Skip to main content

Hybrid Scheme for Ubiquitous Computing

  • Conference paper
  • First Online:
Computational Science and Its Applications — ICCSA 2003 (ICCSA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2668))

Included in the following conference series:

  • 668 Accesses

Abstract

Limitation of bandwidth, restriction of resources and frequent disconnection are main characteristics of ubiquitous computing environments. To reduce these kinds of problems, a new form of data delivery was proposed in which the server broadcasts data to mobile hosts that listen to the broadcast channel. In this paper, we propose a hybrid concurrency control scheme based on broadcast invalidation report. The scheme achieves high transaction throughput, because it uses of re-ordering and locking. By simulation experiments, we show that our scheme consistently demonstrates excellent performance with low space overhead in all parameter settings.

This Work is Supported by Hanshin University Research Grants in 2003.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Alonso and H. F. Korth, “Database System Issues in Nomadic Computing,” ACM SIGMOD, 1993.

    Google Scholar 

  2. P. K. Chrysanthis, “Transaction Processing in ubiquitous computing Environment,” Proc. of the IEEE Workshop on advances in Parallel and Distributed Systems, pp. 77–78, Princeton, 1993.

    Google Scholar 

  3. E. Pitoura and B. Bhagava, “Revising Transaction Concepts for ubiquitous computing,” Proc. of the IEEE Workshop on Mobile Systems and Applications, 1994.

    Google Scholar 

  4. E. Pitoura and B. Bhagava, “Maintaining Consistency of Data in Mobile Distributed Environments,” Proc. of the 15th International Conference on Distributing Computing System, 1995.

    Google Scholar 

  5. T. Imielinski and B. R. Badrinath, “Mobile Wireless Computing: Challenges in Data Management”, Communications of the ACM, 37(10), pp. 18–28, 1994.

    Article  Google Scholar 

  6. J. Jing, A. Elmagarmid, A. Helal and R. Alonso, “Bit-Sequences: An Adaptive Cache Invalidation Method in Mobile Client/Server Environments”, ACM/Baltzer Mobile Networks and Applications, Vol.2, No.2, 1997.

    Google Scholar 

  7. K. L. Wu, P. S. Yu and M. S. Chen, “Energy-efficient Caching for Wireless ubiquitous computing”, Proc. of the 12th International Conference on Data Engineering, pp. 336–343, 1996.

    Google Scholar 

  8. C. F. Fong, C. S. Lui and M. H. Wong, “Quantifying Complexity and Performance Gains of Distributed Caching in a Wireless Network Environment”, Proc. of the 13th International Conference on Data Engineering, pp. 104–113, 1997.

    Google Scholar 

  9. R. K. Agrawal, M. J. Carey, and M. Livny, “Concurrency Control Performance Modeling: Alternatives and Implications,” ACM Transaction on Database Systems, vol. 12, no. 4, pp. 609–654, 1987.

    Article  Google Scholar 

  10. P. S. Yu and D. M. Dias, “Analysis of Hybrid Concurrency Control Schemes for a High Data Contention Environment,” IEEE Trans. Software Eng., 18(2), PP. 118–129, 1992.

    Article  Google Scholar 

  11. A. Dan, D. F. Towsley, and W. H. Kohler, “Modeling the Effects of Data and Resource Contention on the Performance of Optimistic Concurrency Controls,” Proc. of 4th Int. Conf. Data Eng., Los angeles, CA, 1988.

    Google Scholar 

  12. P. S. Yu, H. Heiss, and D. M. Dias, “Modeling and Analysis of a Time-Stamp History Based Certification Protocol for Concurrency Control”, IEEE Trans. Know. and Data Eng., vol. 3. no. 4, pp. 525–537, 1991.

    Article  Google Scholar 

  13. S. Cho, K. Y. Bae and C. Hwang, “Write Notification for Certification Protocol Based on Time-Stamp History,” Proc of the 9th International Workshop on DEXA, pp. 919–924, 1998.

    Google Scholar 

  14. D. Barbara, “Certification Reports: Supporting Transactions in Wireless Systems,” Proc of the 7th ICDCS, pp. 466–473, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, HK. (2003). Hybrid Scheme for Ubiquitous Computing. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L’Ecuyer, P. (eds) Computational Science and Its Applications — ICCSA 2003. ICCSA 2003. Lecture Notes in Computer Science, vol 2668. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44843-8_53

Download citation

  • DOI: https://doi.org/10.1007/3-540-44843-8_53

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40161-2

  • Online ISBN: 978-3-540-44843-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics