Mobile wireless computing: challenges in data management

@article{Imielinski1994MobileWC,
  title={Mobile wireless computing: challenges in data management},
  author={T. Imielinski and B. R. Badrinath},
  journal={Commun. ACM},
  year={1994},
  volume={37},
  pages={18-28}
}

Figures from this paper

Exponential replicate broadcasting mechanism for adaptive bandwidth allocation in mobile networks
TLDR
An analytical model is developed to derive the mean access latency of the generated broadcast program and it can be seen that the proposed mechanism is feasible in practice and can be optimally allocated to maximize bandwidth utilization. Expand
A Tunable Checkpointing Algorithm for the Distributed Mobile Environment
TLDR
To reduce usage of wireless communications, the checkpointing algorithm allows the distributed mobile application to tune the level of its checkpointing strictness, and the amount of data transited on wirelesses networks becomes much smaller than in earlier methods. Expand
Summarisation for Mobile Databases
TLDR
This paper surveys summarisation techniques used for mobile distributed databases, and surveys the manner in which database functionality is maintained in mobile database systems, including query processing, data replication, concurrency control, transaction support and system recovery. Expand
Semantic Data Broadcast for a Mobile Environment Based on Dynamic and Adaptive Chunking
TLDR
The data affinity index metric is introduced, which more accurately reflects client-perceived performance, and is investigated different ways of organizing the data chunks over a broadcast channel to improve access performance. Expand
Specification of mobile transparency
TLDR
This work starts from the observation that there is a broad range of factors to manage to make an effective and scalable transparent mobile adaptation and classify objects in categories that reflect somewhat the characteristics of their environment. Expand
E cient Location Management in Mobile Wireless Networks
The existing wireless cellular networks are likely to be upgraded for personal communication services (PCS). Studies indicate that the anticipated signalling load due to the location managementExpand
Adaptive Broadcasting Mechanism for Bandwidth Allocation in Mobile Services
TLDR
An analytical model is developed to derive the mean access latency of the generated broadcast program and it can be seen that the proposed mechanism is feasible in practice and can be optimally allocated to maximize bandwidth utilization. Expand
CONTINUOUS ACCESS OF BROADCAST DATA USING ARTIFICIAL POINTERS IN WIRELESS MOBILE COMPUTING
In a ubiquitous information environment, massive number of users carrying their portable computers can retrieve information anywhere and anytime using wireless mobile computing technologies. WirelessExpand
A Real Time Optimistic Strategy to achieve Concurrency Control in Mobile Environments Using On-demand Multicasting
TLDR
An optimistic concurrency control strategy using on-demand multicasting is proposed for mobile database environments which guarantees consistency and introduces application-specific conflict detection and resolution strategies. Expand
A New Distiributed Checkpointing Scheme for the Mobile Computing Environment
  • Sungchae Lim
  • Computer Science
  • 2009 IEEE-RIVF International Conference on Computing and Communication Technologies
  • 2009
TLDR
This paper proposes two key ideas of a checkpoint-related software agent, called checkpointing agent (CA), and a flexible checkpointing protocol, which is used to make consistent global checkpoints on behalf of application processes. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 20 REFERENCES
Power Efficient Filtering of Data an Air
TLDR
It is demonstrated that providing index or hashing based access to the data transmitted over wireless is very important for extending battery life and can result in very significant improvement in battery utilization. Expand
Sleepers and workaholics: caching strategies in mobile environments
TLDR
A taxonomy of different cache invalidation strategies is proposed and it is determined that for the units which are often disconnected (sleepers) the best cache invalidations strategy is based on signatures previously used for efficient file comparison, and for units which is connected most of the time (workaholics), the best Cache invalidation strategy isbased on the periodic broadcast of changed data items. Expand
Database system issues in nomadic computing
TLDR
The impact of nomadic computing on a number of traditional database system concepts is discussed, including how the reliance on short-lived batteries changes the cost assumptions underlying query processing and how the likelihood of temporary disconnection forces consideration of alternative transaction processing protocols. Expand
Delivering multicast messages in networks with mobile hosts
  • A. Acharya, B. R. Badrinath
  • Computer Science
  • [1993] Proceedings. The 13th International Conference on Distributed Computing Systems
  • 1993
TLDR
The authors present a protocol for delivering a multicast message exactly once to a group of mobile destinations, based on a system model derived from an architecture developed by J. Ioannidis et al. (1991), for mobile internetworking. Expand
Evaluating caching schemes for the X.500 directory
  • J. Bolot, H. Afifi
  • Computer Science
  • [1993] Proceedings. The 13th International Conference on Distributed Computing Systems
  • 1993
TLDR
It was found that a locality of reference property holds in name resolution requests, and hence name caching does increase performance significantly, and also that partitioning the cache buffer into a small number of independent caches, each one associated with a different kind of name request, further decreases the average name resolution time. Expand
Tapes hold data, too: challenges of tuples on tertiary store
TLDR
A large number of commercial enterprises keep a record of every customer transaction they have ever performed, typically in some DBMS, yet the total volume of data is still small compared to the value of the business. Expand
The Design and Implementation of a Mobile Internetworking Architecture
TLDR
The design, implementation, and evaluation of Mobile*IP, a set of IP-based protocols and mechanisms to support host mobility throughout the Internet, are presented and the code is readily portable to any version of Unix that uses Berkeley networking code. Expand
Transparent mistrust: OS support for cryptography-in-the-large
  • M. Blaze
  • Computer Science
  • Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III
  • 1993
TLDR
This position paper advocates the development of new mechanisms to support cooperative computing requiring less than complete trust, and believes that cryptographic protection can be quite practical across a variety of layers of the system. Expand
UNIX For Nomads: Making UNIX Support Mobile Computing
Traditionally, the Unix operating system has been associated with deskbound machines tethered to the wall by a power cord and an Ethernet cable. Making Unix support a more nomadic model of computingExpand
Continuous queries over append-only databases
TLDR
The techniques used in Tapestry are described, which do not depend on triggers and thus be implemented on any commercial database that supports SQL and are applicable to any append-only database. Expand
...
1
2
...