Skip to main content

Data Management for Mobile Ad-Hoc Networks

  • Chapter

Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   54.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Acharya, R. Alonso, M. Franklin, and S. Zdonik. Broadcast disks: data management for asymmetric communication environments. In Proceedings of ACM SIGMOD, pp. 199-210, 1995.

    Google Scholar 

  2. F. Afrati and R. Chirkova. Selecting and using views to compute aggregate queries. In Proceedings of ICDT, 2005.

    Google Scholar 

  3. K. Arnold, B. Osullivan, R.W. Scheifler, J. Waldo, A. Wollrath, B. O’Sullivan, and R. Scheifler. The Jini Specification (The Jini Technology). Addison-Wesley, Reading, MA, June 1999.

    Google Scholar 

  4. S. Avancha, P. D’Souza, F. Perich, A. Joshi, and Y. Yesha. P2P M- Commerce in pervasive environments. In ACM SIGEcom Exchanges, 2003.

    Google Scholar 

  5. S. Avancha, A. Joshi, and T. Finin. Enhancing the Bluetooth Service Discovery Protocol. Technical report, CSEE, UMBC, August 2001. TR-CS-01-08.

    Google Scholar 

  6. S. Avancha, A. Joshi, and T. Finin. Enhanced service discovery in bluetooth. IEEE Computer, 35(6):96-99, June 2002.

    Google Scholar 

  7. P. Bahl and V.N. Padmanabhan. RADAR: an in-building RF-based user location and tracking system. In IEEE INFOCOM, Vol. 2, pp. 775-784, Tel Aviv, Israel, March 2000.

    Google Scholar 

  8. H. Bharadvaj, A. Joshi, and S. Auephanwiriyakyl. An active transcoding proxy to support mobile Web access. In Proceedings of the IEEE Sympo- sium on Reliable Distributed Systems, October 1998.

    Google Scholar 

  9. Bluetooth SIG. Specification. http://bluetooth.com/.

  10. C. Bobineau, L. Bouganim, P. Pucheral, and P. Valduriez. PicoDBMS: scal- ing down database techniques for the smartcard. In Proceedings of the 26th International Conference on Very Large Databases, 2000.

    Google Scholar 

  11. M. Bratmann. Intentions, Plans, and Practical Reason. Harvard University Press, Cambridge, MA, 1987.

    Google Scholar 

  12. D. Brickley and R. Guha. Resource Description Framework (RDF) Schema Specification1.0 - W3C Recommendation. http://www.w3.org/TR/2000/ CR-rdfschema-20000327, 2000.

  13. C. Brooks, M.S. Mazer, S. Meeks, and J. Miller. Application-specific proxy servers as HTTP stream transducers. In Fourth International World Wide Web Conference, pp. 539-548, Boston, Massachusetts, December 1995.

    Google Scholar 

  14. Bukhres, S. Morton, P. Zhang, E. Vanderdijs, C. Crawley, J. Platt and M. Mossman. A proposed mobile architecture for distributed database envi-ronment. Technical report, Indiana University, Purdue University, 1997.

    Google Scholar 

  15. P. Cao and C. Liu. Maintaining strong cache consistency in the world wide web. IEEE Transactions on Computers, 47(4):445-457, 1998.

    CrossRef  MathSciNet  Google Scholar 

  16. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha. GSD: a novel group-based service discovery protocol for MANETS. In Fourth IEEE Conference on Mobile and Wireless Communications Networks (MWCN), pp. 301-306, Stockholm, Sweden, September 2002.

    Google Scholar 

  17. D. Chakraborty, F. Perich, S. Avancha and A. Joshi, D. Reggie: A smart ser- vice discovery technique for E-Commerce applications. In Workshop at 20th Symposium on Reliable Distributed Systems, October 2001.

    Google Scholar 

  18. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi. DReggie: semantic service discovery for M-Commerce applications. In Workshop on Reliable and Secure Applications in Mobile Environment, SRDS, October 2001.

    Google Scholar 

  19. D. Chakraborty, F. Perich, A. Joshi, T. Finin, and Y. Yesha. A reactive ser- vice composition architecture for pervasive computing environments. In Seventh Personal Wireless Communications Conference (PWC), pp. 53-62, Singapore, October 2002.

    Google Scholar 

  20. H. Chen, T. Finin, and A. Joshi. Semantic Web in a pervasive context-aware architecture. Artificial Intelligence in Mobile System 2003, pp. 33-40, October 2003.

