Foundations of logic programming
Foundations of logic programming
The Escrow transactional method
ACM Transactions on Database Systems (TODS)
Semantics based transaction management techniques for replicated data
SIGMOD '88 Proceedings of the 1988 ACM SIGMOD international conference on Management of data
Leases: an efficient fault-tolerant mechanism for distributed file cache consistency
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
IP-based protocols for mobile internetworking
SIGCOMM '91 Proceedings of the conference on Communications architecture & protocols
Disconnected operation in the Coda File System
ACM Transactions on Computer Systems (TOCS)
WebExpress: a client/intercept based system for optimizing Web browsing in a wireless environment
Mobile Networks and Applications - Special issue: mobile networking in the Internet
Transaction processing in PRO-MOTION
Proceedings of the 1999 ACM symposium on Applied computing
Caching constrained mobile data
Proceedings of the tenth international conference on Information and knowledge management
Data Management for Mobile Computing
Data Management for Mobile Computing
EDBT '92 Proceedings of the 3rd International Conference on Extending Database Technology: Advances in Database Technology
High Throughput Escrow Algorithms for Replicated Databases
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
Optimizing Distributed Integrity Constraints
Proceedings of the 3rd International Conference on Database Systems for Advanced Applications (DASFAA)
A taxonomy of correctness criteria in database applications
The VLDB Journal — The International Journal on Very Large Data Bases
Achieving Consistency in Mobile Databases through Localization in PRO-MOTION
DEXA '99 Proceedings of the 10th International Workshop on Database & Expert Systems Applications
Checking the Integrity Constraints of Mobile Databases with Three-Level Model
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
Data caching strategies for checking integrity constraints of mobile database
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Analyzing Integrity Tests for Data Caching in Mobile Databases
ICDCIT '08 Proceedings of the 5th International Conference on Distributed Computing and Internet Technology
Decomposing constraint systems: equivalences and computational properties
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Hi-index | 0.00 |
The well-developed traditional data management techniques need to be augmented with new approaches in order to continue to be effective in the mobile environment. In this paper, we focus on the challenge of maintaining integrity constraints in the presence of disconnections and expensive communication. Our approach of localization is to reformulate global constraints so as to enhance the autonomy of the mobile hosts in processing transactions. We show how this approach unifies techniques of maintaining replicated data with methods of enforcing polynomial inequalities. We also discuss how localization can be realized in PRO-MOTION, a flexible infrastructure for transaction processing in a mobile environment.