Advertisement

Mobile Networks and Applications

, Volume 5, Issue 4, pp 233–241 | Cite as

On proxy agents, mobility, and web access

  • Anupam Joshi
Article

Abstract

With the emerging need for ubiquitous access to information, web access from mobile clients is gaining increasing importance. Unfortunately, the underlying protocols of the web are not designed to support operations from a resource poor platform in a low bandwidth, disconnection prone environment. Efforts to create systems to support mobile browsing have typically been proxy‐based. However, such solutions have recently been criticized due to their non‐scalability. Developments in ad hoc networking also threaten the viability of proxy‐based approaches. In this paper, we critically examine the proxy‐based approach and its place in mobile access to the web in particular, and networked multimedia information in general. We argue for a hybrid approach that uses both proxy‐based and end–end techniques as appropriate, suggest when each is more appropriate, and present a preliminary implementation.

Keywords

Information System Communication Network Hybrid Approach Multimedia Information Mobile Client 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    S. Auephanwiriyakul, A. Joshi and R. Krishnapuram, Fuzzy shot clustering to support networked video databases, in: Proc. of IEEE FUZZ-IEEE 98/WCCI98 (May 1998).Google Scholar
  2. [2]
    M. Balabanovic and Y. Shoham, Content-based, collaborative recommendation, Communications of ACM 40 (1997) 66-72.Google Scholar
  3. [3]
    R. Barrett, P. Maglio and D. Kellem, A confederation of agents that personalize the web, in: First Internat. Conf. on Autonomous Agents, Marina Del Ray, CA (1997).Google Scholar
  4. [4]
    H. Bharadvaj, A. Joshi and S. Auephanwiriyakyl, An active transcoding proxy to support mobile web access, in: Proc. IEEE Symposium on Reliable Distributed Systems (October 1998).Google Scholar
  5. [5]
    R. Bolle, B. Yeo and M. Yeung, Video query: Beyond the keywords, Technical report, IBM T.J. Watson Labs (October 1996).Google Scholar
  6. [6]
    E.A. Brewer, R.H. Katz, Y. Chawathe, A. Fox, S.D. Gribble, T. Hodes, G. Nguyen, T. Henderson, E. Amir, H. Balakrishnan, A. Fox, V. Padmanabhan and S. Seshan, A network architecture for heterogeneous mobile computing, IEEE Personal Communications Magazine 5(5) (1998) 8–24.Google Scholar
  7. [7]
    C. Brooks, M.S. Mazer, S. Meeks and J. Miller, Application-specific proxy servers as http stream transducers, in: Proc. WWW-4, Boston (May 1996); http://www.w3.org/pub/Conferences/ WWW4/Papers/56Application-Specific.Google Scholar
  8. [8]
    E. Elmagarmid, H. Jiang, A. Helal, A. Joshi and M. Ahmed, Video Database Systems: Issues, Products and Applications (Kluwer Academic, Dordrecht, 1997).Google Scholar
  9. [9]
    G. Forman and J. Zahorjan, The challenges of mobile computing, IEEE Computer 27 (April 1994) 38–47.Google Scholar
  10. [10]
    A. Fox and E.A. Brewer, Reducing www latency and bandwidth requirements by real-time distillations, in: Proc. of the 5th Internat. World Wide Web Conf. (May 1996).Google Scholar
  11. [11]
    A. Fox, I. Goldberg, S.D. Gribble, D.C. Lee, A. Polito and E.A. Brewer, Experience with top gun wingman: A proxy-based graphical web browser for the usr palmpilot, in: Proc. of IFIP Internat. Conf. on Distributed Systems Platforms and Open Distributed Processing (Middleware '98) (1998).Google Scholar
  12. [12]
    A. Howe and D. Dreilinger, Savvysearch: A meta-search engine that learns which search engines to query (January 1997); http:// www.cs.colostate.edu/ howe/pubs.html.Google Scholar
  13. [13]
    A.D. Joseph, A.F. deLespinasse, J.A. Tauber, D.K. Gifford and M.F. Kaashoek, Rover: A toolkit for mobile information access, in: Proc. of the 15th Symposium on Operating Systems Principles, ACM (December 1995).Google Scholar
  14. [14]
    A. Joshi, S. Auephanwiriyakul and R. Krishnapuram, On fuzzy clustering and content based access to networked video databases, in: Proc. of the 8th IEEE Workshop on Research Issue in Data Engineering (1998).Google Scholar
  15. [15]
    A. Joshi, C. Punyapu and P. Karnam, Personalization and asynchronicity to support mobile web access, in: Proc. of Workshop on Web Information and Data Management, ACM Conf. on Information and Knowledge Management (November 1998).Google Scholar
  16. [16]
    A. Joshi, R. Weerasinghe, S.P. McDermott, B.K. Tan, G. Benhardt and S. Weerawarna, Mowser: Mobile platforms and web browsers, Bulletin of the IEEE Technical Committee on Operating Systems and Application Environments 8(1) (1996).Google Scholar
  17. [17]
    A. Joshi, S. Weerawarana and E.N. Houstis, Disconnected browsing of distributed information, in: Proc. of 7th IEEE Internat. Workshop on Research Issues in Data Engineering (IEEE Press, New York, April 1997) pp. 101–108.Google Scholar
  18. [18]
    A. Joshi, S. Weerawarna and E.N. Houstis, On disconnected browsing of distributed information, in: Proc. of the 7th Internat. Workshop on Research Issues on Data Engineering (IEEE Press, New York, 1997) pp. 101–107.Google Scholar
  19. [19]
    A. Joshi and R. Krishnapuram, Robust fuzzy clustering methods to support web mining, in: Proc. of ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, eds. S. Chaudhuri and U. Dayal (June 1998).Google Scholar
  20. [20]
    R. Katz, Adaptation and mobility in wireless information systems, IEEE Personal Communications 1(1) (1994) 6–17.Google Scholar
  21. [21]
    R.H. Katz, E.A. Brewer, E. Amir, H. Balakrishnan, A. Fox, S. Gribble, T. Hodes, D. Jiang, G.T. Nguyen, V. Padmanabhan and M. Stemm, The bay area research wireless access network (barwan), in: Proc. of Spring COMPCON Conf. (1996).Google Scholar
  22. [22]
    H. Kautz, B. Selman and M. Shah, Combining social and collaborative filtering, Communications of ACM 40 (1995) 63–65.Google Scholar
  23. [23]
    R. Kavasseri, T. Keating, M. Wittman, A. Joshi and S. Weerawarana, Web intelligent query-disconnected web browsing using cooperative techniques, in: Proc. of the 1st. IFCIS Internat. Conf. on Cooperative Information Systems, IEEE (IEEE Press, New York, 1996) pp. 167–174.Google Scholar
  24. [24]
    J.A. Konstan, B.N. Miller, D. Maltz, J.L. Herlocker, L.R. Gordon and J. Riedl, Applying collaborative filtering to usenet news, Communications of ACM 40 (1997) 77–87.Google Scholar
  25. [25]
    M. Liljeberg, M. Kojo and K. Raatikainen, Enhanced services for world-wide web in mobile wan environment (1996), http:// www.cs.Helsinki.FI/research/mowgli/mowglipapers. html.Google Scholar
  26. [26]
    O. Nasraoui, R. Krishnapuram and A. Joshi, Mining web access logs using a fuzzy relational clustering algorithm based on a robust estimator, in: Proc. of 8th Int. World Wide Web Conference-WWW8 (August 1999).Google Scholar
  27. [27]
    O. Nasraoui, R. Krishnapuram and A. Joshi, Relational clustering based on a new robust estimator with applications to web mining, in: Proc. of Internat. Conf. North American Fuzzy Info. Proc. Society (NAFIPS '99), New York (1999).Google Scholar
  28. [28]
    B.D. Noble, M. Satyanarayanan, D. Narayanan, J.E. Tilton, J. Flinn and K.R.Walker, Agile application-aware adaptation for mobility, in: Proc. of the 16th ACM Symposium on Operating System Principles.Google Scholar
  29. [29]
    M. Perkowitz and O. Etzioni, Adaptive web sites: Automatically synthesizing web pages, in: Proc. National Conf. of the American Association of Artificial Intelligence (AAAI) (1998).Google Scholar
  30. [30]
    Ringing in wireless services: Web access without wires, IBM Corporation, http://www.ibm.com/Stories/1997/08/ wireless4.html.Google Scholar
  31. [31]
    J. Rucker and M.J. Polanko, Personalized navigation for the web, Communications of ACM 40 (1997) 73–75.Google Scholar
  32. [32]
    S. Seshan, M. Stemm and R. Katz, Spand: Shared passive network performance discovery, in: Proc. of the 1st Usenix Symposium on Internet Technologies and Systems (USITS '97) (1997).Google Scholar
  33. [33]
    M. Spritzer and M. Theimer, Scalable, secure, mobile computing with location information, Communications of ACM 36 (1993) 27–27.Google Scholar
  34. [34]
    L.G. Terveen, W.C. Hill, B. Amento, D. McDonald and C.J. Phoaks, Web page: http://www.acm.org/sigchi/ chi97/proceedings/paper/lgt.htm.Google Scholar
  35. [35]
    J. Vass, B.-B. Chai and X. Zhuang, 3dslcca-a highly scalable very low bit rate software-only wavelet video codec, in: Proc. of IEEE Workshop on Multimedia Signal Processing (1998).Google Scholar
  36. [36]
    J. Vass, J. Yao, S. Zhuang, A. Joshi and X. Zhuang, Multimedia information access in wireless environments, Technical report TR-9901, CECS Department, University of Missouri (1999).Google Scholar
  37. [37]
    M. Yeung and B. Yeo, Efficient matching and clustering of video shots, in: Proc. of Internat. Conf. on Image Processing (1995).Google Scholar
  38. [38]
    O.R. Zaine, M. Xin and J. Han, Discovering web access patterns and trends by applying olap and data mining technology on web logs, in: Proc. of Advances in Digital Libraries Conf. (ADL'98) (April 1998) pp. 19-29.Google Scholar
  39. [39]
    B. Zenel, A proxy based filtering mechanism for the mobile environment, Ph.D. thesis, Department of Computer Science, Columbia University.Google Scholar

Copyright information

© Kluwer Academic Publishers 2000

Authors and Affiliations

  • Anupam Joshi

There are no affiliations available

Personalised recommendations