    Google Scholar 

  21. M. Cherniak, E. Galvez, D. Brooks, M. Franklin, and S. Zdonik. Profile driven data management. In 28th International Conference on Very Large Databases, August 2002.

    Google Scholar 

  22. R. Chirkova, A. Halevy, and D. Suciu. A formal perspective on the view selection problem. VLDB Journal, 11(3):216-237, 2002.

    CrossRef  MATH  Google Scholar 

  23. R. Chirkova and C. Li. Materializing views with minimal size to answer queries. In Proceedings of PODS, 2003.

    Google Scholar 

  24. T.H. Cormen, C.E. Leiserson, R.L. Rivest, and C. Stein. Introduction to Algo- rithms. Prentice-Hall, Englewood Cliffs, NJ, 2001.

    Google Scholar 

  25. S. Czerwinski, B. Zhao, T. Hodes, A. Joseph, and R. Katz. An architecture for a secure service discovery service. In Fifth Annual International Confer- ence on Mobile Computing and Networks (MobiCom’99), pp. 24-35, Seat- tle, WA, 1999.

    Google Scholar 

  26. DARPA. DARPA Agent Markup Language + Ontology Inference Layer (DAML+OIL). http://www.daml.org.

  27. J. Demers, K. Petersen, M.J. Spreitzer, D.B. Terry, M.M. Theimer, and B.B. Welch. The bayou architecture: support for data sharing among mobile users. In IEEE Workshop on Mobile Computing Systems & Applications, 1994.

    Google Scholar 

  28. K. Dey and G.D. Abowd, editors. Towards a Better Understanding of Con- text and Context-Awareness, GVU, Georgia Institute of Technology, The Hague, The Netherlands, April 2000.

    Google Scholar 

  29. M. Dunham and A. Helal. Mobile computing and databases: anything new? SIGMOD Record, pp. 5-9, 1995.

    Google Scholar 

  30. M. Dunham, A. Helal, and S. Balakrishnan. A mobile transaction model that captures both the data and movement behavior. Mobile Networks and Applications, pp. 149-162, 1997.

    Google Scholar 

  31. S. Ellis and R.A. Floyd. The roe file system. In Third Symposium on Reli- ability in Distributed Software and Database Systems, pp. 175-181, IEEE, Clearwater Beach, Florida, 1983.

    Google Scholar 

  32. K.P. Eswaran, J. Gray, R.A. Lorie, and I.L. Traiger. The notion of consis- tency and predicate locks in a database system. Communications of the ACM, 19(11):624-633, December 1976.

    CrossRef  MATH  MathSciNet  Google Scholar 

  33. M. Franklin. Challenges in ubiquitous data management. In Informatics, 2001.

    Google Scholar 

  34. T. Gaasterland and J. Lobo. Qualified answers that reflect user needs and preferences. In VLDB, 1994.

    Google Scholar 

  35. D. Goodman, J. Borras, N. Mandayam, and R. Yates. INFOSTATIONS: a new system model for data and messaging services. In Proceedings of IEEE VTC’97, Vol. 2, pp. 969-973, 1997.

    Google Scholar 

  36. J. Grant, J. Gryz, J. Minker, and L. Raschid. Semantic query optimization for object databases. In ICDE, 1997.

    Google Scholar 

  37. E. Guttman, C. Perkins, J. Veizades, and M. Day. RFC 2068: Service Loca- tion Protocol, version 2, 1999. ftp://ftp.isi.edu/in-notes/rfc2608.txt.

  38. R.G. Guy, P.L. Reiher, D. Ratner, M. Gunter, W. Ma, and G. J. Popek. Rumor: mobile data access through optimistic peer-to-peer replication. In ER Workshops, pp. 254-265, 1998.

    Google Scholar 

  39. J. Gwertzman and M.I. Seltzer. World wide web cache consistency. In USENIX Annual Technical Conference, pp. 141-152, 1996.

    Google Scholar 

  40. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins. Global Positioning System: Theory and Practice. Springer Berlin Heidelberg New York, 4th edition, May 1997.

    Google Scholar 

  41. J. Holliday, D. Agrawal, and A.E. Abbadi. Database replication using epi- demic communication. In European Conference on Parallel Processing, pp. 427-434, 2000.

    Google Scholar 

  42. T. Imielinski and B.R. Badrinath. Mobile wireless computing: challenges in data management. Communications of the ACM, 37(10):18-28, 1994.

    CrossRef  Google Scholar 

  43. T. Imielinski, S. Viswanathan, and B.R. Badrinath. Data on air: Organiza- tion and access. IEEE Transactions on Knowledge and Data Engineering, pp. 352-372, May/June 1997.

