Filters








59,902 Hits in 5.1 sec

Using Separate Processing for Read-Only Transactions in Mobile Environment [chapter]

Eddie Y. M. Chan, Victor C. S. Lee, Kwok-Wa Lam
2002 Lecture Notes in Computer Science  
In this research, we investigate the approach of using separate processing for read-only transactions (ROTs).  ...  Thus, both the update and read-only transactions can be executed in a more efficient manner.  ...  It can be concluded that using separate processing for ROTs is a viable approach to transaction processing in Bdisk environment.  ... 
doi:10.1007/3-540-36389-0_8 fatcat:2pfdppqnd5bprlybiianvl6w7m

Concurrency Control Using Timestamp Ordering in Broadcast Environments

V. C. S. Lee
2002 Computer journal  
The timestamp ordering technique enjoys a number of benefits from the separate processing and flexible adjustment of serialization order by exploiting the semantics of read-only transactions.  ...  The simulation results confirm that the proposed protocol could be an efficient and effective approach to transaction processing in real-time broadcast environments for meeting transaction deadlines.  ...  CityU 1152/01E) and was supported in part by NSF grant EIA-9900895.  ... 
doi:10.1093/comjnl/45.4.410 fatcat:k5774ugzpbdufibxwpltr4xqfu

Evolving a model of transaction management with embedded concurrency control for mobile database systems

Subhash Bhalla
2003 Information and Software Technology  
Transactions within a mobile database management system face many restrictions. These cannot afford unlimited delays or participate in multiple retry attempts for execution.  ...  Adoption of the techniques can be beneficial in general, and for other special cases of transaction management in distributed real-time database management systems.  ...  For example, processing Read-only transactions separately by using older versions of data, eliminate interference.  ... 
doi:10.1016/s0950-5849(03)00045-4 fatcat:x3zu2wiz6rhtre2rtxmpay74yi

Efficient validation of mobile transactions in wireless environments

Victor C.S. Lee, Kwok Wa Lam, Tei-Wei Kuo
2004 Journal of Systems and Software  
Upon completion of execution, read-only mobile transactions can be validated and committed locally and update mobile transactions are sent to the server for final validation.  ...  In this paper, we propose a new variant of the optimistic concurrency control (OCC) protocol that is suitable for broadcast environments.  ...  In view of a large proportion of transactions being read-only transactions in most data dissemination applications, autonomy of the mobile clients to process read-only transactions saves much processing  ... 
doi:10.1016/s0164-1212(03)00084-0 fatcat:mqpblvogtjfffgwqcdruwsmeqm

Efficient Algorithm for Disseminating Consistent Data to Read-Write Mobile Clients

K.Chitra Manikandan
2012 International Journal of Data Mining & Knowledge Management Process  
This paper proposes an index based algorithm for ensuring the consistency of read-write mobile clients.  ...  If the execution of update and broadcast transactions were overlapped, then mobile clients may observe inconsistent data.  ...  In [8] they proposed broadcast disk environment where all updates executed at server, clients access them in a read only fashion.  ... 
doi:10.5121/ijdkp.2012.2403 fatcat:d6yedlxup5bl3bxdkwueegca2y

On transaction processing with partial validation and timestamp ordering in mobile broadcast environments

V.C.S. Lee, Kwok-Wa Lam, S.H. Son, E.Y.M. Chan
2002 IEEE transactions on computers  
In this paper, we design a new protocol for processing both read-only and update mobile transactions.  ...  Previous studies are focused on efficient processing of read-only transactions at the mobile clients, neglecting update transactions.  ...  CityU 1152/01E) and was supported in part by US National Science Foundation EIA-9900895, CCR-0098269, and IIS-0208758.  ... 
doi:10.1109/tc.2002.1039845 fatcat:y3nxrnvjqncd3faiixbedtffxe

Mobile data and transaction management

Sanjay Kumar Madria, Mukesh Mohania, Sourav S. Bhowmick, Bharat Bhargava
2002 Information Sciences  
We discuss interesting research areas, which include mobile location data management, transaction processing and broadcast, cache management and replication and query processing.  ...  We highlight new upcoming research directions in mobile digital library, mobile data warehousing, mobile workflow and mobile web and e-commerce. Ó  ...  Mobile transaction processing A transaction in mobile environment is different than the transactions in the centralized or distributed databases in the following ways. • The mobile transactions might have  ... 
doi:10.1016/s0020-0255(02)00178-0 fatcat:3tgcxd4flfadhbpsgbnydfuu4u

Data Processing System Using CQRS Pattern and NoSQL in V2X Environment

Sangkon Han, Department of Computer Science Engineering, Pusan National University, Busan, Republic of Korea, Jung-In Choi, Software Education Center, Pusan National University, Busan, Republic of Korea
2020 International Journal of Smart Device and Appliance  
In addition, the transaction-based Atomic, Consistency, Isolation, and Durability (ACID) characteristics of relational databases would not be suitable for processing large amounts of data of this nature  ...  We propose a data processing system suitable for the V2X environment using a CQRS pattern and the NoSQL-based database. By applying the CQRS pattern, NoSQL and RDBMS can be used together.  ...  Aggregates handle the necessary data in a read-only store.  ... 
doi:10.21742/ijsda.2020.8.1.01 fatcat:grxx3cj3wjea7emajwbatdptry

