136 Hits in 5.8 sec

An Efficient Handoff Strategy for Mobile Computing Checkpoint System [chapter]

Chaoguang Men, Zhenpeng Xu, Dongsheng Wang
Embedded and Ubiquitous Computing  
The Eager, Lazy and Movement-based strategies are used in mobile computing system when handoff.  ...  They result in performance loss while moving the whole checkpoint on fault-free or slow recovery while not moving any checkpoint until recovery. In the paper, a compromise strategy is proposed.  ...  The paper is organized as follows: Section 2 introduces the system model and definitions. Section 3 presents a checkpoint and recovery strategy with an efficient handoff scheme for mobile computing.  ... 
doi:10.1007/978-3-540-77092-3_36 dblp:conf/euc/MenXW07 fatcat:4qvv73t3fzby5ltnxrzfhtkm2q

Access-Pattern Aware Checkpointing Data Storage Scheme for Mobile Computing Environment

Xiang Li, Mei Yang, ChaoGuang Men, YingTao Jiang, Kalum Udagepola
2014 Procedia Computer Science  
Checkpoint and rollback recovery technology, as a fault tolerance method for continuing services in mobile computing environment, is researched in this paper.  ...  Characteristics of the mobile computing system, such as the space limitation, mobility handling, low bandwidth and limited battery life, make mobile computing applications more prone to failures.  ...  Acknowledgements The work is fully supported by National Natural Science Foundation of China (No.61100004), and Fundamental Research Funds for the Central Universities (HEUCF100607).  ... 
doi:10.1016/j.procs.2014.07.032 fatcat:owrh5oiovfdm7ewjm5qhqb226q

Database Recovery Technique for Mobile Computing: A Game Theory Approach

Magda M. Madbouly, Yasser F. Mokhtar, Saad M. Darwish
2022 Computers Materials & Continua  
Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS).  ...  Then, using the suggested payout matrix, the game theory strategy is adapted to choose the optimum recovery technique for the specified environmental variables.  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2022.019440 fatcat:57sxl6hlmjc5hal4kfbvcbo4ky

Movement-based checkpointing and logging for recovery in mobile computing systems

Sapna E. George, Ing-Ray Chen, Ying Jin
2006 Proceedings of the 5th ACM international workshop on Data engineering for wireless and mobile access - MobiDE '06  
In this paper, we present an efficient failure recovery scheme for mobile applications based on movement-based checkpointing and logging.  ...  Our movementbased checkpointing scheme takes a checkpoint only after a threshold of mobility handoffs has been exceeded.  ...  SUMMARY AND APPLICABILITY In this paper we have presented an efficient failure recovery scheme for mobile computing systems based on movement-based checkpointing and logging.  ... 
doi:10.1145/1140104.1140115 dblp:conf/mobide/GeorgeCJ06 fatcat:qaq7hoxbzvbsxjln7rq3yaqguy

Movement-based checkpointing and logging for failure recovery of database applications in mobile environments

Sapna E. George, Ing-Ray Chen
2008 Distributed and parallel databases  
In this paper, we present an efficient failure recovery scheme for mobile database applications based on movement-based checkpointing and logging.  ...  Our movement-based checkpointing scheme takes a checkpoint only after a threshold of mobility handoffs has been exceeded.  ...  Summary and applicability In this paper we have presented an efficient failure recovery scheme for mobile computing systems based on movement-based checkpointing and logging.  ... 
doi:10.1007/s10619-008-7026-3 fatcat:i3vhst454fhvvhh5wc4ye63ajq

Quantum Game Application to Recovery Problem in Mobile Database

Magda M. Madbouly, Yasser F. Mokhtar, Saad M. Darwish
2021 Symmetry  
The purpose of this study is to present an adaptive algorithm based on quantum game theory for selecting the most efficient context-aware computing recovery procedure.  ...  Due to the dynamic nature of mobility and the limited bandwidth available on wireless networks, this new computing environment for mobile devices presents significant challenges in terms of fault-tolerant  ...  The authors in [25] prepared a proposal for a contemporary checkpointing method that is suitable for mobile computing systems.  ... 
doi:10.3390/sym13111984 doaj:74c26df61db941a0bfcebbf269a5c8f3 fatcat:qjpdpgwmo5g2pnuybaisjzx5nq

A Survey on Data and Transaction Management in Mobile Databases

D Roselin Selvarani
2012 International Journal of Database Management Systems  
This leads to many interesting problems in mobile database research and Mobile Database has become a fertile land for many researchers.  ...  It also addresses the data management issues namely Replication and Caching strategies and the transaction management functionalities such as Concurrency Control and Commit protocols, Synchronization,  ...  George et al. present an efficient failure recovery scheme for mobile database applications based on movement-based checkpointing and logging.  ... 
doi:10.5121/ijdms.2012.4501 fatcat:hz6dj72yrzev3cvfdqkphlmmci

Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts

Priyanka Dey
2012 International journal of network security and its applications  
An efficient fault tolerant algorithm based on movement-based secure checkpointing and logging for mobile computing system is proposed here.  ...  This algorithm describes a secure checkpointing technique as a method for providing fault tolerance while preventing information leakage through the checkpoint data.  ...  In light of the above constraint, this paper presents a movement-based checkpointing strategy combined with logging for recovery of individual hosts in mobile computing environments.  ... 
doi:10.5121/ijnsa.2012.4503 fatcat:xzdtosplbffz3auo7x44tcll6e