    Google Scholar 

  44. J. Ioannidis, D. Duchamp, and M. Gerald Jr. IP-based protocols for mobile internetworking. In ACM SIGCOMM Symposium on Communication, Architecture and Protocols, pp. 235-243, Z®urich, Suisse, 1991.

    Google Scholar 

  45. D.B. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless net- works. In Mobile Computing, 1996.

    Google Scholar 

  46. Joshi. On proxy agents, mobility and Web access. ACM/Baltzer Journal of Mobile Networks and Applications, 2000.

    Google Scholar 

  47. Joshi, R. Weerasinghe, S.P. McDermott, B.K. Tan, G. Bernhardt, and S. Weerawarana. Mowser: Mobile platforms and Web browsers. Bulletin of the Technical Committee on Operating Systems and Application Environments (TCOS), 8(1), 1996.

    Google Scholar 

  48. P. Keleher and U. Cetintemel. Consistency management in Deno. ACM MONET, 1999.

    Google Scholar 

  49. S. Kent and R. Atkinson. IP Encapsulating Security Payload. World Wide Web. http://www.ietf.org/rfc/rfc2406.txt, November 1998.

  50. J.J. Kistler and M. Satyanarayanan. Disconnected operation in the coda file system. In 13th ACM Symposium on Operating Systems Principles, pp. 213-225, Asilomar Conference Center, Pacific Grove, US, 1991. ACM Press.

    Google Scholar 

  51. G. Klyne, F. Raynolds, and C. Woodrow. Composite Capabilities/Preference Profiles (CC/PP): Structure and Vocabularies. World Wide Web. http://www. w3.org/TR/CCPP-struct-vocab/, March 2001.

  52. H. Kottkamp and O. Zukunft. Location-aware query processing in mobile database systems. In Selected Areas in Cryptography, pp. 416-423, 1998.

    Google Scholar 

  53. Lassila and R. Swick. Resource Description Framework. http://www.w3.org/ TR/1999/REC/rdf-syntax-19990222, 1999.

  54. S. Lauzac and P. Chrysanthis. Utilizing versions of views within a mobile environment. In Proceedings of the Ninth International Conference on Computing and Information, 1998.

    Google Scholar 

  55. Z.M. Mao, E.A. Brewer, and R.H. Katz. Fault-tolerant, scalable, wide-area internet service composition. Technical report, CS Division, EECS Department, University of California, Berkeley, January 2001

    Google Scholar 

  56. S. Muench and M. Scardina. xslt20req, February 2001. XSLT Require- ments. World Wide Web. http://www.w3.org/TR/

  57. M. Oezsu and P. Valduriez. Principles of Distributed Database Systems. Prentice-Hall, New Jersey, 2nd edition, 1999.

    Google Scholar 

  58. F. Perich, S. Avancha, D. Chakraborty, A. Joshi, and Y. Yesha. Profile driven data management for pervasive environments. In 13th International Conference on Database and Expert Systems Applications (DEXA 2002), Aix en Provence, France, September 2002.

    Google Scholar 

  59. F. Perich, A. Joshi, T. Finin, and Y. Yesha. On data management in perva- sive computing environments. IEEE Transactions on Knowledge and Data Engineering, 2004. accepted for publication.

    Google Scholar 

  60. F. Perich, A. Joshi, Y. Yesha, and T. Finin. Neighborhood-consistent trans- action management for pervasive computing environments. In 14th International Conference on Database and Expert Systems Applications (DEXA 2003), Prague, Czech Republic, September 2003.

    Google Scholar 

  61. F. Perich, A. Joshi, Y. Yesha, and T. Finin. Collaborative joins in a perva- sive computing environment. VLDB Journal, December 2004.

    Google Scholar 

  62. F. Perich, J.L. Undercoffer, L. Kagal, A. Joshi, T. Finin, and Y. Yesha. In reputation we believe: query processing in mobile ad-hoc networks. In International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston, MA, August 2004.

    Google Scholar 

  63. Perkins. RFC3220: IP Mobility Support for IPv4,2002. http://www. ietf.org/rfc/rfc3220.txt.

  64. C.E. Perkins and P. Bhagwat. Highly dynamic destination-sequenced dis- tance-vector routing(DSDV) for mobile computers. In ACM SIGCOMM’94 Conference on Communications Architectures, Protocols and Applications, pp. 234-244, 1994.

    Google Scholar 

  65. C.E. Perkins and E.M. Royer. Ad hoc on-demand distance vector routing. In Proceedings of the second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90-100, New Orleans, LA, February 1999.

