Profile Driven Data Management for Pervasive Environments

  • Filip Perich
  • Sasikanth Avancha
  • Dipanjan Chakraborty
  • Anupam Joshi
  • Yelena Yesha
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2453)


The past few years have seen significant work in mobile data management, typically based on the client/proxy/server model. Mobile/wireless devices are treated as clients that are data consumers only, while data sources are on servers that typically reside on the wired network. With the advent of “pervasive computing” environments an alternative scenario arises where mobile devices gather and exchange data from not just wired sources, but also from their ethereal environment and one another. This is accomplished usingad-hoc connectivity engendered by Bluetooth like systems. In this new scenario, mobile devices become both data consumers and producers. We describe the new data management challenges which this scenario introduces. We describe the design and present an implementation prototype of our framework, MoGATU, which addresses these challenges. An important component of our approach is to treat each device as an autonomous entity with its “goals” and “beliefs”, expressed using a semantically rich language. We have implemented this framework over a combined Bluetooth and Ad-Hoc 802.11 network with clients runningon a variety of mobile devices. We present experimental results validatingour approach and measure system performance.


Mobile Device Cache Size Information Provider Cache Replacement Data Consumer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    C. Bobineau, L. Bouganim, P. Pucheral, and P. Valduriez. PicoDBMS: Scaling down Database Techniques for the Smartcard. In VLDB, 2000.Google Scholar
  2. 2.
    M. Bratmann. Intentions, Plans, and Practical Reason. Harvard University Press, 1987.Google Scholar
  3. 3.
    O. Bukhres, S. Morton, P. Zhang, E. Vanderdijs, C. Crawley, J. Platt, and M. Mossman. A Proposed Mobile Architecture for Distributed Database Environment. Technical report, Indiana University, Purdue University, 1997.Google Scholar
  4. 4.
    M. Cherniak, M. Franklin, and S. Zdonik. Expressing User Profiles for Data Recharging. IEEE Personal Communications, July 2001.Google Scholar
  5. 5.
    A. Demers, K. Petersen, M. Spreitzer, D. Terry, M. Theimer, and B. Welch. The Bayou Architecture: Support for Data SharingamongMobile Users. In Proc. IEEE Workshop on Mobile Computing Systems & Applications, 1994.Google Scholar
  6. 6.
    M. Dunham and A. Helal. Mobile computingand databases: Anythingne w? ACM SIGMOD Record, 24(4), December 1995.Google Scholar
  7. 7.
    A. Joshi. On Proxy Agents, Mobility and Web Access. ACM/Baltzer Journal of Mobile Networks and Applications, 2000.Google Scholar
  8. 8.
    H. Kottkamp and O. Zukunft. Location-Aware Query Processingin Mobile Database Systems. In Proc. of the ACM Symposium on Applied Computing, Feb. 1998.Google Scholar
  9. 9.
    S. Lauzac and P. Chrysanthis. UtilizingV ersions of Views within a Mobile Environment. In DEXA, pages 408–413, Aug. 1998.Google Scholar
  10. 10.
    M. Tamer Oezsu and Patrick Valduriez. Principles of Distributed Database Systems. Prentice Hall, Inc., New Jersey, 2nd edition, 1999.Google Scholar
  11. 11.
    E. Pitoura. A Replication Schema to Support Weak Connectivity in Mobile Information Systems. In DEXA, 1996.Google Scholar
  12. 12.
    Q. Ren and M. Dunham. UsingSemantic Cachingto Manage Location Dependent Data in Mobile Computing. In ACM MobiCom’00, 2000.Google Scholar
  13. 13.
    C. Tait, H. Lei, S. Acharya, and H. Chang. Intelligent File Hoarding for Mobile Computers. In ACM MobiCom’95, 1995.Google Scholar
  14. 14.
    J. Undercoffer, F. Perich, A. Cedilnik, L. Kagal, and A. Joshi. A Secure Infrastructure for Service Discovery and Access in Pervasive Computing. ACM Monet: Securityin Mobile Computing Environments, Spring 2002.Google Scholar

Copyright information

© Springer-VerlagBerlin Heidelberg 2002

Authors and Affiliations

  • Filip Perich
    • 1
  • Sasikanth Avancha
    • 1
  • Dipanjan Chakraborty
    • 1
  • Anupam Joshi
    • 1
  • Yelena Yesha
    • 1
  1. 1.Department of Computer Science and Electrical EngineeringUniversity of Maryland Baltimore CountyBaltimoreUSA

Personalised recommendations