Filters








3,226 Hits in 5.8 sec

On transaction processing with partial validation and timestamp ordering in mobile broadcast environments

V.C.S. Lee, Kwok-Wa Lam, S.H. Son, E.Y.M. Chan
2002 IEEE transactions on computers  
The protocol can detect data conflicts at an early stage at the mobile clients and resolve data conflicts flexibly using dynamic adjustment of timestamp ordering.  ...  Conventional concurrency control protocols are inapplicable in mobile broadcast environments due to a number of constraints of wireless communications.  ...  CityU 1152/01E) and was supported in part by US National Science Foundation EIA-9900895, CCR-0098269, and IIS-0208758.  ... 
doi:10.1109/tc.2002.1039845 fatcat:y3nxrnvjqncd3faiixbedtffxe

Concurrency Control Using Timestamp Ordering in Broadcast Environments

V. C. S. Lee
2002 Computer journal  
In the near future, tens of millions of users will have access to distributed information systems through the wireless interface in their mobile computers.  ...  To reduce the number of unnecessary transaction restarts such that the timeliness of mobile transactions can be enhanced, we propose another protocol based on timestamp ordering that can show significant  ...  CityU 1152/01E) and was supported in part by NSF grant EIA-9900895.  ... 
doi:10.1093/comjnl/45.4.410 fatcat:k5774ugzpbdufibxwpltr4xqfu

Multiversion reconciliation for mobile databases

S.H. Phatak, B.R. Badrinath
1999 Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337)  
As mobile computing devices become more and more popular, mobile databases have started gaining popularity.  ...  An important feature of these database systems is their ability to allow optimistic replication of data by permitting disconnected mobile devices to perform local updates on replicated data.  ...  A key concept in our algorithm is that conflict resolution and detection are decoupled. The responsibility for detecting conflicts lies with the server.  ... 
doi:10.1109/icde.1999.754974 dblp:conf/icde/PhatakB99 fatcat:h7hs5mn2qzghzefr4bjercy4tm

A Mobile Positioning Method Based on Deep Learning Techniques

Ling Wu, Chi-Hua Chen, Qishan Zhang
2019 Electronics  
In practical experimental environments, there are 4525 records, 59 different base stations, and 582 different Wi-Fi access points detected in Fuzhou University in China.  ...  that the average error of location estimation was 9.19 m by the proposed mobile positioning method with two timestamps.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics8010059 fatcat:fhsjqjaxorhytgxs44c4jkan6i

Transaction-Centric Reconciliation in Disconnected Client–Server Databases

Shirish Hemant Phatak, Badri Nath
2004 Journal on spesial topics in mobile networks and applications  
As mobile computing devices become more and more common, mobile databases are becoming popular.  ...  An important feature of these database systems is their ability to allow optimistic replication of data by providing disconnected mobile devices the ability to perform local updates.  ...  The snapshots are computed by considering each timestamp that could be applied to the client transaction in increasing order.  ... 
doi:10.1023/b:mone.0000034700.03069.48 fatcat:2jabbb3zpfddrdy6ur4yaxzvpu

Broadcasting Group Information to Ensure Consistency and Correctness in Mobile Computing Environments [chapter]

Daein Kim, Buhyun Hwang
2006 Lecture Notes in Computer Science  
In this environments, a mobile host have a cache to avoid the bandwidth usage and improve the response time of transactions.  ...  Recent advances in wireless communication technology and popularity of portable computers have rendered the mobile computing environments that users access the information via wireless channel, regardless  ...  Window Report W R(B i ), W R(B i ) = {[j, T S(j)] |j ∈ D, and B i − W < T S(j) < B i } D is a set of data items in the database, j is an identifier of data item that has been updated in the server during  ... 
doi:10.1007/11802167_58 fatcat:txpqwv63bvhe3blzdapfoqr5l4

Supporting transactional cache consistency in mobile database systems

SangKeun Lee, Chong-Sun Hwang, HeongChang Yu
1999 Proceedings of the 1st ACM international workshop on Data engineering for wireless and mobile access - MobiDe '99  
In this paper, we propose a new protocol, called OCC-UTS (Optimisitic Concurrency Control with Update TimeStamp), to support transactional cache consistency in a wireless mobile computing environment by  ...  In a mobile computing environment, caching of frequently accessed data has been shown to be a useful technique for reducing contention on the narrow bandwidth of the wireless channels.  ...  Acknowledgements Special thanks go to the reviewers who have provided helpful comments of drafts of this paper.  ... 
doi:10.1145/313300.313322 dblp:conf/mobide/LeeHY99 fatcat:fb2skm7w7rartmdpm7tutqvzh4