    CrossRef  Google Scholar 

  66. E. Pitoura. A replication schema to support weak connectivity in mobile information systems. In Database and Expert Systems Applications, pp. 510-520, 1996.

    Google Scholar 

  67. Pullela, L. Xu, D. Chakraborty, and A. Joshi. A component based Architec- ture for Mobile Information Access. In Workshop in conjunction with International Conference on Parallel Processing, pp. 65-72, August 2000.

    Google Scholar 

  68. J. Rekesh. UPnP, Jini and Salutation - a look at some popular coordination frameworks for future network devices. Technical report, California Software Labs, 1999.

    Google Scholar 

  69. N. Roussopoulos. Materialized views and data warehouses. SIGMOD Record, 27(1), 1998.

    Google Scholar 

  70. P. Roy, S. Seshadri, S. Sudarshan, and S. Bhobe. Efficient and extensible algorithms for multi query optimization. In W. Chen, J.F. Naughton, and P.A. Bernstein, editors, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 16-18 May 2000, Dallas, Texas, USA, pp. 249-260. ACM, 2000.

    CrossRef  Google Scholar 

  71. R. Sessions. COM and DCOM: Microsoft’s Vision for Distributed Objects. Wiley, New York, NY, October 1997.

    Google Scholar 

  72. R. Smith. The contract net protocol: high-level communication and control in a distributed problem solver, Readings in Distributed Artificial Intelli- gence, 1988.

    Google Scholar 

  73. Sun Microsystems. Jini architecture specification. http://www.sun.com/jini/.

  74. Tait, H. Lei, S. Acharya, and H. Chang. Intelligent file hoarding for mobile computers. In Proceedings of the First ACM International Conference on Mobile Computing and Networking - MobiCom’95, 1995.

    Google Scholar 

  75. The OWL Services Coalition. OWL-S: Semantic Markup For Web Services. http://www.daml.org/services/, November 2003.

  76. J. Undercoffer, F. Perich, A. Cedilnik, L. Kagal, and A. Joshi. A secure in- frastructure for service discovery and access in pervasive computing. ACM MONET: Special Issue on Security in Mobile Computing Environments, 8 (2):113-125, 2003.

    Google Scholar 

  77. UPNP Forum. Understanding Universal Plug and Play: A White Paper. http://upnp.org/download/UPNP_UnderstandingUPNP.doc.

  78. J. Veizades, E. Guttman, C.E. Perkins, and S. Kaplan. RFC 2165: Service Location Protocol, June 1997.

    Google Scholar 

  79. G.D. Walborn and P.K. Chrysanthis. PRO-MOTION: Management of mobile transactions. In Selected Areas in Cryptography, pp. 101-108, 1997.

    Google Scholar 

  80. J.R. Walker. Unsafe at any key size: an analysis of the WEP encapsulation. IEEE Document 802.11-00/362, October 2000.

    Google Scholar 

  81. World Wide Web Consortium (W3C). Ontology web language (owl). http://www.w3.org/

  82. K.J. Worrell. Invalidation in large scale network objects caches. Master’s thesis, 1994.

    Google Scholar 

  83. B. Yang and H. Garcia-Molina. Comparing hybrid peer-to-peer systems. In 27th VLDB Conference, 2001.

    Google Scholar 

  84. S. Yi, P. Naldurg, and R. Kravets. Security-aware ad hoc routing for wire- less networks. In Second ACM Symposium on Mobile Ad Hoc Networking and Computing, pp. 299-302, Long Beach, California, USA, October 2001.

    Google Scholar 

  85. Y.-C. Hu, A. Perrig, and D.B. Johnson. Ariadne: a secure on-demand rout- ing protocol for ad hoc networks. In Eighth ACM International Conference on Mobile Computing and Networking, pp. 12-23, Atlanta, Georgia, USA, September 2002. ACM Press.

    Google Scholar 

  86. B. Zaslavsky and Z. Tari. Mobile computing: overview and current status. Australian Computer Journal, 30(2):42-52, 1998.

    Google Scholar 

  87. B. Zenel. A proxy based filtering mechanism for the mobile environment. PhD thesis, Department of Computer Science, Columbia University, New York, NY, December 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Perich, F., Joshi, A., Chirkova, R. (2006). Data Management for Mobile Ad-Hoc Networks. In: Kou, W., Yesha, Y. (eds) Enabling Technologies for Wireless E-Business. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30637-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30637-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30449-4

  • Online ISBN: 978-3-540-30637-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics