Sciweavers

239 search results - page 24 / 48
» An Integrated Commit Protocol for Mobile Network Databases
Sort
View
DEXAW
2000
IEEE
160views Database» more  DEXAW 2000»
14 years 1 days ago
An Adaptive AVI-Based Cache Invalidation Scheme for Mobile Computing Systems
In a mobile computing system, caching data items at the mobile clients is important to reduce the data access delay in a unreliable and low bandwidth mobile network. However, effi...
Joe Chun-Hung Yuen, Edward Chan, Kam-yiu Lam, Hei-...
DASFAA
2007
IEEE
191views Database» more  DASFAA 2007»
13 years 11 months ago
ABIDE: A Bid-Based Economic Incentive Model for Enticing Non-cooperative Peers in Mobile-P2P Networks
In mobile ad-hoc peer-to-peer (M-P2P) networks, a large percentage of the mobile peers typically do not provide any service to the network, thereby motivating incentive schemes for...
Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsur...
FTDCS
2003
IEEE
14 years 27 days ago
Autonomous Transaction Processing Using Data Dependency in Mobile Environments
Mobile clients retrieve and update databases at servers. They use transactions in order to ensure the consistency of shared data in the presence of concurrent accesses. Transactio...
IlYoung Chung, Bharat K. Bhargava, Malika Mahoui, ...
ICOIN
2001
Springer
14 years 2 days ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
PERCOM
2009
ACM
14 years 8 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi