The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Caching is the key technology for Mobile Database. In the mobile computing environment, how to guarantee the data in local cache is consistent with the primary copy on the server is the chief consideration in this paper. An improved cache invalidation schema based on Mobile Agent is designed. The proposed schema uses asynchronous invalidation method and the Control Message broadcasted by MSS periodically...
The development of database, the increasing use of this kind of data, the widespread use of mobiles and the possibility of connection to Internet and other networks, resulted in many discussions in the field of transactions management on the database. In this paper, the writer try to manage the changes in the existent data in tables for transactions management, first by adding a new table to database...
This paper proposes an agent-based data access mechanism of mobile device. In the mechanism, mobile device use agents to manage local database and connect to remote agent. Remote agent receives data and query remote database. The local database is designed using partial detailed concept. The partial detailed database can store different details of content for query to avoid unnecessary connection...
In mobile environments data from a client database often has to be integrated into a server database during a synchronization process. Thereby unique constraint violations are possible if the client has older data or only part of the data available offline. When inserting data into the server database in an online scenario, a unique constraint violation can be recognized and corrected immediately...
The project deal with architecture design, system development and testing of software framework for data management and scheduling of personal sources in home care agencies. Development is started from analyses, over proposal, implementation to resulting testing of application, thereby try cast over whole problems software engineering. System consists of the three main parts PC application, mobile...
A variety of research exists for the processing of continuous queries in large, mobile environments. Each method tries, in its own way, to address the computational bottleneck of constantly processing so many queries. In this paper, we introduce an efficient and scalable system for monitoring continuous queries by leveraging the parallel processing capability of the graphics processing unit. We examine...
In this paper, a rapid resynchronization method using intent logs is suggested for replication in-memory databases supporting mobile communication applications. Both the identifiers of unsynchronized segments and the identifiers of the slaves who have missed the updates in the segments are recorded in the intent logs. When receiving a resynchronization request from a slave, the master will scan the...
The advances in mobile devices and wireless networking technologies enable users to access information from anywhere and at anytime. In a mobile computing environment, mobile users often search for information with certain location restrictions; such searches are referred to as location aware queries (LAQs). Typically, the query is submitted to a proxy server, which may or may not have the desired...
Due to the frequent information exchange, electronic mail system is not only a mail exchange platform but also becomes an information center. Users usually save their mails permanently in mailboxes and retrieve them as need. In the database strategy, each mail is separated into several components and stored in the database individually. Whenever a user queries a specific mail, the mail server retrieves...
Data management in mobile computing environments poses great challenges to the database researchers. One of the important challenges is to provide a data replication solution that maintains the consistency and improves the availability of replicated data. This paper addresses this problem for large scale distributed information systems that operate in mobile environments. Our solution represents a...
The research project aims at designing and implementing a Web based wireless mobile system security and privacy framework that is centered on the concepts of ubiquitous healthcare services provided to the patients in rural or remote areas from distant hospitals. With this system framework, a physician can securely access and carry the patient information from a mobile device, update the patient information...
This paper investigates embedded databases for the MicroBaseJ project. The project aims at the development of an integrated database and a user interface for a typical 3G mobile phone with Java MIDP2 capability. This includes methods for data acquisition, mobile data and information communication, data management, and remote user interface. One of the key objectives is to target a generic solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.