Pervasive data access in wireless and mobile computing environments

被引:9
|
作者
Lee, Ken C. K. [1 ]
Lee, Wang-Chien [1 ]
Madria, Sanjay [2 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Univ Missouri, Dept Comp Sci, Rolla, MO 65409 USA
来源
关键词
pervasive data access; wireless and mobile computing; broadcast; caching;
D O I
10.1002/wcm.424
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid advance of wireless and portable computing technology has brought a lot of research interests and momentum to the area of mobile computing. One of the research focus is on pervasive data access. With wireless connections, users can access information at any place at any time. However, various constraints such as limited client capability, limited bandwidth, weak connectivity, and client mobility impose many challenging technical issues. In the past years, tremendous research efforts have been put forth to address the issues related to pervasive data access. A number of interesting research results were reported in the literature. This survey paper reviews important works in two important dimensions of pervasive data access: data broadcast and client caching. In addition, data access techniques aiming at various application requirements (such as time, location, semantics and reliability) are covered. Copyright (C) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:25 / 44
页数:20
相关论文
共 50 条
  • [31] Pervasive adaptation for mobile computing
    Edmonds, T
    Hodges, S
    Hopper, A
    15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 111 - 118
  • [32] Pervasive and Mobile Computing: Editorial
    Das, Sajal K.
    Conti, Marco
    Shirazi, Behrooz
    Pervasive and Mobile Computing, 2015, 16 (PA) : 76 - 77
  • [33] Mobile agents for pervasive computing
    Shah, Syed Waqar
    Inayatullah, M.
    Arbab, M. Naeem
    Yahy, Khawaja M.
    Khan, M. Zahir
    THIRD INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES 2007, PROCEEDINGS, 2007, : 46 - 51
  • [34] Editorial: Mobile and pervasive computing
    Chen, IR
    DaSilva, L
    Midkiff, S
    COMPUTER JOURNAL, 2004, 47 (04): : 404 - 404
  • [35] Uncertain privacy decision about access personal information in pervasive computing environments
    Zhang, Qingsheng
    Qi, Yong
    Hou, Di
    Zhao, Jizhong
    Han, Huawei
    FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 3, PROCEEDINGS, 2007, : 156 - 160
  • [36] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384
  • [37] Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments
    Choi, Jung Hwan
    Kang, Dong Hyun
    Jang, Hyunsu
    Eom, Young Ik
    2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 491 - 498
  • [38] A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments
    Zhu, Zhou
    Xu, Renzuo
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4572 - 4577
  • [39] Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments
    Sharghi, Hassan
    Liscano, Ramiro
    E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 24 - 40
  • [40] Mobile and Pervasive Computing in Construction
    Skibniewski, Miroslaw J.
    CONSTRUCTION MANAGEMENT AND ECONOMICS, 2014, 32 (11) : 1148 - 1150