Transactional client-server cache consistency: alternatives and performance
ACM Transactions on Database Systems (TODS)
A mobile transaction model that captures both the data and movement behavior
Mobile Networks and Applications
Efficient concurrency control for broadcast environments
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
Update propagation protocols for replicated databates
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Location dependent query processing
Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access
Data mining "to go": ubiquitous KDD for mobile and distributed environments
Tutorial notes of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Disconnection modes for mobile databases
Wireless Networks
Mobile Computing and Databases-A Survey
IEEE Transactions on Knowledge and Data Engineering
Exploiting Data Mining Techniques for Broadcasting Data in Mobile Computing Environments
IEEE Transactions on Knowledge and Data Engineering
Fast Algorithms for Maintaining Replica Consistency in Lazy Master Replicated Databases
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
Transaction Timestamping in (Temporal) Databases
Proceedings of the 27th International Conference on Very Large Data Bases
Extending invalid-access prevention policy protocols for mobile-client data caching
Proceedings of the 2004 ACM symposium on Applied computing
Hi-index | 0.00 |
Data mining usually is considered as application tasks conducted on the top of database management systems. However, this may not always be true. To illustrate this, in this article we examine the issue of conduct data mining in mobile computing environments, where multiple physical copies of the same data object in client caches may exist at the same time with the server as the primary owner of all data objects. By demonstrating what can be mined in such an environment, we point out the important connection of data mining with database implementation. This leads us to take a look at the issue of extending traditional invalid-access prevention policy protocols, which are needed to ensure serializability involving data updates in mobile environments. Furthermore, we provide examples to illustrate how such kind of research can shed light on mobile data mining.