Pervasive data access in wireless and mobile computing environments

被引:9
|
作者
Lee, Ken C. K. [1 ]
Lee, Wang-Chien [1 ]
Madria, Sanjay [2 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Univ Missouri, Dept Comp Sci, Rolla, MO 65409 USA
来源
关键词
pervasive data access; wireless and mobile computing; broadcast; caching;
D O I
10.1002/wcm.424
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advance of wireless and portable computing technology has brought a lot of research interests and momentum to the area of mobile computing. One of the research focus is on pervasive data access. With wireless connections, users can access information at any place at any time. However, various constraints such as limited client capability, limited bandwidth, weak connectivity, and client mobility impose many challenging technical issues. In the past years, tremendous research efforts have been put forth to address the issues related to pervasive data access. A number of interesting research results were reported in the literature. This survey paper reviews important works in two important dimensions of pervasive data access: data broadcast and client caching. In addition, data access techniques aiming at various application requirements (such as time, location, semantics and reliability) are covered. Copyright (C) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:25 / 44
页数:20
相关论文
共 50 条
  • [21] Continuous access of broadcast data using artificial pointers in wireless mobile computing
    Saxena, PC
    Arora, IJ
    COMPUTING AND INFORMATICS, 2003, 22 (05) : 473 - 510
  • [22] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [23] Security and privacy information technologies and applications for wireless pervasive computing environments
    Wang, Shiuh-Jeng
    Liu, Jigang
    Shon, Taeshik
    Vaidya, Binod
    Chen, Yeong-Sheng
    INFORMATION SCIENCES, 2015, 321 : 147 - 149
  • [24] Context-based secure resource access in pervasive computing environments
    Tripathi, A
    Ahmed, T
    Kulkarni, D
    Kumar, R
    Kashiramka, K
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 159 - 163
  • [25] Runtime Efficiency of Adaptive Mobile Software Agents in Pervasive Computing Environments
    Gunasekera, Kutila
    Krishnaswamy, Shonali
    Loke, Seng Wai
    Zaslavsky, Arkady
    INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES (ICPS 2009), 2009, : 123 - 131
  • [26] Mobile mashup: A pervasive and flexible paradigm for data access
    Matera, Maristella
    Picozzi, Matteo
    Mondo Digitale, 2012, 11 (01):
  • [27] Coordination in pervasive computing environments
    Ferscha, A
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 3 - 9
  • [28] On Modeling for Pervasive Computing Environments
    Campiolo, Rodrigo
    Cremer, Vivian
    Sobral, Joao Bosco M.
    MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
  • [29] Data engineering for mobile and wireless access
    Chrysanthis, PK
    Kumar, V
    Pitoura, E
    19TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2003, : 805 - 805
  • [30] Database access technologies based on Mobile Agents in mobile computing environments
    Xiong, Yan
    Miao, Fu-You
    Hua, Bei
    Wang, Xing-Fu
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2002, 23 (10):