An Updates Dissemination Protocol for Read-Only Transaction Processing in Mobile Real-Time Computing Environments

Size: px
Start display at page:

Download "An Updates Dissemination Protocol for Read-Only Transaction Processing in Mobile Real-Time Computing Environments"

Transcription

1 An Updates Dissemination Protocol for Read-Only Transaction Processing in Mobile Real-Time Computing Environments Guohui Li 1, Hongya Wang 1,2, Jixiong Chen 1, Yingyuan Xiao 1, Yunsheng Liu 1 1 College of Computer Science and Technology Huazhong University of Science and Technology Wuhan, Hubei, P. R. China, guohuili@263.net 2 Department of Information and Technology Central China Normal University Wuhan, Hubei, P. R. China, wanghongya@tom.com Abstract. Data management issues in mobile computing environments have got lots of concerns of relevant researchers. Among these research topics, data broadcast has been extensively investigated due to its advantages such as scalability and bandwidth effectiveness. While plenty of works have been done on this subject, it is still less touched when data broadcast is used to deliver constantly updated real-time data to read-only transactions with deadlines. In this paper, we first deeply analyze the data dissemination requirements for readonly transaction processing in mobile real-time computing environments and formally define several performance objectives. Then a novel updates dissemination protocol called mixed real-time data broadcast is proposed. In mixed real-time data broadcast, a set of new techniques including reducing the length of consistency intervals, immediate updates dissemination policy and ondemand data delivery are incorporated seamlessly. Moreover, an enhanced index structure is designed for read-only transactions to judge precisely when to request the desired data. Simulation results show that the proposed protocol can provide higher data currency and lower miss rate compared with existing updates dissemination protocols and is more appropriate for mobile real-time computing environments. 1 Introduction Rapid advances in wireless communication technology have greatly improved the performance and availability of mobile information services. At the same time, portable computing devices such as notebook computers and palmtop machines are becoming the mainstream of computing equipments. Thanks to such advances, many novel mobile database applications have emerged to meet the need of accessing data resources anywhere and anytime. Among these applications, read-only transaction processing that aims at providing consistent data to read-only transactions generated

2 from mobile clients has got lots of concerns of relevant researchers [1-10]. Nevertheless, read-only transaction processing in mobile real-time computing environments, which not only requires consistent data access to database servers but also has time constraints on both data and transactions, has not received adequate attention even though its significance for applications such as stock and traffic information dissemination [6,9,11]. Owing to the inherent limitation of wireless communication network, the bandwidth of the downstream channel from the database server to mobile clients is much larger than that of the upstream channel and in some cases upstream channels even do not exist. Therefore, instead of pull-based data dissemination methods, data broadcast has been widely accepted as an efficient way for mobile clients to get their needed data. When data broadcast is used to propagate frequently updated data to read-only transactions issued from mobile clients, we call it updates dissemination. To the best of our knowledge, updates dissemination is addressed first in [2] and the authors discuss the tradeoffs between data currency and performance issues. However transaction semantics is not supported and the consistency criterion is relatively relax. Transactional support is introduced in the Datacycle architecture and the serializability is taken as the correctness criterion, while special hardware is needed to detect changes of values read by transactions [12]. Recently two efficient updates dissemination protocols, the multi-version data broadcast (MVB) and the invalidation method (IR), are proposed in [4,5]. However, the majority of existing updates dissemination protocols do not take the time constraints into account, whereas data dissemination methods referring to real-time characteristics do not support the transactional semantics [6,13]. In this paper, we investigate the problems of disseminating consistent data to read-only transactions with deadlines in mobile real-time computing environments. A novel updates dissemination protocol called mixed real-time data broadcast (MRTB) is proposed. In mixed real-time data broadcast, a set of new techniques including reducing the length of consistency intervals, immediate updates dissemination policy and on-demand data delivery are incorporated seamlessly. Moreover, an enhanced index structure is designed for read-only transactions to judge precisely when to request the desired data. Simulation results show that the proposed protocol can provide higher data currency and lower miss rate compared with existing updates dissemination protocols and is more appropriate for mobile real-time computing environments. The rest of the paper is organized as follows. Section 2 presents the preliminaries. Section 3 introduces the details of mixed real-time data broadcast protocol. Section 4 presents the performance evaluation of the proposed protocol. Finally, conclusion is made in section 5. 2 Notations and Definitions We assume that the database is a finite set composed of a number of data items, that is, DB = {d i i = 1, 2,, n}. Definition 1. The value of data item d at time instance τ is called the state of d at τ, denoted by S τ (d).

3 Definition 2. The states of all data items in DB at time instance τ is called the state of DB at τ, denoted by S τ (DB) = {S τ (d i ) i = 1, 2,, n}. Definition 3. Let S τ1 (d) and S τ2 (d) be the states of d at τ 1 and τ 2 respectively. If condition (τ 1 < τ 2 ) (S τ1 (d) S τ2 (d)) holds, we say that S τ2 (d) is more current than S τ1 (d), denoted by S τ2 (d) > c S τ1 (d). Definition 4. Let T be an read-only transaction that committed at time instance τ c and R(T) is the read set of T. S T (d) denotes the state of d when T reads d. We say that T is consistent if and only if: τ (τ τ c ) ( d (d R(T)) ( S T (d) S τ (DB))) T is consistent only if data items in its read set form a subset of a consistent state of DB at time instance τ earlier than τ c. Guaranteeing the consistency of transactions is essential for many applications such as stock and traffic information dissemination. So we follow strictly the consistency criterion in Def. 4 and do not consider relaxing it to gain the improvement in other performance metrics in this paper. Definition 5. If T is consistent and condition (d R(T)) (S τc (d)> c S T (d)) holds, we say that d is stale for T. Let SR(T) be the set of stale data items read by T, that is, SR(T) = {d d R(T) S τc (d)> c S T (d)}. The staleness of T, denoted by ST T, is defined as SR(T) / R(T). The system staleness, denoted by SS, is defined as ST Ti / {T i }, where {T i } is the finite set of read-only transactions in the system during a certain period. Reading stale data will decrease the usefulness of execution results of transactions. Thus, how to reduce the amount of stale data read by transactions, namely, decreasing SS, is one key issue in designing efficient updates dissemination protocols. Smaller SS is, transactions will read much more current data items. Definition 6. The miss rate, denoted by MR, is defined as N miss /N total, where N miss and N total are the number of read-only transactions missing their deadlines and the total number of transactions processed in the system respectively. MR is the other performance metric since missing deadlines is undesirable for applications with constraint on their completion time. In conclusion, the requirements for updates dissemination protocols for read-only transaction processing in mobile realtime computing environments are to reduce SS and MR on the premise of ensuring the consistency of transactions. In this paper we follow the assumptions in [4] that the periodic broadcast is adopted, that is, all data items in the database have to be broadcast at least once in each broadcast cycle. Under periodic broadcast, if the waiting time is not of great importance, transactions need not issue explicit data request since all data items definitely appear in the broadcast sooner or later. Definition 7. Let d i be the i th data item instance in a broadcast cycle and τ(i) is the time instance broadcasting d i. If condition d j (i j i+k-1) (S τ(j) (d j ) S τ(i) (DB) holds for d i to d i+k-1, we say that the k data item instances constitute a consistency interval CI i, k, where i is the sequence number of the first item of m CI i, k m in the broadcast cycle, m is the monotonically increasing sequence number of CI i, k m and k is the length of CI i, k. m

4 The states of data items in CI i, k correspond to S m τ(i)(db) and then are consistent with each other. Theoretically two successive consistency intervals may be overlapped and their lengths are not necessarily identical, while from the practical point of view, in this paper we only address qualified updates dissemination protocols with the following characteristics: 1) the lengths of consistency intervals are constant and 2) the end of one consistency interval is just the beginning of the next one. For simplicity of presentation, in the following sections we use CI m to represent CI i, k and m CIk to denote a set of consistency intervals whose length is equal to k. 3 The Broadcast Protocol The system model includes two relatively independent parts, the server-side model and the client-side model. The server-side model consists of the database server, the broadcast server and the mobile support station, which are interconnected by the fixed network. We assume the size of each data item is identical and each update is labeled with a time-stamp to indicate when the value is taken. The basic time unit in the system is the time interval for broadcasting a single data item. The broadcast server delivers data through the downstream channel and supports two kinds of broadcast: broadcast on-schedule (BOS) and broadcast on-demand (BOD). BOS refers to that all data items in the database are propagated according to the chosen scheduling algorithm such as flat broadcast or frequency-based scheduling strategies [6,14], which is aimed at exploiting the channel efficiently. BOD takes the user requirements into consideration and delivers data items on-demand to meet their data requests. The mobile support station is responsible for managing the upstream channel, through which mobile clients may send data requests if the desired data do not appear timely. At the same time, a data requests queue is maintained at the mobile support station. The client-side model is composed of a large number of mobile clients, from which read-only transactions are generated one at a time. Each read-only transaction consists of a set of ordered read operations and is associated with a deadline on its completion time. In this paper the firm transaction model is adopted, which means that real-time transactions missing their deadlines will be aborted at once while this abortion have no negative effect on the system. If a read-only transaction has finished all read operations without violating the consistency criterion and time constraint, it commits immediately. Otherwise, e.g., an inconsistent read occurs, the read-only transaction will have to be restarted as long as its deadline does not expire. The next run of the transaction can read consistent data item from the local cache directly. Since the functions and behavior of transactions in real-time applications are much more predictable [9], we assume the number of read operations of a read-only transaction can be obtained using certain pre-analysis techniques before its execution.

