scispace - formally typeset
Journal ArticleDOI

Mobile wireless computing: challenges in data management

Tomasz Imielinski, +1 more
- 01 Oct 1994 - 
- Vol. 37, Iss: 10, pp 18-28
About
This article is published in Communications of The ACM.The article was published on 1994-10-01. It has received 622 citations till now. The article focuses on the topics: Mobile computing & Mobile database.

read more

Citations
More filters
Journal ArticleDOI

Understanding code mobility

TL;DR: A conceptual framework for understanding code mobility is presented, centered around a classification that introduces three dimensions: technologies, design paradigms, and applications that support the developer in the identification of the classes of applications that can leverage off of mobile code, in the design of these applications, and in the selection of the most appropriate implementation technologies.
Proceedings ArticleDOI

Managing update conflicts in Bayou, a weakly connected replicated storage system

TL;DR: Bayou as discussed by the authors is a replicated, weakly consistent storage system designed for a mobile computing environment that includes portable machines with less than ideal network connectivity, and it includes novel methods for conflict detection, called dependency checks, and per-write conflict resolution based on client-provid ed merge procedures.
Proceedings ArticleDOI

Broadcast disks: data management for asymmetric communication environments

TL;DR: This work describes a new technique called "Broadcast Disks" for structuring the broadcast in a way that provides improved performance for non-uniformly accessed data and examines several "pure" cache management policies and develops and measure implementable approximations to these policies.

Broadcast Disks: Data Management for Asymmetric Communication Environments.

TL;DR: In this paper, the use of repetitive broadcast as a way of augmenting the memory hierarchy of clients in an asymmetric communication environment has been proposed, and a new technique called "broadcast disks" for structuring the broadcast in a way that provides improved performance for non-uniformly accessed data.
Journal ArticleDOI

IEEE 802.11 protocol: design and performance evaluation of an adaptive backoff mechanism

TL;DR: Analytically study the performance of the IEEE 802.11 protocol with a dynamically tuned backoff based on the estimation of the network status and results indicate that the capacity of the enhanced protocol approaches the theoretical limits in all the configurations analyzed.
References
More filters
Journal ArticleDOI

Disconnected operation in the Coda File System

TL;DR: This paper shows that disconnected operation is feasible, efficient and usable by describing its design and implementation in the Coda File System by showing that caching of data, now widely used for performance, can also be exploited to improve availability.
Book

Mobile cellular telecommunications systems

TL;DR: Baca tentang semua perkembangan terakhir di bidang teknologi seluler yang berubah dengan cepat di edisi baru referensi klasik ini as mentioned in this paper.
Proceedings ArticleDOI

Continuous queries over append-only databases

TL;DR: The techniques used in Tapestry are described, which do not depend on triggers and thus be implemented on any commercial database that supports SQL and are applicable to any append-only database.
Proceedings Article

Sleepers and Workaholics: Caching Strategies in Mobile Environments

TL;DR: In this paper, a taxonomy of different cache invalidation strategies and study the impact of client's disconnection times on their performance is presented, and the authors determine that for the units which are often disconnected (sleepers) the best cache invalidization strategy is based on signatures previously used for efficient file comparison.
Proceedings ArticleDOI

Sleepers and workaholics: caching strategies in mobile environments

TL;DR: A taxonomy of different cache invalidation strategies is proposed and it is determined that for the units which are often disconnected (sleepers) the best cache invalidations strategy is based on signatures previously used for efficient file comparison, and for units which is connected most of the time (workaholics), the best Cache invalidation strategy isbased on the periodic broadcast of changed data items.
Related Papers (5)