Sleepers and workaholics: caching strategies in mobile environments
SIGMOD '94 Proceedings of the 1994 ACM SIGMOD international conference on Management of data
Bit-sequences: an adaptive cache invalidation method in mobile client/server environments
Mobile Networks and Applications
Modeling and evaluation of prefetching policies for context-aware information services
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Energy-Efficient Caching for Wireless Mobile Computing
ICDE '96 Proceedings of the Twelfth International Conference on Data Engineering
Cache Management for Mobile Databases: Design and Evaluation
ICDE '98 Proceedings of the Fourteenth International Conference on Data Engineering
Location Dependent Data and its Management in Mobile Databases
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Semantic Caching in Location-Dependent Query Processing
SSTD '01 Proceedings of the 7th International Symposium on Advances in Spatial and Temporal Databases
Cache Updates in a Peer-to-Peer Network of Mobile Agents
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Location-based caching scheme for mobile clients
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Hi-index | 0.00 |
Caching frequently accessed data at the client is an attractive technique for improving access time. In a mobile computing environment, client location becomes a piece of changing information. As such, location-dependent data may become obsolete due to data updates or client movements. Most of the previous work investigated cache invalidation issues related to data updates only, whereas few considered data inconsistency caused by client movements. This paper separates location-dependent data invalidation from traditional cache invalidation. For location-dependent invalidation, several approaches are proposed and their performance is studied by a set of simulation experiments. The results show that the proposed methods substantially outperform the NSI scheme which drops the cache contents entirely when hand-off.