Replication Management and Optimistic Replication Challenges in Mobile Environment

Archana Sharma, Vineet Kansal
2011 International Journal of Database Management Systems  
Replication is a fundamental technique for supporting concurrent work practices in mobile environments.  ...  The use of optimistic replication has grown explosively due to the proliferation of the use of the Internet and mobile computing devices, but its systematic study has begun only recently.  ...  REPLICATION IN MOBILE ENVIRONMENT A replication system for mobile use must provide four basic qualities: 1. Support for any-to-any communication 2.  ... 
doi:10.5121/ijdms.2011.3407 fatcat:zvsq2x3xjbclbf42oby75zorwi

A Multi-version Transaction Model to Improve Data Availability in Mobile Computing [chapter]

Sanjay Kumar Madria, Mohammed Baseer, Sourav S. Bhowmick
2002 Lecture Notes in Computer Science  
Each transaction in our model is either in start, committed or terminated state. A transaction can start and commit at mobile host (MH) but terminates only at mobile service station (MSS).  ...  In this paper, we present a multi-version transaction model, which exploits versions to increase availability in a mobile database environment.  ...  Read-Only Transaction In this case MH requests for only read locks on the data items.  ... 
doi:10.1007/3-540-36124-3_19 fatcat:6fobxkqetjfxfczaqyqafw4mbi

Performance Evaluation of Transaction Processing in Mobile Data Base Systems

Ahmad Al-Qerem
2014 International Journal of Database Management Systems  
Specific characteristics of mobile environments make traditional transaction management techniques no longer appropriate.  ...  In this paper we evaluate our execution framework on different mobile computation modes using different execution strategies.  ...  ACKNOWLEDGEMENTS This research is funded by the Deanship of Research and Graduate Studies in Zarqa University /Jordan  ... 
doi:10.5121/ijdms.2014.6202 fatcat:ku53er2v6rg7jadir5qorzzqgu

A Powerful Optimization Approach for the Multi Channel Dissemination Networks

Ahmad Saad Al-Mogren
2010 International Journal of Computer Networks & Communications  
In the wireless environment, dissemination techniques may improve data access for the users.  ...  This architecture is designed to provide efficient data access and power saving for the mobile units. A concurrency control approach, MCD, is suggested for data consistency and conflict checking.  ...  In addition, it is critical to look at the effect of the user movement and the management issues involved to maintain users information.  ... 
doi:10.5121/ijcnc.2010.2210 fatcat:gb6hcmbyyvfz7dfuzd4w7oum7a

Review of Some Transaction Models used in Mobile Databases

Prasanta Kumar Panda, Sujata Swain, P. K. Pattnaik
2011 International Journal of Instrumentation Control and Automation  
Here in the paper, we try to describe various mobile transaction models, focusing on versatile data sharing mechanisms in volatile mobile environments.  ...  Due to mobile systems restrictions such as, for instance, limited memory and narrow bandwidth, it is only natural that researchers expend efforts to soothe such issues.  ...  Isolation only transaction covers read/write conflicts only within the service but it can only take value or importance in write/write conflicts.  ... 
doi:10.47893/ijica.2011.1019 fatcat:vy7c2vwo4jcybk3vaxptzrio3i

Review of Some Transaction Models used in Mobile Databases

Prasanta Kumar Panda, Sujata Swain, P. K. Pattnaik
2013 International journal of computer and communication technology  
Here in the paper, we try to describe various mobile transaction models, focusing on versatile data sharing mechanisms in volatile mobile environments.  ...  Due to mobile systems restrictions such as, for instance, limited memory and narrow bandwidth, it is only natural that researchers expend efforts to soothe such issues.  ...  Isolation only transaction covers read/write conflicts only within the service but it can only take value or importance in write/write conflicts.  ... 
doi:10.47893/ijcct.2013.1166 fatcat:iojj2knscrff7iwtmgoxftgejy

Envelope Transaction Mechanism for A Cluster of Peers

Sushil T. Kulkarni, Mukund A. Sanglikar
2009 International Journal of Interactive Mobile Technologies  
A new approach for mobile transaction processing is presented in a cluster of peers.  ...  A cluster is a dynamic collection of mobile hosts called peers that are clustered around a single mobile host called a centroid to form a temporary work group for processing and exchanging information.  ...  MOBILE TRANSACTION PROCESSING Transactions in mobile environments are used to process data objects with protections.  ... 
doi:10.3991/ijim.v3s2.953 fatcat:ia5rcyqjrjgp7ncexikbxuehpm
« Previous Showing results 1 — 15 out of 59,902 results