Pervasive data access in wireless and mobile computing environments

被引:9
|
作者
Lee, Ken C. K. [1 ]
Lee, Wang-Chien [1 ]
Madria, Sanjay [2 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Univ Missouri, Dept Comp Sci, Rolla, MO 65409 USA
来源
关键词
pervasive data access; wireless and mobile computing; broadcast; caching;
D O I
10.1002/wcm.424
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advance of wireless and portable computing technology has brought a lot of research interests and momentum to the area of mobile computing. One of the research focus is on pervasive data access. With wireless connections, users can access information at any place at any time. However, various constraints such as limited client capability, limited bandwidth, weak connectivity, and client mobility impose many challenging technical issues. In the past years, tremendous research efforts have been put forth to address the issues related to pervasive data access. A number of interesting research results were reported in the literature. This survey paper reviews important works in two important dimensions of pervasive data access: data broadcast and client caching. In addition, data access techniques aiming at various application requirements (such as time, location, semantics and reliability) are covered. Copyright (C) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:25 / 44
页数:20
相关论文
共 50 条
  • [1] Pervasive access to images and data - The use of computing grids and mobile/wireless devices across healthcare enterprises
    Pohjonen, Hanna
    Ross, Peeter
    Blickman, Johan G.
    Kamman, Richard
    [J]. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2007, 11 (01): : 81 - 86
  • [2] Ontology access patterns for pervasive computing environments
    Villanueva, F. J.
    Villa, D.
    Barba, J.
    Rincon, F.
    Moya, F.
    Lopez, J. C.
    [J]. AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
  • [3] Bradio: A wireless infrastructure for pervasive computing environments
    Yoshimi, B
    Bolam, GB
    Sukaviriya, N
    Elliott, J
    Carmeli, B
    Morgan, J
    Derby, H
    [J]. CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 309 - 316
  • [4] On data management in pervasive computing environments
    Perich, F
    Joshi, A
    Finin, T
    Yesha, Y
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (05) : 621 - 634
  • [5] Smart wireless access points for pervasive computing
    Ocampo, R
    de Meer, H
    [J]. WIRELESS ON-DEMAND NETWORK SYSTEMS, PROCEEDINGS, 2004, 2928 : 329 - 343
  • [6] Big Data in Mobile and Pervasive Computing
    Sharma, Anuradha
    Farooq, Omar
    Misra, Praveen Kumar
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 1068 - 1072
  • [7] Uncertainty assessment in access control of pervasive computing environments
    Pashazadeh, Saeid
    Dizaji, Mohammad Zendedel
    Amiri, Ali
    [J]. 2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
  • [8] A framework for autonomous LBS in wireless pervasive computing environments
    Li Fang
    Li Xiaolei
    Bian Fuling
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 1715 - +
  • [9] Securing spontaneous communications in wireless pervasive computing environments
    Shin, D
    [J]. ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2005, : 662 - 667
  • [10] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +