The IEEE Circuits and Systems Society is the leading organization that promotes the advancement of the theory, analysis, computer-aided design and practical implementation of circuits, and the application of circuit theoretic techniques to systems and signal processing. The Society brings engineers, researchers, scientists and others involved in circuits and systems applications access to the industry’s most essential technical information, networking opportunities, career development tools, and many other exclusive benefits. 

More Information

Visit CASS MiLe

CASS MiLe Logo

The IEEE International Symposium on Circuits and Systems (ISCAS) is the flagship conference of the IEEE Circuits and Systems (CAS) Society and the world’s premiere forum for researchers in the active fields of theory, design and implementation of circuits and systems. This is accomplished through technical conference sessions, poster sessions, live demonstration sessions, and publication of conference papers. ISCAS 2024 is inspired by the theme "circuits and systems for sustainable development", which is perfectly aligned with the host city's goal.

2024 IEEE 22nd Interregional NEWCAS Conference

2024 ieee international conference on multimedia and expo, 2024 ieee/acm international symposium on low power electronics and design, ieee transactions on mobile computing, publication menu.

IEEE Transactions on Mobile Computing focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies. Topics of interest include, but are not limited to, the following:

  • Architectures - Mobile networks and hosts, Agents and proxies, Mobility management, mobile agent and proxy architectures Integrated wireline and wireless systems, Planning and standardization.
  • Support Services - Mobility and roaming, Nomadic computing, Multimedia Operating system support, Power management.
  • Algorithm/Protocol Design and Analysis - Online and mobile environments, Limited bandwidth, Intermittent connectivity.
  • Mobile Environments - Data and knowledge management, Performance modeling and characterization, Security, scalability and reliability, Design, management and operation, Systems and technologies.
  • Mobile Communication Systems - Wireless, cellular and spread-spectrum systems, Multi-user and multi-access techniques and algorithms, Multi-channel processing, Channel coding, Data coding and compression.
  • Applications - Location-dependent and sensitive, Nomadic computing, Wearable computers and body area networks, Multimedia applications and multimedia signal processing, Pervasive computing, Wireless sensor networks.
  • Emerging Technologies.

This publication considers original works that enhance the existing body of knowledge. Original review articles and surveys are acceptable, even if new data/concepts are not presented. Results described in the article should not have been submitted or published elsewhere. Expanded versions of conference publications may be submitted. Articles must be intelligible and must be written in standard English.

  • Peer Review : Peer review is vital to the quality of published research. Each article submitted to IEEE is evaluated by at least two independent reviewers selected by a member of the publication's editorial board.  Learn more about the IEEE peer review process .
  • Publication Fees : This publication is supported by subscriptions and applicable Article Processing Charges (APCs). Although there is no cost for publishing with IEEE, authors may wish to take advantage of some of our fee-based offerings; visit the  IEEE Author Center  for more information on available options.
  • Errors in Published Articles : Authors who have detected an error in their published article should contact the Editor-in-Chief shown above to request the publication of a correction. Note that no change may be made to the original article after it is published in IEEE  Xplore . Comment articles which discuss an article in this publication will be considered. The authors of the original article will be given the opportunity to reply to the Comment. Submit your Comment article via Submit Manuscript at the top of the page.

Other Policies :

  • Publishing Ethics
  • Copyright and Licensing
  • Post-Publication Information
  • Advertising

Submit a Manuscript

IEEE Transactions on Mobile Computing Editorial Board

Editor-in-chief transactions on mobile computing, associate editor-in-chief transactions on mobile computing, falko dressler, eylem ekici.

  • IEEE CS Standards
  • Career Center
  • Subscribe to Newsletter
  • IEEE Standards

ieee research papers on mobile computing

  • For Industry Professionals
  • For Students
  • Launch a New Career
  • Membership FAQ
  • Membership FAQs
  • Membership Grades
  • Special Circumstances
  • Discounts & Payments
  • Distinguished Contributor Recognition
  • Grant Programs
  • Find a Local Chapter
  • Find a Distinguished Visitor
  • About Distinguished Visitors Program
  • Find a Speaker on Early Career Topics
  • Technical Communities
  • Collabratec (Discussion Forum)
  • My Subscriptions
  • My Referrals
  • Computer Magazine
  • ComputingEdge Magazine
  • Let us help make your event a success. EXPLORE PLANNING SERVICES
  • Events Calendar
  • Calls for Papers
  • Conference Proceedings
  • Conference Highlights
  • Top 2024 Conferences
  • Conference Sponsorship Options
  • Conference Planning Services
  • Conference Organizer Resources
  • Virtual Conference Guide
  • Get a Quote
  • CPS Dashboard
  • CPS Author FAQ
  • CPS Organizer FAQ
  • Find the latest in advanced computing research. VISIT THE DIGITAL LIBRARY
  • Open Access

Tech News Blog

  • Author Guidelines
  • Reviewer Information
  • Guest Editor Information
  • Editor Information
  • Editor-in-Chief Information
  • Volunteer Opportunities
  • Video Library
  • Member Benefits
  • Institutional Library Subscriptions
  • Advertising and Sponsorship
  • Code of Ethics
  • Educational Webinars
  • Online Education
  • Certifications
  • Industry Webinars & Whitepapers
  • Research Reports
  • Bodies of Knowledge
  • CS for Industry Professionals

Resource Library

  • Newsletters
  • Women in Computing
  • Digital Library Access
  • Organize a Conference
  • Run a Publication
  • Become a Distinguished Speaker
  • Participate in Standards Activities
  • Peer Review Content
  • Author Resources
  • Publish Open Access
  • Society Leadership
  • Boards & Committees
  • Local Chapters
  • Governance Resources
  • Conference Publishing Services
  • Chapter Resources
  • About the Board of Governors
  • Board of Governors Members
  • Diversity & Inclusion
  • Open Volunteer Opportunities
  • Award Recipients
  • Student Scholarships & Awards
  • Nominate an Election Candidate
  • Nominate a Colleague
  • Corporate Partnerships
  • Conference Sponsorships & Exhibits
  • Advertising
  • Recruitment
  • Publications
  • Education & Career

Discover IEEE Computer Society Publications

Unlock peer-reviewed research and expert commentary from the world’s trusted resource for computer science and engineering information., peer-reviewed magazines & journals.

We are the home to prestigious publications that deliver insights from the brightest minds in computing. Our digital library has over 930,000+ articles, from a range of topics including award-winning special issues.

  • IEEE Open Journal of the Computer Society
  • IEEE Transactions on Computers
  • IEEE Intelligent Systems
  • IEEE Transactions on Pattern Analysis and Machine Intelligence
  • IEEE/ACM Transactions on Computational Biology and Bioinformatics
  • IEEE Transactions on Emerging Topics in Computing
  • IEEE Computer Graphics and Applications
  • IEEE MultiMedia
  • IEEE Transactions on Visualization and Computer Graphics
  • IEEE Computer Architecture Letters
  • IEEE Annals of the History of Computing
  • IEEE Transactions on Affective Computing
  • IT Professional
  • IEEE Internet Computing
  • IEEE Transactions on Big Data
  • IEEE Transactions on Cloud Computing
  • IEEE Transactions on Knowledge and Data Engineering
  • IEEE Transactions on Services Computing
  • IEEE Pervasive Computing
  • IEEE Transactions on Mobile Computing
  • IEEE Transactions on Parallel and Distributed Systems
  • Computing in Science & Engineering
  • IEEE Security & Privacy
  • IEEE Transactions on Dependable and Secure Computing
  • IEEE Transactions on Privacy
  • IEEE Software
  • IEEE Transactions on Software Engineering
  • IEEE Transactions on Sustainable Computing

open accesss publications, Transactions on Privacy and Open Access Journal of the Computer Society

Open Access Research

Our first Gold Open Access (OA) journal, the IEEE Open Journal of the Computer Society (OJ-CS) and our second, IEEE Transactions on Privacy , are dedicated to publishing high-impact articles on emerging topics and trends in all aspects of computing and privacy, respectfully. Both publications provide a rapid review cycle for authors looking to publish their research and are fully compliant with funder mandates, including Plan S. OJ-CS and TP content are available for free in the IEEE Computer Society Digital Library (CSDL) and the IEEE Xplore ® digital library.

All our publications offer authors the opportunity to publish OA. Learn about hybrid publications.

Influential and Award Winning Publications

Impact factor (IF) measures how often a publication’s articles are cited and indicates its influence within a scientific community. IFs are reported by Clarivate Analytics Journal Citation Reports .

  • IEEE Transactions on Pattern Analysis and Machine Intelligence earned a 2022 IF of 23.6— one of the highest of all artificial intelligence journals.
  • Eleven Computer Society journals hold the coveted top IF ranking in their specialty field.
  • 2022 Mahoney Prize - IEEE Annals of the History of Computing , "Computing Capitalisms"
  • 2021 APEX Award for Publication Excellence - IEEE Security & Privacy , "The Future of Cybersecurity Policy"
  • Computer , "Technology Predictions"
  • IEEE Security & Privacy , "Smart Cities: Requirements for Security, Privacy, and Trust"
  • IEEE Software , "The Diversity Crisis in Software Development"

ieee research papers on mobile computing

"Being the largest and most comprehensive collection of computer science resources available, the Computer Society Digital Library is a beacon of hope for academic libraries...”

— Manayer Ali Ahmed Naseeb, Director, Ahlia University

Computer Society Digital Library

All our magazines, journals, and conference proceedings can be found in the Computer Society Digital Library (CSDL) and the IEEE Xplore ® digital library. Many universities and institutions already have a subscription. Contact your librarian for details. Individuals can access the CSDL at a discounted rate with IEEE Computer Society Membership .

ieee research papers on mobile computing

Student members receive full access to the CSDL at no extra cost

Professional members receive 18 downloads + can add full access using the code CSDLTRACK

ieee research papers on mobile computing

Professional members can also subscribe to one or more publications

Thank You to Our Volunteers!

ieee research papers on mobile computing

View Volunteering Opportunities

  • View Calls for Papers
  • Read Author Guidelines
  • 8 Things Authors Should Know before Publishing
  • Common Writing and Publishing Mistakes
  • Publish Safely with Open Access Journals
  • IEEE DataPort (Free Subscription for Members)

Peer Review Volunteer Resources

  • Reviewer Resources
  • Editor Resources
  • Guest Editor Resources
  • Editor-in-Chief Resources

More News & Research

Computingedge newsletter.

Access insightful content from 12 magazines, all in one FREE monthly subscription available to both members and non-members.

Colloquium Abstracts

Explore a sampling of recently published abstracts from our journals, offered as a complimentary benefit for periodical subscribers.

Read expert commentary and analysis on today’s cutting-edge advances in computer technology in a freely available online format.

Find career guides, technology predictions, and high-level summaries of the latest developments and discoveries in computing.

  • Name * First Last
  • Country/Region * Country/Region Afghanistan Albania Algeria Andorra Angola Anguilla Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bonaire, Sint Eustatius, Saba Bosnia and Herzegovina Botswana Brazil Brunei Darussalam Bulgaria Burkina Faso Burundi Cabo Verde Cambodia Cameroon Canada Cayman Islands Central African Republic Chad Chile China Colombia Comoros Congo Congo, Democratic Republic of Cook Islands Costa Rica Cote d'Ivoire Croatia Cuba Curacao Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Eswatini Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland France French Guiana French Polynesia Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guatemala Guinea Guinea-Bissau Guyana Haiti Honduras Hong Kong Hungary Iceland India Indonesia Iran, Islamic Republic of Iraq Ireland Isle of Man Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Kiribati Korea (North) Korea, Republic of Kosovo Kuwait Kyrgyzstan Laos Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macao Madagascar Malawi Malaysia Maldives Mali Malta Martinique Mauritania Mauritius Mayotte Mexico Moldova, Republic of Monaco Mongolia Montenegro Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island North Macedonia Norway Oman Pakistan Palestine, State of Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Qatar Reunion Romania Russian Federation Rwanda Saint Kitts and Nevis Saint Lucia Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia Seychelles Sierra Leone Singapore Sint Maarten Slovakia Slovenia Solomon Islands Somalia South Africa South Sudan Spain Sri Lanka St. Helena St. Vincent and the Grenadines Sudan Suriname Svalbard and Jan Mayen Sweden Switzerland Syrian Arab Republic Taiwan Tajikistan Tanzania, United Republic of Thailand Timor-Leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks And Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom Uruguay USA Uzbekistan Vatican City Venezuela Vietnam Virgin Islands (British) Wallis And Futuna Western Sahara Yemen Zambia Zimbabwe
  • I agree to the IEEE Privacy Policy .*

IEEE Computer Society logo

Sign up for our newsletter.

EMAIL ADDRESS

ieee research papers on mobile computing

IEEE COMPUTER SOCIETY

  • Board of Governors
  • IEEE Support Center

DIGITAL LIBRARY

  • Librarian Resources

COMPUTING RESOURCES

  • Courses & Certifications

COMMUNITY RESOURCES

  • Conference Organizers
  • Communities

BUSINESS SOLUTIONS

  • Conference Sponsorships & Exhibits
  • Digital Library Institutional Subscriptions
  • Accessibility Statement
  • IEEE Nondiscrimination Policy
  • XML Sitemap

©IEEE — All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.

A not-for-profit organization, the Institute of Electrical and Electronics Engineers (IEEE) is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.

ACM Digital Library home

  • Advanced Search

Mobile Computing and Databases-A Survey

  • 98 citation

New Citation Alert added!

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

  • Publisher Site

IEEE Transactions on Knowledge and Data Engineering

ACM Digital Library

The emergence of powerful portable computers, along with advances in wireless communication technologies, has made mobile computing a reality. Among the applications that are finding their way to the market of mobile computing those that involve data management hold a prominent position. In the past few years, there has been a tremendous surge of research in the area of data management in mobile computing. This research has produced interesting results in areas such as data dissemination over limited bandwidth channels, location-dependent querying of data, and advanced interfaces for mobile computers. This paper is an effort to survey these techniques and to classify this research in a few broad areas.

Index Terms

Computer systems organization

Architectures

Parallel architectures

Cellular architectures

Network types

Mobile networks

Wireless access networks

Software and its engineering

Software notations and tools

General programming languages

Language features

Data types and structures

Recommendations

A survey of mobile cloud computing applications: perspectives and challenges.

As mobile computing has been developed for decades, a new model for mobile computing, namely, mobile cloud computing, emerges resulting from the marriage of powerful yet affordable mobile devices and cloud computing. In this paper we survey existing ...

Bandwidth Conservation Framework for Mobile Cloud Computing: Challenges and Solutions

Mobile devices are rapidly transforming the nature of the computing industry. It is promising to be the super future computers. Challenges including network bandwidth limitation, unavailability and limited storage are among the limitations facing Mobile ...

The New Mobile Computing Landscape

The mobile computing revolution has been phenomenal, and its growth continues unabated. Advances in mobile computing and wireless communications, widespread adoption of mobile devices, and the availability of a vast array of low-cost applications that ...

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

  • Information
  • Contributors

Published in

Copyright © Copyright © 1999 IEEE. All Rights Reserved.

In-Cooperation

IEEE Educational Activities Department

United States

Publication History

  • Published: 1 January 1999

Author Tags

  • Mobile computing
  • data dissemination
  • location-dependent queries
  • transaction management.
  • research-article

Funding Sources

Other metrics.

  • Bibliometrics
  • Citations 98

Article Metrics

  • 98 Total Citations View Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

Digital Edition

View this article in digital edition.

Share this Publication link

https://dl.acm.org/doi/10.1109/69.755619

Share on Social Media

  • 0 References

Export Citations

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

IEEE IMC 2024

Call for Papers

Download here

The fusion of mobile communications, computing, and intelligence is catalyzing the emergence of innovative systems and applications that facilitate intelligent resource provisioning, process extensive data from mobile sensors and interconnected hardware platforms, and bolster the Internet of Things (IoT) through robust edge and cloud-based backend infrastructure. The pivotal role of current and forthcoming communication technologies, machine learning implementation, and mobile cloud infrastructures as facilitators for this convergence cannot be understated. These mobile intelligent applications are poised to revolutionize various facets of daily life, encompassing domains such as transportation, e-commerce, healthcare, smart homes, smart cities, social interaction, and more.

Mobile intelligence serves as an inclusive platform for both academic and industrial researchers to share their latest research insights, experimental findings, and the latest advancements in industry technologies related to mobile systems, machine learning, edge and cloud computing, services, and engineering. Leveraging the synergy of mobile communications, machine intelligence, edge computing, and edge/cloud infrastructures, the future of Mobile Intelligence Systems is envisioned to provide a multitude of critical and personalized services across diverse application domains, ranging from education, transportation, to public health, safety, and security. Submissions will be evaluated on the criteria of originality, significance, clarity, relevance, and accuracy.

Topics of Interest: (include but not limited to)

Theory, Modeling, and Methodologies

  • Mobile cloud computing models, architectures, infrastructures, and platforms
  • Mobile intelligence theories, concepts, algorithms, and methodologies
  • Mobile cloud data management
  • Mobile cloud tools, middleware, and data centers
  • Mobile intelligence as a service
  • Mobile networking, protocols, and technologies
  • Quality of service (QoS)
  • Mobile intelligence security and privacy

Applications and Industry Practice

  • Mobile intelligence for autonomous driving systems, V2X, intelligent transportation systems (ITS), telematics
  • Mobile intelligence for robotics, unmanned aerial vehicles (UAVs), and unmanned ground vehicles (UGVs)
  • Mobile intelligence for sensor networks, Industrial IoT, industrial 4.0, and industry 5.0 
  • Mobile intelligence for future wireless technologies, 5G/6G, WiFi, Satellite, etc.
  • Mobile intelligence for aviation, airports, and railway
  • Mobile intelligence for Augmented Reality/Virtual Reality (AR/VR)
  • Mobile intelligence for computer vision and video analytics
  • Mobile intelligence for surveillance and disaster management
  • Mobile intelligence for healthcare
  • Mobile intelligence for metaverse
  • Mobile intelligence for smart city
  • Mobile intelligence for mission-critical systems
  • Mobile intelligence for community services and social networking
  • Mobile intelligence computing for sustainable development

Important Dates (AoE)

  • Full and work-in-progress papers submission: April 7th, 2024 , May 7th, 2024 
  • Notification: May 15th, 2024 , May 31th, 2024
  • Final manuscript submission and author registration: May 22nd, 2024
  • Conference: July 15th-18th, 2024

Mobile Communication

Featured article, related topics, top conferences on mobile communication, top videos on mobile communication.