Analysis of Recent Checkpointing Techniques for Mobile Computing Systems [article]

Ruchi Tuli, Parveen Kumar
2011 arXiv   pre-print
This paper surveys the algorithms which have been reported in the literature for checkpointing in Mobile Computing Systems.  ...  Checkpointing is a process of saving status information. Mobile computing systems often suffer from high failure rates that are transient and independent in nature.  ...  Bidyut -Rahimi-Liu [27] presented their work for mobile computing systems. In that work they presented a single phase non-blocking coordinated checkpointing suitable for mobile systems.  ... 
arXiv:1108.6195v1 fatcat:y7gc76fjnrclhmz5thdrmabbv4

Transaction Processing, Techniques In Mobile Database: An Overview

Adil Mobarek, Siddig Abdelrhman, Areege Abdel-Mutal, Sara Adam, Nawal Elbadri, Tarig Mohammed Ahmed
2015 International Journal on Computational Science & Applications  
of mobile environment, transaction is the center component in database systems, In this paper we present useful work done in mobile transaction, we show the mobile database environment and overview a  ...  The advancement in mobile technology and wireless network increase the using of mobile device in database driven application, these application require high reliability and availability due to nature inheritance  ...  In an optimistic strategy, whenever multiple sites request for same data items, they are allowed to read the data item thus tolerating conflicts to occur.  ... 
doi:10.5121/ijcsa.2015.5101 fatcat:xzwqrpsguvhvbbxfkrhsx7kuwy

Using Adaptive Agents for the Fault-Tolerant Mobile Computing System [chapter]

Taesoon Park, Jaehwan Youn, Dongryung Kim
2006 Lecture Notes in Computer Science  
This paper presents a fault-tolerance scheme based on mobile agents for the reliable mobile computing systems.  ...  The mobility of the agent is suitable to trace the mobile hosts in the system and the intelligence of the agent makes it efficient to support the fault-tolerance services.  ...  Background Mobile Computing System A mobile host (MH) is an entity which executes the computation and communicates with another MH while traversing the system.  ... 
doi:10.1007/11758532_105 fatcat:qjrnhcl36zfkjpiu7vqdklaoh4

Multitier Service Migration Framework Based on Mobility Prediction in Mobile Edge Computing

Run Yang, Hui He, Weizhe Zhang
2021 Wireless Communications and Mobile Computing  
Mobile edge computing (MEC) pushes computing resources to the edge of the network and distributes them at the edge of the mobile network.  ...  Experimental results show that our online prediction methods perform better than the common strategy. Our system reduces network traffic by 65% while meeting task delay requirements.  ...  [18] proposed an efficient migration method for sharing storage files based on the hierarchical nature of the container file system.  ... 
doi:10.1155/2021/6638730 doaj:b7d765515b29425cbf54cc886dce4afa fatcat:xgszwhk245ctxep5pqnxcfzl64

Vertical Handoff and Admission Control Strategy in 4G Wireless Network Using Centrality Graph Theory

A. Ferdinand Christopher, M.K. Jeyakumar
2014 Research Journal of Applied Sciences Engineering and Technology  
These algorithms need to be practical and true to a wide range of applications hence utilization of an application layer parameter is important to decide the handoff and admission control.  ...  Vertical Handoff (VHO) is a crucial mechanism for the architecture of the Fourth Generation (4G) Heterogeneous Wireless Networks (HWN), because the users of 4G-HWN are capable of switching to any network  ...  Furthermore, an efficient checkpoint based recovery scheme was presented to recover the lost data when handoff is executed.  ... 
doi:10.19026/rjaset.7.863 fatcat:zbkpiapphbepllr23j5x7ujiw4

Recovery in the mobile wireless environment using mobile agents

S. Gadiraju, V. Kumar
2004 IEEE Transactions on Mobile Computing  
Application recovery in Mobile Database Systems (MDS) is more complex because of an unlimited geographical mobility of mobile units.  ...  This paper presents an application log management scheme, which uses a mobile-agent-based framework to facilitate seamless logging of application activities for recovery from transaction or system failure  ...  Motivated by such growing demand, we envision an information processing system based on PCS or GSM architecture, which we refer to as the Mobile Database System (MDS).  ... 
doi:10.1109/tmc.2004.13 fatcat:yalgssk4mvgvzeh3pmhns7hzja

Reliability Analysis for Various Communication Schemes in Wireless CORBA

X. Chen, M.R. Lyu
2005 IEEE Transactions on Reliability  
Wireless network systems, such as wireless CORBA, inherit the unique handoff characteristic which leads to different communication structures with various components & links.  ...  After all, our investigation provides an initial yet overall approach to measure the reliability of wireless networks.  ...  Then he designed an efficient method to compensate for unreliable nodes in network-reliability computation, whose cost increases linearly with the number of links.  ... 
doi:10.1109/tr.2005.847268 fatcat:v5r2j3blsvhsbbakntcetkeiom
« Previous Showing results 1 — 15 out of 136 results