Establishing a mobile conference call under delay and bandwidth constraints

Amotz Bar-Noy, Zohar Naor

Research output: Contribution to journalConference articlepeer-review


The issue of tracking a group of users is discussed in this study. Given the condition' that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multiple users search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users.

Original languageEnglish
Pages (from-to)310-318
Number of pages9
JournalProceedings - IEEE INFOCOM
StatePublished - 2004
EventIEEE INFOCOM 2004 - Conference on Computer Communications - Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies - Hongkong, China
Duration: 7 Mar 200411 Mar 2004


  • Location management
  • Mobile Computing
  • Wireless Networks

ASJC Scopus subject areas

  • General Computer Science
  • Electrical and Electronic Engineering


Dive into the research topics of 'Establishing a mobile conference call under delay and bandwidth constraints'. Together they form a unique fingerprint.

Cite this