5 3.1 Real-Time Data Broadcast Based on the transaction execution model described above and the definition of SS, we can get the following proposition easily. Proposition 1. Given any qualified updates dissemination protocol, for two consistency intervals CI k 1 and CIk 2, if k 1>k 2 and k 1 can be exactly divided by k 2, SS of using CI k 2 is necessarily less than that of using CIk 1. With existing updates dissemination protocols, restarting transactions is the common way to ensure the consistency. To continue their execution, restarted transactions have to wait until the new values of updated data items appear. However, the waiting time depends on particular scheduling algorithms and so is unpredictable, which is quite undesirable for transactions with deadline constraints. To reduce the uncertainty of the waiting time, a new policy is introduced in this paper. Definition 8. Given any qualified updates dissemination protocol, suppose data item d is updated during consistency interval CI m at the server and cannot be broadcast by the chosen scheduling algorithm during the remaining portion of CI m, the immediate updates dissemination policy (IUDP) delivers the new value of d instantly at the beginning of CI m+1 without waiting for being scheduled. By the transaction execution model we can get proposition 2 readily. Proposition 2. With a particular updates dissemination protocol, using IUDP can provide the new values of updated data items to restarted transactions more timely than the one without IUDP. MVB seriously affects the data currency mainly due to its long broadcast cycle and the delivery of old versions of data items. To increase data currency, two improvements for MVB are made in the design of the real-time data broadcast protocol (RTB: the preliminary version of the proposed protocol). The first improvement is shortening the length of consistency intervals as well as only delivering the latest version of data during each consistency interval. According to proposition 1, appropriate length candidate may be 1/n, e.g., half or one third, of the length of the whole broadcast cycle, where n is a natural number bigger than 1. This improvement can decrease the probability of reading stale data for read-only transactions dramatically. In terms of proposition 2, the second improvement is utilizing IUDP to reduce the execution time of restarted read-only transactions. In particular, at the beginning of each consistency interval the new values (NV) of updated data during the preceding consistency interval are delivered immediately instead of waiting for being scheduled by the scheduling algorithm. To maintain the consistency, at the beginning of each consistency interval (just before NV) an invalidation report (IR) is propagated similar to IM, in which there are the identifiers of data items updated during the preceding consistency interval. Each read-only transaction, say T i, reads IR periodically and determines to restart or not by judging whether data items in its read set are found in IR. If an inconsistent read occurs, T i has to restart to ensure the consistency. Mobile clients may cache data items of interest locally. In the presence of updates, items in the cache may become stale. There are various approaches to communicating updates to the client caches. Invalidation combined with a form of autoprefetching was shown to perform well in broadcast delivery [4]. Similar to [4], this kind of cache updates policy is used in this paper. In particular, if data items in the cache are found

6 in IR, the new values of such items will be autofetched once they appear in NV. As to the cache replacement policy, the most commonly used one, LRU, is adopted in this paper. 3.2 Mixed Real-Time Data Broadcast Results presented in [3] indicate that BOD has a better performance in meeting data needs with deadlines compared with pure BOS. Similar research works in [6,12] also show that mixed data broadcast, which combines BOS with BOD, performs better than just using a broadcast policy alone. Though RTB in conjunction with BOD seems to be promising in reducing the miss rate, several technical problems still need to be resolved. The first one is how to allocate restricted bandwidth of the downstream channel between BOS and BOD. Considering the complexity of bandwidth allocation, the ratio of BOD to BOS is fixed in the mixed real-time data broadcast (MRTB) and may be adjusted as a system parameter in practice. With respect to the period of BOD, in MRTB it is set the same as that of the consistency interval to simplify the implementation as well as provide much higher data currency. The second problem is how to determine the time at which read-only transactions send their data requests if necessary. Index techniques are widely used in broadcast organization for mobile clients to locate data of interest precisely [3,8,10] and thus may be a good candidate to solve the second problem. However, existing index techniques assume that the contents of data broadcast is known in advance, which is not suitable for MRTB due to the dynamic change of contents in NV and OD. Therefore, in the following section we will adapt existing index techniques to MRTB by certain enhancements. Similar to [10], we assume a B-tree structure for the index. For each broadcast cycle, only the contents of BOS, i.e., all data items excluding NV and OD, is used to construct the index, which avoids the difficulty and complexity of index dynamic generation. The whole index consists of a series of index entries and other special attached information. Each index entry consists of a 2-tuple <K, Pos>, where K is the key value of corresponding data item; Pos is the relative position of the data item in BOS. Each data item in data broadcast consists of a 4-tuple <K, Pos, Offset, Content >, where K is the key value of the data item; for data items not within NV and OD, Pos is equal to its relative position in the broadcast schedule and Offset is equal to 0; for data items within NV and OD, Pos is equal to the Pos value of the last data item in the preceding consistency interval and Offset is equal to its relative position in NV and OD; Content is composed of the other fields of the data item. To determine the length of NV and OD, the estimation values of the update rate at the server, denoted by UpdateRate, and the proportion of BOD to BOS, denoted by Ratio, are included in the index. UpdateRate can be the average of update rates in last several broadcast cycles or other meaningful estimations in terms of practical application scenarios. In addition, the length of BOS, denoted by N, is also attached in the index. Based on above index structure and attached information, for any read opera-