5G Wireless Access: Taking Mobile Communication into MMW

Xplore Articles related to Mobile Communication

Periodicals related to mobile communication, e-books related to mobile communication, courses related to mobile communication, top organizations on mobile communication, most published xplore authors for mobile communication.

mobile computing Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Location-Based Internationalization and Localization With Mobile Computing

The Android system operates on many smartphones in many locales. Websites and web tools have their own requirements in day-to-day life. To reach the maximum users, the app and website should handle all the resources such as text strings, functions, layouts, graphics, and any other static data that the app/website needs. It requires internationalization and localization of the website and app to support multiple languages. The basic idea of this chapter is to present an approach for localizing the Android application according to the location data that the app received from the device, but many users do not allow the “access location” feature so this approach will be a dead end in this case. The authors have proposed some other techniques to achieve this feature of localization and internationalization by implementing the “choose language” service so that the app can itself optimize its content and translate it into the user's native language.

Why Does Privacy Paradox Exist?

In this exploratory study, the main aim was to find, ‘why do people disclose information when they are concerned about their privacy?’. The reasons that provide a plausible explanation to the privacy paradox have been conjectural. From the analysis of the eighteen in-depth interviews using grounded theory, themes were then conceptualized. We found rational and irrational explanations in terms of cognitive biases and heuristics that explain the privacy paradox among mobile users. We figured out some reasons in this context of mobile computing which were not emphasized earlier in the privacy paradox literature such as Peanut Effect, Fear of Missing Out- FoMo, Learned Helplessness, and Neophiliac Personality. These results add to the privacy paradox discourse and provide implications for smartphone users for making privacy-related decisions more consciously rather than inconsiderately disclosing information. Also, the results would help marketers and policymakers design nudges and choice architectures that consider privacy decision-making hurdles.

Database Recovery Technique for Mobile Computing: A Game Theory Approach

Intelligent multilevel node authentication in mobile computing using clone node, 2021 index ieee transactions on mobile computing vol. 20, mobile computing and sustainable informatics, computer mathematical modeling based on the improved genetic algorithm and mobile computing.

In order to change the problem of data redundancy in a genetic algorithm, this paper proposes a computer mathematical model based on the combination of an improved genetic algorithm and mobile computing. Combined with the least square method, MATLAB software is used to solve the equations, determine the range of parameters, and solve the estimation parameter range and identification problems. The improved genetic algorithm combined with mobile computing and least square method to establish a mathematical model greatly increased the individual search space and increased the operation rate of 90% compared to the basic genetic algorithm or mobile computing. The results show that the improved genetic algorithm and mobile computing have a certain ability to identify the optimal solution and greatly improve the work efficiency.

Integrated Fan‐Out ( InFO ) for Mobile Computing

Mobile computing as a support to teach the concept of function.

We make a proposal to teach the concept of function using mobile computing. This proposal is based on research that has support in education theories such as Constructivism and Problem Solving Learning. In the first part we show the difficulties that undergraduate Computer Science students have in the first semester of Engineering while working with that mathematical concept. And application to be used by the students anywhere and anytime in mobile devices is designed that process data and is intended to show them the concept of function in a problem solving situation. The proposed activities are part of the education methodology used in the research and within this paper we show the diagnostic questionnaire as one of the methodological tools and its results supporting the designed activities and its application to mobile devices

Prediction of Mineralization Prospects Based on Geological Semantic Model and Mobile Computer Machine Learning

Mineral resources are indispensable in the development of human society and are the foundation of national economic development. As the prospecting target shifts from outcrop ore to concealed ore, from shallow to deep, the difficulty of prospecting becomes more and more difficult. Therefore, the prediction of mineralization prospects is of great significance. This paper is aimed at completing the prediction of mineralization prospects by constructing geological semantic models and using mobile computer learning to improve the accuracy of prediction of mineralization prospects and expanding the application of semantic mobile computing. We use five different semantic relations to build a semantic knowledge library, realize semantic retrieval, complete information extraction of geological text data, and study mineral profiles. Through the distributed database of mobile computing, the association rules and random forest algorithm are used to describe the characteristics of minerals and the ore-controlling elements, find the association rules, and finally combine the geological and mineral data of the area and use the random forest algorithm to realize the prospect of mineralization district forecast. The geological semantic model constructed in the article uses the knowledge library for associative search to achieve an accuracy rate of 87.9% and a recall rate of 96.5%. The retrieval effect is much higher than that of traditional keyword retrieval methods. The maximum value of the posterior result of the mineralization prospect is 0.9027, the average value is 0.0421, and the standard deviation is 0.1069. The picture is brighter, and the probability of mineralization is higher.

Export Citation Format

Share document.

ieee research papers on mobile computing

An Optimal Novel Approach for Dynamic Energy-Efficient Task Offloading in Mobile Edge-Cloud Computing Networks

  • Original Research
  • Published: 15 June 2024
  • Volume 5 , article number  655 , ( 2024 )

Cite this article

ieee research papers on mobile computing

  • Avijit Mondal   ORCID: orcid.org/0009-0002-1016-2778 1 ,
  • Pinaki Sankar Chatterjee   ORCID: orcid.org/0000-0002-5532-725X 1 &
  • Niranjan K. Ray   ORCID: orcid.org/0000-0002-7197-4545 1  

The rapid evolution of mobile devices has greatly advanced secure medical image transmission, yet challenges persist due to resource limitations and security concerns inherent to these devices. In response, this paper introduces a Dynamic Energy-Efficient Offloading Algorithm (DEEO), seamlessly integrated into the Mobile Edge-Cloud Computing (MECC) environment. DEEO empowers mobile devices to efficiently offload computationally intensive secure image transmission tasks to the nearest edge server or fog access point. This integration optimizes resource utilization, minimizes energy consumption, and ensures the confidentiality and integrity of sensitive medical image data. Through rigorous evaluations and comparative analysis, our approach demonstrates clear superiority over existing solutions. This integrated framework is poised to significantly enhance healthcare applications, offering heightened efficiency, elevated security, and an overall improved user experience.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

ieee research papers on mobile computing

Data Availability

The data that support the findings of this study include experimental results, processed data, and analytical scripts. These data are not publicly available due to privacy or ethical restrictions. However, detailed information about the methodology and results can be obtained from the corresponding author upon reasonable request.

DevTeam.Space. Edge computing use cases. https://www.devteam.space/blog/edge-computing-use-cases/

Cao B, Wei Q, Lv Z, Zhao J, Singh AK. Many-objective deployment optimization of edge devices for 5g networks. IEEE Trans Netw Sci Eng. 2020;7(4):2117–25.

Article   MathSciNet   Google Scholar  

Saeik F, Avgeris M, Spatharakis D, Santi N, Dechouniotis D, Violos J, Leivadeas A, Athanasopoulos N, Mitton N, Papavassiliou S. Task offloading in edge and cloud computing: a survey on mathematical, artificial intelligence and control theory solutions. Comput Netw. 2021;195: 108177.

Article   Google Scholar  

Sadatdiynov K, Cui L, Zhang L, Huang JZ, Salloum S, Mahmud MS. A review of optimization methods for computation offloading in edge computing networks. Digit Commun Netw 2023;9(2):450–61. https://doi.org/10.1016/j.dcan.2022.03.003 . https://www.sciencedirect.com/science/article/pii/S2352864822000244

Definitive data and analysis for the mobile industry. Intelligence, GSMA (2016). www.GSMAintelligence.com

Help net security 2019:41.6 billion iot devices will be generating 79.4 zettabytes of data in 2025 (2019)

Danilak R. Why energy is a big and rapidly growing problem for data centers. Forbes. 2017;15:12–7.

Google Scholar  

Cutress I. Intel’s manufacturing roadmap from 2019 to 2029: back porting, 7 nm, 5 nm, 3 nm, 2 nm, and 1.4 nm. AnandTech, December 2019;11

Karypis G, Kumar V. in Proceedings of the PPSC (Parallel Processing for Scientific Computing) 1997

Catalyurek UV, Boman EG, et al. in International Parallel and Distributed Processing Symposium, 2007;pp. 1–11

Mondal A, Chatterjee PS. in OITS International Conference on Information Technology, OCIT 2022, Bhubaneswar, India, December 14-16, 2022 (IEEE, 2022), pp. 451–456. https://doi.org/10.1109/OCIT56763.2022.00090

Mondal A, Chatterjee P. Cloudsec: A lightweight and agile approach to secure medical image transmission in the cloud computing environment. SN Comput Sci. 2024;5:237. https://doi.org/10.1007/s42979-023-02539-w .

Rout SK, Ravinda J, Meda A, Mohanty SN, Kavididevi V. A dynamic scalable auto-scaling model as a load balancer in the cloud computing environment. EAI Endorsed Trans Scalab Inf Syst 2023;10:5. https://doi.org/10.4108/eetsis.3356 . https://publications.eai.eu/index.php/sis/article/view/3356

Li A, Iqbal MM, Jamil H, Akbar H, Muthanna A, Ammi M, Althobaiti MM. Multilevel central trust management approach for task scheduling on iot-based mobile cloud computing. Sensors. 2021;22(1):108. https://doi.org/10.3390/s22010108 .

Ullah I, Lim HK, Seok YJ, et al. Optimizing task offloading and resource allocation in edge-cloud networks: A drl approach. J Cloud Comput. 2023;12:112. https://doi.org/10.1186/s13677-023-00461-3 .

Vijarania M, Gupta S, Agrawal A, Adigun MO, Ajagbe SA, Awotunde JB. Energy efficient load-balancing mechanism in integrated iot, fog, cloud environment. Electronics. 2023;12:11. https://doi.org/10.3390/electronics12112543 .

Lin Q. Dynamic resource allocation strategy in mobile edge cloud computing environment. Mobile Inf Syst. 2021;20:10. https://doi.org/10.1155/2021/8381998 .

Jangra A, Mangla N. An efficient load balancing framework for deploying resource schedulingin cloud based communication in healthcare. Meas Sensors. 2023;25: 100584. https://doi.org/10.1016/j.measen.2022.100584 .

Khan AA, Shaikh ZA, Baitenova L, Mutaliyeva L, Moiseev N, Mikhaylov A, Laghari AA, Idris SA, Alshazly H. Qos-ledger: Smart contracts and metaheuristic for secure quality-of-service and cost-efficient scheduling of medical-data processing. Electronics. 2021;10:24. https://doi.org/10.3390/electronics10243083 .

Shuja J, Mustafa S, Ahmad RW, Madani SA, Gani A, Khan MK. Analysis of vector code offloading framework in heterogeneous cloud and edge architectures. IEEE Access. 2017;5:24542–54.

Nguyen QH, Dressler F. A smartphone perspective on computation offloading—a survey. Comput Commun. 2020;159:133–54.

Patel M, Naughton B, Chan C, Sprecher N, Abeta S, Neal A, et al. Mobile-edge computing introductory technical white paper. White paper, mobile-edge computing (MEC) industry initiative 2014;29:854–864

Satyanarayanan M, Bahl P, Caceres R, Davies N. The case for vm-based cloudlets in mobile computing. IEEE Pervas Comput. 2009;8(4):14–23.

Pal S, Dumka, A. in Advances in Information Communication Technology and Computing: Proceedings of AICTC 2019 (Springer, Berlin, 2021), pp. 409–418

Mathur RP, Sharma M. in 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), vol. 1 (IEEE, 2021), pp. 1148–1154

Xia W, Shen L. Joint resource allocation at edge cloud based on ant colony optimization and genetic algorithm. Wireless Person Commun. 2021;117:355–86.

Maray M, Jhumka A, Chester A, Younis M. in 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC) (IEEE, 2019), pp. 1–4

Chen L, Wu J, Zhang J, Dai HN, Long X, Yao M. Dependency-aware computation offloading for mobile edge computing with edge-cloud cooperation. IEEE Trans Cloud Comput. 2020;10(4):2451–68.

Zhang H, Liu X, Bian X, Cheng Y, Xiang S, et al. A resource allocation scheme for real-time energy-aware offloading in vehicular networks with mec. Wireless Commun Mobile Comput. 2022;20:22.

Dong L, Satpute MN, Shan J, Liu B, Yu Y, Yan T. in 2019 IEEE 39th international conference on distributed computing systems (ICDCS) (IEEE, 2019), pp. 841–850

Cheng S, Chen Z, Li J, Gao H. in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) (IEEE, 2019), pp. 997–1006

You Q, Tang B. Efficient task offloading using particle swarm optimization algorithm in edge computing for industrial internet of things. J Cloud Comput. 2021;10(1):41. https://doi.org/10.1186/s13677-021-00256-4 .

Lin L, Liao X, Jin H, Li P. Computation offloading toward edge computing. Proc IEEE. 2019;107(8):1584–607. https://doi.org/10.1109/JPROC.2019.2922285 .

Jiang C, Cheng X, Gao H, Zhou X, Wan J. Toward computation offloading in edge computing: a survey. IEEE Access. 2019;7:131543–58. https://doi.org/10.1109/ACCESS.2019.2938660 .

Safavat S, Sapavath NN, Rawat DB. Recent advances in mobile edge computing and content caching. Digit Commun Netw. 2020;6(2):189–94.

Mao Y, You C, Zhang J, Huang K, Letaief KB. A survey on mobile edge computing: the communication perspective. IEEE Commun Surv Tutor. 2017;19(4):2322–58. https://doi.org/10.1109/COMST.2017.2738495 .

Mazouzi H, Boussetta K, Achir N. Maximizing mobiles energy saving through tasks optimal offloading placement in two-tier cloud: a theoretical and an experimental study. Comput Commun. 2019;144:132–48. https://doi.org/10.1016/j.comcom.2019.05.017 .

Zhao W, Wang X, Jin S, Yue W, Takahashi Y. An energy efficient task scheduling strategy in a cloud computing system and its performance evaluation using a two-dimensional continuous time markov chain model. Electronics. 2019;8(7):775.

Guo S, Xiao B, Yang Y, Yang, Y. in IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications (IEEE, 2016), pp. 1–9

Hazra A, Adhikari M, Amgoth T, Srirama SN. Joint computation offloading and scheduling optimization of iot applications in fog networks. IEEE Trans Netw Sci Eng. 2020;7(4):3266–78.

Li Z, Zhu Q. Genetic algorithm-based optimization of offloading and resource allocation in mobile-edge computing. Information. 2020;11(2):83.

Xu J, Hao Z, Sun X. Optimal offloading decision strategies and their influence analysis of mobile edge computing. Sensors. 2019;19(14):3231.

Lv Z, Chen D, Lou R, Wang Q. Intelligent edge computing based on machine learning for smart city. Fut Gen Comput Syst. 2021;115:90–9.

You Q, Tang B. Efficient task offloading using particle swarm optimization algorithm in edge computing for industrial internet of things. J Cloud Comput. 2021;10:41. https://doi.org/10.1186/s13677-021-00256-4 .

Zhang P, Gan P, Chang L, Wen W, Selvi M, Kibalya G. Dprl: Task offloading strategy based on differential privacy and reinforcement learning in edge computing. IEEE Access. 2022;10:54002–11. https://doi.org/10.1109/ACCESS.2022.3175194 .

Kishor A, Chakarbarty C. Task offloading in fog computing for using smart ant colony optimization. Wireless Person Commun. 2022;127:1683–704. https://doi.org/10.1007/s11277-021-08714-7 .

Chung MT, Weidendorfer J, Fürlinger K, Kranzlmüller D. in Parallel processing and applied mathematics. PPAM 2022, Lecture Notes in Computer Science, vol. 13826, ed. by R. Wyrzykowski, J. Dongarra, E. Deelman, K. Karczewski (Springer, Cham, 2023). https://doi.org/10.1007/978-3-031-30442-2_20

Zhang J, Xia W, Yan F, Shen L. Joint computation offloading and resource allocation optimization in heterogeneous networks with mobile edge computing. IEEE Access. 2018;6:19324–37.

Shakarami A, Ghobaei-Arani M, Masdari M, Hosseinzadeh M. A survey on the computation offloading approaches in mobile edge/cloud computing environment: a stochastic-based perspective. J Grid Comput. 2020;18:639–71.

Chakraborty S, Mazumdar K. Sustainable task offloading decision using genetic algorithm in sensor mobile edge computing. J King Saud Univ Comput Inf Sci. 2022;34:1552–68. https://doi.org/10.1016/j.jksuci.2022.02.014 .

Wang H, Xu H, Huang H, Chen M, Chen S. Robust task offloading in dynamic edge computing. IEEE Trans Mobile Comput. 2023;22(1):500–14. https://doi.org/10.1109/TMC.2021.3068748 .

He Q, Feng Z, Fang H, Wang X, Zhao L, Yao Y, Yu K. A blockchain-based scheme for secure data offloading in healthcare with deep reinforcement learning. IEEE/ACM Trans Netw. 2023;2:1–16. https://doi.org/10.1109/TNET.2023.3274631 .

