802.11-Based Ad Hoc Networks with Multiple Wireless Lossy Links , 2007, IEEE Transactions on Mobile Computing.

[42]  Chao Chen,et al.  Exploiting Contact Spatial Dependency for Opportunistic Message Forwarding , 2009, IEEE Transactions on Mobile Computing.

[43]  Sajal K. Das,et al.  Distributed Algorithm for En Route Aggregation Decision in Wireless Sensor Networks , 2009, IEEE Transactions on Mobile Computing.

[44]  Victor C. M. Leung,et al.  A Mobile-Directory Approach to Service Discovery in Wireless Ad Hoc Networks , 2008, IEEE Transactions on Mobile Computing.

[45]  Xue Wang,et al.  Distributed Energy Optimization for Target Tracking in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[46]  Enzo Baccarelli,et al.  Minimization of Download Times for Large Files over Wireless Channels , 2007, IEEE Transactions on Mobile Computing.

[47]  Kang G. Shin,et al.  Efficient Discovery of Spectrum Opportunities with MAC-Layer Sensing in Cognitive Radio Networks , 2008, IEEE Transactions on Mobile Computing.

[48]  Kang G. Shin,et al.  OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.

[49]  Yuguang Fang,et al.  A Two-Layer Key Establishment Scheme for Wireless Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[50]  Prasun Sinha,et al.  Structure-Free Data Aggregation in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[51]  Stathes Hadjiefthymiades,et al.  Enhancing Situation-Aware Systems through Imprecise Reasoning , 2008, IEEE Transactions on Mobile Computing.

[52]  Yunsi Fei,et al.  QELAR: A Machine-Learning-Based Adaptive Routing Protocol for Energy-Efficient and Lifetime-Extended Underwater Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[53]  Raheem A. Beyah,et al.  VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[54]  Michele Garetto,et al.  Analysis of Random Mobility Models with Partial Differential Equations , 2007, IEEE Transactions on Mobile Computing.

[55]  Eylem Ekici,et al.  SAMAC: A Cross-Layer Communication Protocol for Sensor Networks with Sectored Antennas , 2010, IEEE Transactions on Mobile Computing.

[56]  Lang Tong,et al.  Energy-Aware Adaptive Routing for Large-Scale Ad Hoc Networks: Protocol and Performance Analysis , 2007, IEEE Transactions on Mobile Computing.

[57]  Konstantinos Psounis,et al.  Contention-Aware Performance Analysis of Mobility-Assisted Routing , 2009, IEEE Transactions on Mobile Computing.

[58]  Ding-Zhu Du,et al.  Connected Dominating Sets in Wireless Networks with Different Transmission Ranges , 2007, IEEE Transactions on Mobile Computing.

[59]  Hossam S. Hassanein,et al.  Relay Node Deployment Strategies in Heterogeneous Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[60]  Michele Zorzi,et al.  Cost and Collision Minimizing Forwarding Schemes for Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[61]  Yu-Chee Tseng,et al.  The Orphan Problem in ZigBee Wireless Networks , 2009, IEEE Transactions on Mobile Computing.

[62]  Xiaodong Wang,et al.  Cross-Layer Design of Wireless Mesh Networks with Network Coding , 2008, IEEE Transactions on Mobile Computing.

[63]  Shiow-yang Wu,et al.  Activity-Based Proactive Data Management in Mobile Environments , 2010, IEEE Transactions on Mobile Computing.

[64]  Sajal K. Das,et al.  Energy-Efficient Reprogramming of a Swarm of Mobile Sensors , 2010, IEEE Transactions on Mobile Computing.