Causality and the Spatial–Temporal Ordering in Mobile Systems

Ravi Prakash, Roberto Baldoni
2004 Journal on spesial topics in mobile networks and applications  
The error in the estimates of a mobile node, due to clock drift, about the region in which other mobile nodes may be present is formulated.  ...  Several mobile computing applications require that both the order and location of occurrence of events be taken into account during decision making.  ...  In several scenarios, a mobile computing system can be considered to be a distributed computing system with the additional notion of node mobility.  ... 
doi:10.1023/b:mone.0000034704.13096.22 fatcat:ldwb2biim5cdbcb7olbkhb6wjy

Core-Based Dynamic Community Detection in Mobile Social Networks

Hao Xu, Yanli Hu, Zhenwen Wang, Jianwei Ma, Weidong Xiao
2013 Entropy  
The problem of detecting the stable community in mobile social networks has been studied in this paper. Community cores are considered as stable subsets of the network in previous work.  ...  Based on these observations, this paper divides all nodes into a few of communities due to the community cores. Meanwhile, communities can be tracked through incremental computing.  ...  Acknowledgments This project is being jointly supported in part by the National Natural Science Foundation of China under Grant Nos. 61302144 and 61303062.  ... 
doi:10.3390/e15125419 fatcat:kzg4sbga2jbshe6qbrctmzylse

Efficient Local Path Planning Algorithm Using Artificial Potential Field Supported by Augmented Reality

Rafal Szczepanski, Artur Bereit, Tomasz Tarczewski
2021 Energies  
Mobile robots in industry are commonly used in warehouses and factories.  ...  This method was experimentally verified using a Husarion ROSbot 2.0 PRO mobile robot and Robot Operating System in a laboratory environment.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/en14206642 fatcat:gt65xutmyzbb3lm5hn54vzkq5y

Using reordering technique for mobile transaction management in broadcast environments

SungSuk Kim, SangKeun Lee, Chong-Sun Hwang
2003 Data & Knowledge Engineering  
As computer hardware and wireless network technologies are developed to a high degree, there are many research efforts which intend to utilize data broadcasting to a large population of mobile clients  ...  When any kind of conflicts is found, the conflict order is determined according to the notion of reordering and the remaining operations are executed to hold the decision.  ...  Let us assume that r-w or w-w conflicts between T m and T si (i P 1) have occurred after a mobile computer received BC j .Cont. If w-r conflicts are found, T m is aborted.  ... 
doi:10.1016/s0169-023x(02)00155-6 fatcat:aewmadfbaffg3o6bp3z2yei75e

Using distributed consistent branching for efficient reconciliation of mobile workspaces

Felix Hupfeld, Minor Gordon
2006 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Optimistic replication allows mobile workspaces to remain accessible during interrupted network access, but require consecutive handling of any conflicts.  ...  When conflict handling requires manual intervention by the user, the system must not require that conflicts are resolved immediatley after their detection.  ...  ACKNOWLEDGEMENT This work was supported in part by the EU IST program in context of the XtreemOS project (contract FP6-033576).  ... 
doi:10.1109/colcom.2006.361837 dblp:conf/colcom/HupfeldG06a fatcat:4ejcvkli2vfynbnp6tv3wm2r44

Using distributed consistent branching for efficient reconciliation of mobile workspaces

Felix Hupfeld, Minor Gordon
2006 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Optimistic replication allows mobile workspaces to remain accessible during interrupted network access, but require consecutive handling of any conflicts.  ...  When conflict handling requires manual intervention by the user, the system must not require that conflicts are resolved immediatley after their detection.  ...  ACKNOWLEDGEMENT This work was supported in part by the EU IST program in context of the XtreemOS project (contract FP6-033576).  ... 
doi:10.1109/colcom.2006.361860 dblp:conf/colcom/HupfeldG06 fatcat:k3knnrdtlbfnng62w7f47ctsl4

Defending against wormhole attacks in mobile ad hoc networks

Weichao Wang, Bharat Bhargava, Yi Lu, Xiaoxin Wu
2006 Wireless Communications and Mobile Computing  
In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbor relations among mobile nodes.  ...  The mechanism uses geographic information to detect anomalies in neighbor relations and node movements.  ...  Acknowledgement The authors would like to thank the editor and the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1002/wcm.292 fatcat:whpko6g6yngzhkcarhat364ozi

HomeGuardian: Detecting Anomaly Events in Smart Home Systems

Xuan Dai, Jian Mao, Jiawei Li, Qixiao Lin, Jianwei Liu, Yan Huang
2022 Wireless Communications and Mobile Computing  
Attack vectors to smart homes inevitably manifest in abnormal event contexts. In this paper, we propose HomeGuardian, a context-based approach to identify abnormal events in smart homes.  ...  In our approach, we extract temporal context and environmental context from system logs, aggregate (embed) these hybrid contexts, and construct a learning-based classifier to identify the abnormal events  ...  Wireless Communications and Mobile Computing The framework of the anomaly detection system Home-Guardian is shown in Figure 2 .  ... 
doi:10.1155/2022/8022033 fatcat:iulgzyplprh3rj4jbapkw3re7m
« Previous Showing results 1 — 15 out of 3,226 results