Shahid MH, Hameed AR, Islam S, Khattak HA, Din IU, Rodrigues JJ. Energy and delay efficient fog computing using caching mechanism. Comput Commun. 2020;154:534–41. https://doi.org/10.1016/j.comcom.2020.03.001 .

Xu H, Zhou Z. In 2013 15th IEEE International Conference on Communication Technology (2013), pp. 115–119. https://doi.org/10.1109/ICCT.2013.6820357

Download references

Author information

Authors and affiliations.

School of Computer Engineering, KIIT University, Bhubaneswar, Odisha, India

Avijit Mondal, Pinaki Sankar Chatterjee & Niranjan K. Ray

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Avijit Mondal .

Ethics declarations

Conflict of interest.

On behalf of all authors, the corresponding author states that there is no Conflict of interest.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Mondal, A., Chatterjee, P.S. & Ray, N.K. An Optimal Novel Approach for Dynamic Energy-Efficient Task Offloading in Mobile Edge-Cloud Computing Networks. SN COMPUT. SCI. 5 , 655 (2024). https://doi.org/10.1007/s42979-024-02992-1

Download citation

Received : 10 September 2023

Accepted : 23 May 2024

Published : 15 June 2024

DOI : https://doi.org/10.1007/s42979-024-02992-1

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Mobile edge computing
  • Mobile cloud computing
  • Task offloading
  • Mobile energy consumption
  • Dynamic decision-making
  • Energy efficient offloading
  • Workload analysis
  • Dynamic optimization algorithm
  • Genetic algorithm
  • Hill climbing
  • Scalability analysis
  • Statistical analysis

Advertisement

  • Find a journal
  • Publish with us
  • Track your research

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Share this page:

Mobile Edge Computing

Submission Deadline:  1 December 2017

IEEE Access invites manuscript submissions in the area of Mobile Edge Computing.

Mobile edge computing is emerging as a promising computing architecture by pushing computation and storage closer to end users with both strategically deployed and opportunistic processing and storage resources. Such mechanism is essentially different from the traditional definition of cloud computing. It can provide solutions to problems faced by mobile cloud computing and agile support to a large number of different mobile and Internet of Things (IoT) applications and services, e.g., transport, smart grid, and healthcare. However, to maximize the resource utilization and user service experiences, it is envisioned that mobile edge computing and cloud computing should be designed and operated under a seamless integrated hierarchical architecture. Still, we can see many unprecedented technical challenges for applying mobile edge computing for the emerging mobile and IoT applications.

This Special Section in IEEE Access aims to bring together researchers to report recent advances in mobile edge computing, exchange new ideas with innovative technologies and solutions towards mobile edge computing models. The Special Section will include a collection of outstanding technical research surveys and new research results, covering a wide range of topics within mobile edge computing.

Authors are invited to submit original and unpublished papers in any of, but not limited to, the following or related topics of interest:

  • Mobile edge computing architecture
  • Integrated mobile edge, cloud computing architecture
  • Mobile edge computing services provisioning
  • Mobile edge computing service discovery and management
  • Performance evaluation and modeling
  • Resource pooling, virtualization and SDN
  • Communications and networking
  • Edge analytics
  • Edge storage and caching
  • Load balancing and interaction with clouds
  • Resource sharing, management and optimization
  • Quality of services
  • Security, privacy and energy awareness
  • Edge computing supported IoT applications
  • Mobile applications (health, transportation, smart grid, etc.)
  • Field trials and experiments

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Yan Zhang, University of Oslo, Norway

Guest Editors:

  • Jianhua He, Aston University, UK
  • Javier Lopez, University of Malaga, Spain
  • Min Sheng, Xidian University, China
  • Hassnaa Moustafa, Intel, USA
  • Yizhi Ren, Hangzhou Dianzi University, China
  • Nirwan Ansari, New Jersey Institute of Technology, USA

Related IEEE Access Special Sections:

  • Mobile Edge Computing for Wireless Networks
  • The New Era of Smart Cities: Sensors, Communication Technologies and Applications
  • Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to: http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: Bora M. Onat, Managing Editor, IEEE Access (Phone: (732) 562-6036, [email protected] )

At a Glance

  • Journal: IEEE Access
  • Format: Open Access
  • Frequency: Continuous
  • Submission to Publication: 4-6 weeks (typical)
  • Topics: All topics in IEEE
  • Average Acceptance Rate: 27%
  • Impact Factor: 3.9
  • Model: Binary Peer Review
  • Article Processing Charge: US $1,995

Featured Articles

ieee research papers on mobile computing

On the Cyber-Physical Needs of DER-Based Voltage Control/Optimization Algorithms in Active Distribution Network

View in IEEE Xplore

ieee research papers on mobile computing

DNN Partitioning for Inference Throughput Acceleration at the Edge

ieee research papers on mobile computing

Effect of Data Characteristics Inconsistency on Medium and Long-Term Runoff Forecasting by Machine Learning

Submission guidelines.

© 2024 IEEE - All rights reserved. Use of this website signifies your agreement to the IEEE TERMS AND CONDITIONS.

A not-for-profit organization, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

AWARD RULES:

NO PURCHASE NECESSARY TO ENTER OR WIN. A PURCHASE WILL NOT INCREASE YOUR CHANCES OF WINNING.

These rules apply to the “2024 IEEE Access Best Video Award Part 1″ (the “Award”).

  • Sponsor: The Sponsor of the Award is The Institute of Electrical and Electronics Engineers, Incorporated (“IEEE”) on behalf of IEEE Access , 445 Hoes Lane, Piscataway, NJ 08854-4141 USA (“Sponsor”).
  • Eligibility: Award is open to residents of the United States of America and other countries, where permitted by local law, who are the age of eighteen (18) and older. Employees of Sponsor, its agents, affiliates and their immediate families are not eligible to enter Award. The Award is subject to all applicable state, local, federal and national laws and regulations. Entrants may be subject to rules imposed by their institution or employer relative to their participation in Awards and should check with their institution or employer for any relevant policies. Void in locations and countries where prohibited by law.
  • Agreement to Official Rules : By participating in this Award, entrants agree to abide by the terms and conditions thereof as established by Sponsor. Sponsor reserves the right to alter any of these Official Rules at any time and for any reason.  All decisions made by Sponsor concerning the Award including, but not limited to the cancellation of the Award, shall be final and at its sole discretion. 
  • How to Enter: This Award opens on January 1, 2024 at 12:00 AM ET and all entries must be received by 11:59 PM ET on June 30, 2024 (“Promotional Period”).

Entrant must submit a video with an article submission to IEEE Access . The video submission must clearly be relevant to the submitted manuscript.  Only videos that accompany an article that is accepted for publication in IEEE Access will qualify.  The video may be simulations, demonstrations, or interviews with other experts, for example.  Your video file should not exceed 100 MB.

Entrants can enter the Award during Promotional Period through the following method:

  • The IEEE Author Portal : Entrants can upload their video entries while submitting their article through the IEEE Author Portal submission site .
  • Review and Complete the Terms and Conditions: After submitting your manuscript and video through the IEEE Author Portal, entrants should then review and sign the Terms and Conditions .

Entrants who have already submitted a manuscript to IEEE Access without a video can still submit a video for inclusion in this Award so long as the video is submitted within 7 days of the article submission date.  The video can be submitted via email to the article administrator.  All videos must undergo peer review and be accepted along with the article submission.  Videos may not be submitted after an article has already been accepted for publication. 

The criteria for an article to be accepted for publication in IEEE Access are:

  • The article must be original writing that enhances the existing body of knowledge in the given subject area. Original review articles and surveys are acceptable even if new data/concepts are not presented.
  • Results reported must not have been submitted or published elsewhere (although expanded versions of conference publications are eligible for submission).
  • Experiments, statistics, and other analyses must be performed to a high technical standard and are described in sufficient detail.
  • Conclusions must be presented in an appropriate fashion and are supported by the data.
  • The article must be written in standard English with correct grammar.
  • Appropriate references to related prior published works must be included.
  • The article must fall within the scope of IEEE Access
  • Must be in compliance with the IEEE PSPB Operations Manual.
  • Completion of the required IEEE intellectual property documents for publication.
  • At the discretion of the IEEE Access Editor-in-Chief.
  • Disqualification: The following items will disqualify a video from being considered a valid submission:
  • The video is not original work.
  • A video that is not accompanied with an article submission.
  • The article and/or video is rejected during the peer review process.
  • The article and/or video topic does not fit into the scope of IEEE Access .
  • The article and/or do not follow the criteria for publication in IEEE Access .
  • Videos posted in a comment on IEEE Xplore .
  • Content ​is off-topic, offensive, obscene, indecent, abusive or threatening to others.
  • Infringes the copyright, trademark or other right of any third party.
  • Uploads viruses or other contaminating or destructive features.
  • Is in violation of any applicable laws or regulations.
  • Is not in English​.
  • Is not provided within the designated submission time.
  • Entrant does not agree and sign the Terms and Conditions document.

Entries must be original. Entries that copy other entries, or the intellectual property of anyone other than the Entrant, may be removed by Sponsor and the Entrant may be disqualified. Sponsor reserves the right to remove any entry and disqualify any Entrant if the entry is deemed, in Sponsor’s sole discretion, to be inappropriate.

  • Entrant’s Warranty and Authorization to Sponsor: By entering the Award, entrants warrant and represent that the Award Entry has been created and submitted by the Entrant. Entrant certifies that they have the ability to use any image, text, video, or other intellectual property they may upload and that Entrant has obtained all necessary permissions. IEEE shall not indemnify Entrant for any infringement, violation of publicity rights, or other civil or criminal violations. Entrant agrees to hold IEEE harmless for all actions related to the submission of an Entry. Entrants further represent and warrant, if they reside outside of the United States of America, that their participation in this Award and acceptance of a prize will not violate their local laws.
  • Intellectual Property Rights: Entrant grants Sponsor an irrevocable, worldwide, royalty free license to use, reproduce, distribute, and display the Entry for any lawful purpose in all media whether now known or hereinafter created. This may include, but is not limited to, the IEEE A ccess website, the IEEE Access YouTube channel, the IEEE Access IEEE TV channel, IEEE Access social media sites (LinkedIn, Facebook, Twitter, IEEE Access Collabratec Community), and the IEEE Access Xplore page. Facebook/Twitter/Microsite usernames will not be used in any promotional and advertising materials without the Entrants’ expressed approval.
  • Number of Prizes Available, Prizes, Approximate Retail Value and Odds of winning Prizes: Two (2) promotional prizes of $350 USD Amazon gift cards. One (1) grand prize of a $500 USD Amazon gift card. Prizes will be distributed to the winners after the selection of winners is announced. Odds of winning a prize depend on the number of eligible entries received during the Promotional Period. Only the corresponding author of the submitted manuscript will receive the prize.

The grand prize winner may, at Sponsor’ discretion, have his/her article and video highlighted in media such as the IEEE Access Xplore page and the IEEE Access social media sites.

The prize(s) for the Award are being sponsored by IEEE.  No cash in lieu of prize or substitution of prize permitted, except that Sponsor reserves the right to substitute a prize or prize component of equal or greater value in its sole discretion for any reason at time of award.  Sponsor shall not be responsible for service obligations or warranty (if any) in relation to the prize(s). Prize may not be transferred prior to award. All other expenses associated with use of the prize, including, but not limited to local, state, or federal taxes on the Prize, are the sole responsibility of the winner.  Winner(s) understand that delivery of a prize may be void where prohibited by law and agrees that Sponsor shall have no obligation to substitute an alternate prize when so prohibited. Amazon is not a sponsor or affiliated with this Award.

  • Selection of Winners: Promotional prize winners will be selected based on entries received during the Promotional Period. The sponsor will utilize an Editorial Panel to vote on the best video submissions. Editorial Panel members are not eligible to participate in the Award.  Entries will be ranked based on three (3) criteria:
  • Presentation of Technical Content
  • Quality of Video

Upon selecting a winner, the Sponsor will notify the winner via email. All potential winners will be notified via their email provided to the sponsor. Potential winners will have five (5) business days to respond after receiving initial prize notification or the prize may be forfeited and awarded to an alternate winner. Potential winners may be required to sign an affidavit of eligibility, a liability release, and a publicity release.  If requested, these documents must be completed, signed, and returned within ten (10) business days from the date of issuance or the prize will be forfeited and may be awarded to an alternate winner. If prize or prize notification is returned as undeliverable or in the event of noncompliance with these Official Rules, prize will be forfeited and may be awarded to an alternate winner.

  • General Prize Restrictions:  No prize substitutions or transfer of prize permitted, except by the Sponsor. Import/Export taxes, VAT and country taxes on prizes are the sole responsibility of winners. Acceptance of a prize constitutes permission for the Sponsor and its designees to use winner’s name and likeness for advertising, promotional and other purposes in any and all media now and hereafter known without additional compensation unless prohibited by law. Winner acknowledges that neither Sponsor, Award Entities nor their directors, employees, or agents, have made nor are in any manner responsible or liable for any warranty, representation, or guarantee, express or implied, in fact or in law, relative to any prize, including but not limited to its quality, mechanical condition or fitness for a particular purpose. Any and all warranties and/or guarantees on a prize (if any) are subject to the respective manufacturers’ terms therefor, and winners agree to look solely to such manufacturers for any such warranty and/or guarantee.

11.Release, Publicity, and Privacy : By receipt of the Prize and/or, if requested, by signing an affidavit of eligibility and liability/publicity release, the Prize Winner consents to the use of his or her name, likeness, business name and address by Sponsor for advertising and promotional purposes, including but not limited to on Sponsor’s social media pages, without any additional compensation, except where prohibited.  No entries will be returned.  All entries become the property of Sponsor.  The Prize Winner agrees to release and hold harmless Sponsor and its officers, directors, employees, affiliated companies, agents, successors and assigns from and against any claim or cause of action arising out of participation in the Award. 

Sponsor assumes no responsibility for computer system, hardware, software or program malfunctions or other errors, failures, delayed computer transactions or network connections that are human or technical in nature, or for damaged, lost, late, illegible or misdirected entries; technical, hardware, software, electronic or telephone failures of any kind; lost or unavailable network connections; fraudulent, incomplete, garbled or delayed computer transmissions whether caused by Sponsor, the users, or by any of the equipment or programming associated with or utilized in this Award; or by any technical or human error that may occur in the processing of submissions or downloading, that may limit, delay or prevent an entrant’s ability to participate in the Award.

Sponsor reserves the right, in its sole discretion, to cancel or suspend this Award and award a prize from entries received up to the time of termination or suspension should virus, bugs or other causes beyond Sponsor’s control, unauthorized human intervention, malfunction, computer problems, phone line or network hardware or software malfunction, which, in the sole opinion of Sponsor, corrupt, compromise or materially affect the administration, fairness, security or proper play of the Award or proper submission of entries.  Sponsor is not liable for any loss, injury or damage caused, whether directly or indirectly, in whole or in part, from downloading data or otherwise participating in this Award.

Representations and Warranties Regarding Entries: By submitting an Entry, you represent and warrant that your Entry does not and shall not comprise, contain, or describe, as determined in Sponsor’s sole discretion: (A) false statements or any misrepresentations of your affiliation with a person or entity; (B) personally identifying information about you or any other person; (C) statements or other content that is false, deceptive, misleading, scandalous, indecent, obscene, unlawful, defamatory, libelous, fraudulent, tortious, threatening, harassing, hateful, degrading, intimidating, or racially or ethnically offensive; (D) conduct that could be considered a criminal offense, could give rise to criminal or civil liability, or could violate any law; (E) any advertising, promotion or other solicitation, or any third party brand name or trademark; or (F) any virus, worm, Trojan horse, or other harmful code or component. By submitting an Entry, you represent and warrant that you own the full rights to the Entry and have obtained any and all necessary consents, permissions, approvals and licenses to submit the Entry and comply with all of these Official Rules, and that the submitted Entry is your sole original work, has not been previously published, released or distributed, and does not infringe any third-party rights or violate any laws or regulations.

12.Disputes:  EACH ENTRANT AGREES THAT: (1) ANY AND ALL DISPUTES, CLAIMS, AND CAUSES OF ACTION ARISING OUT OF OR IN CONNECTION WITH THIS AWARD, OR ANY PRIZES AWARDED, SHALL BE RESOLVED INDIVIDUALLY, WITHOUT RESORTING TO ANY FORM OF CLASS ACTION, PURSUANT TO ARBITRATION CONDUCTED UNDER THE COMMERCIAL ARBITRATION RULES OF THE AMERICAN ARBITRATION ASSOCIATION THEN IN EFFECT, (2) ANY AND ALL CLAIMS, JUDGMENTS AND AWARDS SHALL BE LIMITED TO ACTUAL OUT-OF-POCKET COSTS INCURRED, INCLUDING COSTS ASSOCIATED WITH ENTERING THIS AWARD, BUT IN NO EVENT ATTORNEYS’ FEES; AND (3) UNDER NO CIRCUMSTANCES WILL ANY ENTRANT BE PERMITTED TO OBTAIN AWARDS FOR, AND ENTRANT HEREBY WAIVES ALL RIGHTS TO CLAIM, PUNITIVE, INCIDENTAL, AND CONSEQUENTIAL DAMAGES, AND ANY OTHER DAMAGES, OTHER THAN FOR ACTUAL OUT-OF-POCKET EXPENSES, AND ANY AND ALL RIGHTS TO HAVE DAMAGES MULTIPLIED OR OTHERWISE INCREASED. ALL ISSUES AND QUESTIONS CONCERNING THE CONSTRUCTION, VALIDITY, INTERPRETATION AND ENFORCEABILITY OF THESE OFFICIAL RULES, OR THE RIGHTS AND OBLIGATIONS OF ENTRANT AND SPONSOR IN CONNECTION WITH THE AWARD, SHALL BE GOVERNED BY, AND CONSTRUED IN ACCORDANCE WITH, THE LAWS OF THE STATE OF NEW JERSEY, WITHOUT GIVING EFFECT TO ANY CHOICE OF LAW OR CONFLICT OF LAW, RULES OR PROVISIONS (WHETHER OF THE STATE OF NEW JERSEY OR ANY OTHER JURISDICTION) THAT WOULD CAUSE THE APPLICATION OF THE LAWS OF ANY JURISDICTION OTHER THAN THE STATE OF NEW JERSEY. SPONSOR IS NOT RESPONSIBLE FOR ANY TYPOGRAPHICAL OR OTHER ERROR IN THE PRINTING OF THE OFFER OR ADMINISTRATION OF THE AWARD OR IN THE ANNOUNCEMENT OF THE PRIZES.

