2002
DOI: 10.1109/tvt.2002.1002498
|View full text |Cite
|
Sign up to set email alerts
|

Design and analysis of dynamic mobility tracking in wireless personal communication networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
11
0

Year Published

2005
2005
2019
2019

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…In some dynamic location management schemes [1,3,12,15], extensive computations must be done at the mobile host. However, a good strategy of the location management should efficiently use the limited resource of PCS and not require expensive computation at the mobile host.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In some dynamic location management schemes [1,3,12,15], extensive computations must be done at the mobile host. However, a good strategy of the location management should efficiently use the limited resource of PCS and not require expensive computation at the mobile host.…”
Section: Related Workmentioning
confidence: 99%
“…To solve the location management problem, various architectures of distributed databases have been proposed to store the locations of mobile users, like the famous two-tier architecture [16], the hierarchical architecture [16], and many other strategies of location management [1][2][3][9][10][11][12][13]15,17]. There are two purposes of developing these location management schemes.…”
mentioning
confidence: 99%
“…After surveying cost-effective location-management strategies proposed in the literature [14][15][16][17][18][19][20][21][22][23][24][25][26], we gained the following facts. First, most newly proposed location-management strategies were based on conventional movement-based methods.…”
Section: Introductionmentioning
confidence: 99%
“…A survivable network has the ability to withstand malicious attacks and to continue to work properly even in the presence of natural or man-made disturbances. It focuses on delivery of essential services and rapid recovery of full services when situation improves [2], [3]. Mobile networks have the challenge of survivability, since the communication channels are accessible to anyone.…”
Section: Introductionmentioning
confidence: 99%
“…Chen et al [2] used a Continuous Time Markov Chain (CTMC) model to evaluate the end-to-end availability of wireless ad hoc networks. Heegaard et al [10] developed an analytical model to assess the survivability of a network with virtual connections exposed to link or node failures; the model has been validated by simulations.…”
Section: Introductionmentioning
confidence: 99%