  • Limitation of Liability:  The Sponsor, Award Entities and their respective parents, affiliates, divisions, licensees, subsidiaries, and advertising and promotion agencies, and each of the foregoing entities’ respective employees, officers, directors, shareholders and agents (the “Released Parties”) are not responsible for incorrect or inaccurate transfer of entry information, human error, technical malfunction, lost/delayed data transmissions, omission, interruption, deletion, defect, line failures of any telephone network, computer equipment, software or any combination thereof, inability to access web sites, damage to a user’s computer system (hardware and/or software) due to participation in this Award or any other problem or error that may occur. By entering, participants agree to release and hold harmless the Released Parties from and against any and all claims, actions and/or liability for injuries, loss or damage of any kind arising from or in connection with participation in and/or liability for injuries, loss or damage of any kind, to person or property, arising from or in connection with participation in and/or entry into this Award, participation is any Award-related activity or use of any prize won. Entry materials that have been tampered with or altered are void. If for any reason this Award is not capable of running as planned, or if this Award or any website associated therewith (or any portion thereof) becomes corrupted or does not allow the proper playing of this Award and processing of entries per these rules, or if infection by computer virus, bugs, tampering, unauthorized intervention, affect the administration, security, fairness, integrity, or proper conduct of this Award, Sponsor reserves the right, at its sole discretion, to disqualify any individual implicated in such action, and/or to cancel, terminate, modify or suspend this Award or any portion thereof, or to amend these rules without notice. In the event of a dispute as to who submitted an online entry, the entry will be deemed submitted by the authorized account holder the email address submitted at the time of entry. “Authorized Account Holder” is defined as the person assigned to an email address by an Internet access provider, online service provider or other organization responsible for assigning email addresses for the domain associated with the email address in question. Any attempt by an entrant or any other individual to deliberately damage any web site or undermine the legitimate operation of the Award is a violation of criminal and civil laws and should such an attempt be made, the Sponsor reserves the right to seek damages and other remedies from any such person to the fullest extent permitted by law. This Award is governed by the laws of the State of New Jersey and all entrants hereby submit to the exclusive jurisdiction of federal or state courts located in the State of New Jersey for the resolution of all claims and disputes. Facebook, LinkedIn, Twitter, G+, YouTube, IEEE Xplore , and IEEE TV are not sponsors nor affiliated with this Award.
  • Award Results and Official Rules: To obtain the identity of the prize winner and/or a copy of these Official Rules, send a self-addressed stamped envelope to Kimberly Rybczynski, IEEE, 445 Hoes Lane, Piscataway, NJ 08854-4141 USA.

Skip to Content

Tamara Silbergleit Lehman earns IEEE Rising Star Service Award for advancing computing technologies

Tamara Lehman portrait

The Rising Star Service Award is presented annually to an individual who is 10 years or less into their career and has contributed to advancing computer science and technology. 

Lehman, who joined the Department of Electrical, Computer & Energy Engineering at CU Boulder in 2019, focuses on all aspects of computer security from the microarchitectural perspective and has led efforts to make computer architecture more inclusive. Her research interests span a wide array of topics at the intersection of computer architecture and security, aiming to design secure processors that are robust against numerous microarchitectural vulnerabilities.

“Receiving this award encourages me to continue doing the work to improve diversity and inclusion within the computer architecture community,” Lehman said. “I hope this service can help make improvements in the diversity of the community.”

Lehman organized the Career Workshop for Inclusion and Diversity in Computer Architecture (CWIDCA) for five years, which is the longest running workshop of its kind among the computer architecture community. The CWIDCA — in conjunction with MICRO, the top-tier conference in computer architecture research — has supported about 30 students annually for its ninth year in creating networks of diverse researchers across companies, universities and countries. She collaborated with fellow co-organizers, including Valentina Salapura of Google, Alan Bivens of IBM, Professor Hyeran Jeon from University of California Merced and Professor Elaheh Sadredini from University of California Riverside. 

As part of her nomination, Professor Yan Solihin from the University of Central Florida remarked, “Tamara goes above and beyond to ensure her role has an impact in the community. It is clear from her impressive record of service and leadership that she truly cares about the success of our community.”

 “I want to thank my friend and mentor Professor Iris Bahar for supporting me throughout the years,” said Lehman, “and Professor Yan Solihin for allowing me to serve in the organizing committee as the Travel Awards chair for the 50th Anniversary of the International Symposium on Computer Architecture.”

Lehman has earned numerous awards, including Outstanding Mentor for the Discovery Learning Apprenticeship and Outstanding Service for Inclusion and Diversity at CU Boulder, as well as the DARPA Risers award for her research that is advancing national security. In 2023, she was invited as a keynote speaker for the International Conference on Engineering Applications of Neural Networks in Spain.

She earned a PhD from Duke University in computer engineering. While completing her PhD, Lehman worked two consecutive summers at Intel Labs with the architectural security team in 2015 and 2016, which produced a patent titled, “Cryptographic Cache Lines for A Trusted Execution Environment.” She completed her master’s degree in computer engineering at Duke University and earned a bachelor’s of science from the University of Florida in industrial and systems engineering. Lehman holds a courtesy appointment in the Department of Computer Science and is a member of the Colorado Research Center for Democracy and Technology .

She has authored 11 publications for major conferences, including the Architectural Support for Programming Languages and Operating Systems, Parallel Architectures and Compilation Techniques and  Computer-Supported Cooperative Work. Additionally, she has  published in several journals, with one article winning the Best Paper award and another  receiving an honorable mention in Micro Top Picks.

Related Articles

Dragan Maksimovic

Air quality detection and filtration technology to support Native American communities

Al Gasiewski Golden Florin Award

Al Gasiewski presented IEEE award for remote sensing research

Bruno Armas and Jasleen Batra ECEE awards 2024

ECEE students earn college undergraduate awards 2024

Apply   Visit   Give

Departments

  • Ann and H.J. Smead Aerospace Engineering Sciences
  • Chemical & Biological Engineering
  • Civil, Environmental & Architectural Engineering
  • Computer Science
  • Electrical, Computer & Energy Engineering
  • Paul M. Rady Mechanical Engineering
  • Applied Mathematics
  • Biomedical Engineering
  • Creative Technology & Design
  • Engineering Education
  • Engineering Management
  • Engineering Physics
  • Environmental Engineering
  • Integrated Design Engineering
  • Materials Science & Engineering

Affiliates & Partners

  • ATLAS Institute
  • BOLD Center
  • Colorado Mesa University
  • Colorado Space Grant Consortium
  • Discovery Learning
  • Engineering Honors
  • Engineering Leadership
  • Entrepreneurship
  • Herbst Program for Engineering, Ethics & Society
  • Integrated Teaching and Learning
  • Global Engineering
  • Mortenson Center for Global Engineering
  • National Center for Women & Information Technology
  • Western Colorado University

IMAGES

  1. IEEE Paper Template

    ieee research papers on mobile computing

  2. Mobile Computing 2011-2012 M.Sc Computer Science Semester 3 question

    ieee research papers on mobile computing

  3. (PDF) Announcing a Special Section in IEEE Access: TITLE: Mobile Edge

    ieee research papers on mobile computing

  4. [PDF] Mobile Computing Systems and Applications

    ieee research papers on mobile computing

  5. 4 G Mobile Technology Research Paper

    ieee research papers on mobile computing

  6. (PDF) IEEE Access Special Section Editorial: Security and Reliability

    ieee research papers on mobile computing

VIDEO

  1. A publication roadmap to an IEEE research paper

  2. How to download IEEE research/Journals for FREE!#india #education #trending #trendingvideo #students

  3. How to download IEEE Journal paper

  4. WSDM-23 Paper: Efficiently Leveraging Multi-level User Intent for Session-based Recommendation

  5. Video presentation of summary papers

  6. How to Access IEEE Research Papers and Articles for Free

COMMENTS

  1. IEEE Transactions on Mobile Computing

    Scope. IEEE Transactions on Mobile Computing focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies. Topics of interest include, but are not limited to, the ...

  2. Mobile cloud computing: Current development and research ...

    Mobile cloud computing has been introduced to be a powerful technology for mobile services by combining mobile computing and cloud computing technology. Though, a direct integration of two technologies can overcome a many of hurdles related to the performance, flexibility, security, and dynamic management discussed in mobile computing. Mobile cloud computing can address these problems by ...

  3. Mobile Cloud Computing: Challenges and Future Research ...

    In society today, mobile communication and mobile computing have a significant role in every aspect of our lives, both personal and public communication. However, the growth in mobile computing usage can be enhanced by integrating mobile computing into cloud computing. This will result in emerging a new model called Mobile Cloud Computing (MCC) that has recently attracted much attention in the ...

  4. Mobile Cloud Computing Research

    The rapid advance of mobile computing technology and wireless networking, there is a significant increase of mobile subscriptions. This drives a strong demand for mobile cloud applications and services for mobile device users. This brings out a great business and research opportunity in mobile cloud computing (MCC). This paper first discusses the market trend and related business driving ...

  5. The Two Faces of AI in Green Mobile Computing: A ...

    In this paper, we present a review of the literature of the past decade on the usage of artificial intelligence within the realm of green mobile computing. From the analysis of 34 papers, we highlight the emerging patterns and map the field into 13 main topics that are summarized in details.Our results showcase that the field is slowly ...

  6. Research on mobile cloud computing: Review, trend and ...

    Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world since 2009. As MCC is still at the early stage of development, it is necessary to grasp a thorough understanding of the technology in order to point out the direction of future research. With the latter aim, this paper ...

  7. Mobile cloud computing and application program interfaces

    However, the development of these new systems have also brought new challenges. Research topics such as securing the cloud, the impact of network function virtualization and software-defined networks on the cloud, and mobile cloud computing has arisen. ... This paper provides the results of a survey done on the current research available on the ...

  8. Research issues in mobile computing

    We are on the verge of a new computing paradigm that is now widely known as "mobile" or "nomadic" computing. The communication capabilities of high performance portable computers is advancing at a rapid rate with the availability of powerful wireless communication interfaces. In this paper, we present research issues in mobile computing and survey approaches that address these issues.

  9. Discover Publications on Computing Research

    We are the home to prestigious publications that deliver insights from the brightest minds in computing. Our digital library has over 930,000+ articles, from a range of topics including award-winning special issues. All of Computing. Computer. IEEE Open Journal of the Computer Society. IEEE Transactions on Computers.

  10. Mobile Computing and Databases-A Survey

    This research has produced interesting results in areas such as data dissemination over limited bandwidth channels, location-dependent querying of data, and advanced interfaces for mobile computers. This paper is an effort to survey these techniques and to classify this research in a few broad areas.

  11. IEEE Access Special Section Editorial: Mobile Edge Computing and Mobile

    This book includes high quality research papers presented at the International Conference on Communication, Computing and Electronics Systems 2021, held at the PPG Institute of Technology ...

  12. Emergent Topics for Mobile and Ubiquitous Systems in Smartphone, IoT

    Emergent Topics for Mobile and Ubiquitous Systems in Smartphone, IoT, and Cloud Computing Era . Submission Deadline: 20 February 2017 IEEE Access invites manuscript submissions in the area of "Emergent Topics for Mobile and Ubiquitous Systems in Smartphone, IoT, and Cloud Computing Era.". The tremendously rapid popularization of smart phones has significantly impacted our daily life.

  13. Mobile Computing on IEEE Technology Navigator

    IEEE 125th Anniversary Media Event: Dynamic Composable Computing. Real-Time Task Offloading For Large-Scale Mobile Edge Computing. "Approximation- Beyond the Tyranny of Digital Computing," (Rebooting Computing) Joint Optimization of Radio and Computational Resources in Mobile Edge Computing.

  14. Pervasive and Mobile Computing

    The Pervasive and Mobile Computing Journal (PMC) is a high-impact, peer-reviewed technical journal that publishes high-quality scientific articles spanning theory and practice, and covering all aspects of pervasive and mobile computing and systems. Topics include, but not limited to: Pervasive Computing and Communications Architectures and ...

  15. A Survey of Mobile Cloud Computing Challenges and Solutions

    MCC. is a combination of cloud computing, mobile computing, and. wireless networking, that aims to provide cloud-based. servic es to the mobile device's customers [5]. When MCC is. fully deploye ...

  16. Call for Papers

    Download here. The fusion of mobile communications, computing, and intelligence is catalyzing the emergence of innovative systems and applications that facilitate intelligent resource provisioning, process extensive data from mobile sensors and interconnected hardware platforms, and bolster the Internet of Things (IoT) through robust edge and cloud-based backend infrastructure.

  17. Deep Reinforcement Learning based traffic routing on Mobile Edge

    A potential paradigm that makes compute and storage resources available at edge of network is Mobile Edge Computing (MEC). In this paper, we propose a traffic routing algorithm for MEC networks leveraging Deep Reinforcement Learning (DRL). Our approach leverages a dataset of MEC network topologies and specifications to model the network and trains a DRL agent to select the optimal routing path ...

  18. (PDF) Mobile computing: issues and challenges

    Abstract — Mobile Cloud Computing (MCC) is an emerging field. Due to the wide usage of mobile devices and variety of applications, mobile cloud computing becomes a necessary part for mobile ...

  19. 143681 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on MOBILE COMPUTING. Find methods information, sources, references or conduct a literature review on ...

  20. Mobile Communication on IEEE Technology Navigator

    GaN Technology for Future Mobile Radio Communication from a System Supplier's Perspective. Keynote by Mediatek - Dr. Mingxi Fan - B6GS 2023. IEEE Future Networks: Silicon Technologies for mmWave 5G Enhanced Mobile Broadband Radio Interface. Latency-Minimized Design Of Secure Transmissions In Uav-Aided Communications.

  21. mobile computing Latest Research Papers

    The Individual. In order to change the problem of data redundancy in a genetic algorithm, this paper proposes a computer mathematical model based on the combination of an improved genetic algorithm and mobile computing. Combined with the least square method, MATLAB software is used to solve the equations, determine the range of parameters, and ...

  22. Research Papers On Mobile Computing Ieee

    Research Papers on Mobile Computing Ieee - Free download as PDF File (.pdf), Text File (.txt) or read online for free. The document discusses the challenges of writing a thesis on mobile computing research papers, including navigating vast literature, conducting in-depth analyses, and presenting original findings. It states that seeking assistance from academic writing services like BuyPapers ...

  23. Ieee Research Papers On Mobile Cloud Computing

    Ieee Research Papers on Mobile Cloud Computing - Free download as PDF File (.pdf), Text File (.txt) or read online for free. ieee research papers on mobile cloud computing

  24. Research on On-board Edge Computing Network Task ...

    In order to overcome the selfishness of users and encourage more vehicles to participate in this process, this paper combined the computing and caching capabilities of mobile edge cloud, proposed a new service caching and delivery incentive mechanism, the main research content is as follows: Aiming at the service caching process, this paper designs a reputation incentive mechanism based on SD ...

  25. An Optimal Novel Approach for Dynamic Energy-Efficient Task ...

    The rapid evolution of mobile devices has greatly advanced secure medical image transmission, yet challenges persist due to resource limitations and security concerns inherent to these devices. In response, this paper introduces a Dynamic Energy-Efficient Offloading Algorithm (DEEO), seamlessly integrated into the Mobile Edge-Cloud Computing (MECC) environment. DEEO empowers mobile devices to ...

  26. Research on Anti-telecom Fraud Based on Artificial ...

    This paper studies the artificial intelligence method based on the collaboration of edge and terminal, integrates the complementary advantages of the local computing and strong computing power of the two, realizes the characteristic recognition of telecom fraud behavior, and realizes the accurate and real-time anti-telecom fraud. By constructing a telecom fraud identification and defense ...

  27. SoE Researchers win Best Paper Award at the 20th IEEE Annual

    ECE Professor Dario Pompili, ECE graduate students Songjun Huang and Chuanneng Sun, and CEE Assistant Professor Ruo-Qian (Roger) Wang have won the Best Paper Award at the 20th IEEE Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2024), which was held in April 29-May 1, 2024, in Abu Dhabi (UAE), for their paper titled "Multi ...

  28. Mobile Edge Computing

    This Special Section in IEEE Access aims to bring together researchers to report recent advances in mobile edge computing, exchange new ideas with innovative technologies and solutions towards mobile edge computing models. The Special Section will include a collection of outstanding technical research surveys and new research results, covering ...

  29. Tamara Silbergleit Lehman earns IEEE Rising Star Service Award for

    Assistant Professor Tamara Silbergleit Lehman recently received the 2024 Technical and Conference Activities Rising Star Service Award from the IEEE Computer Society, the largest global organization engaging computer scientists and engineers.. The Rising Star Service Award is presented annually to an individual who is 10 years or less into their career and has contributed to advancing computer ...