7 tion issued by read-only transactions, say r(d), the time elapsed from the read operation begins to the desired data items appears can be got by equation 1 (Note that in this paper time is measured in terms of the time unit for broadcasting a single data item). NODP(d) = (N+ IPos -Pos-Offset) MOD N (1+ UpdateRate + Ratio) (1) where Pos and Offset are the corresponding values of the data item being broadcasted when the read operation begins; IPos is the Pos value of the needed data item got by index searching. MOD is the modulus operation. By comparing NODP(d) and d s deadline we will know whether the needed data item may appear in time. However, read-only transactions often have more than one read operations. Thus, the transaction deadline should be assigned to all data items of interest. In MRTB we use the serial assignment policy, i.e., dividing the remaining execution time of a read-only transaction equally among all pending read operations. The deadline of each data item can be determined according to equation 2. DL(d i ) = (Deadline - Current_Time)/(NoQueries - i +1) (2) where DL(d i ) is deadline of the i th data item of a read-only transaction; Deadline is the deadline of the read-only transaction; Current_Time is the time now; NoQueries is the number of read operations of the read-only transaction. Suppose a read-only transaction initiates a read operation, say r(d i ), if DL(d i ) is bigger than NODP(d i ) the transaction may wait the appearance of the desired data item on the channel. Otherwise, a data request will be generated. In the mobile support station the data requests are queued and processed according to EDF scheduling policy [12]. The detailed implementation of MRTB protocol is depicted in Fig. 1 and Fig Performance Evaluation Our simulation model is similar to the one presented in [4]. There are NoItems data items in the database and the broadcast server periodically broadcasts them to a large population of mobile clients. To simplify the analysis and implementation, we evaluate these update dissemination protocols (MVB, IM, RTB and MRTB) combined with the flat scheduling algorithm. The bandwidth proportion of BOD to BOS is Ratio. Index is broadcast NoIndexes times per broadcast cycle, which is used for readonly transactions to determine the accurate position of needed data items and judge when to send data requests. Update transactions at the server are generated per UpdateInterval and their update operations follow a Zipf distribution with parameter θ u. The update distribution is across the range 1 to UpdateRange. The length of consistency intervals is ConsistencyInterval. The basic time unit in our simulation is the time used to broadcast a single data item. The client simulator initiates a read-only transaction per ThinkInterval. Each readonly transaction has NoQueries read operations. The deadline of read-only transaction

8 is equal to CurrentTime + V NoQueries, where V is a value randomly selected between MinLaxity and MaxLaxity. If a read-only transaction has to restart due to inconsistent read, it can continue to execute as long as current time is no larger than its deadline. The read operations of read-only transactions access data items from the range 1 to ReadRange. The access probabilities follow a Zipf distribution with a parameter θ r. The cache size in the client is CacheSize and cache replacement policy is LRU. If data items are updated, the corresponding cache entries are invalidated and subsequently autoperfetched. The performance metrics are the miss rate and the system staleness. The main parameters and the baseline values are summarized in Table 1. Procedure GeneratingBroadcastProgram(Update_Set, k) Input : Update_Set is the set of identifiers of data updated in the preceding consistency interval k is the length of consistency intervals of the choosen updates dissemination protocol 1: while (true) /*Each while-loop accomplishes the data dissemination of one consistency interval*/ 2: Temp = Update_Set; 3: Update_Set = φ; 4: if (Temp!= φ) then 5: broadcast invalidation report in terms of data items in Temp; 6: broadcast the new values of data items in Temp; 7: endif 8: broadcast k Ratio data items according to the data requests queue and EDF scheduling policy; 9: broadcast k data items by the broadcast scheduling algorithm; 10: endwhile Fig. 1. Server-side protocol of MRTB Procedure DataAcquire(d i, Read_Set) Input: d i is the i th data item needed by the transaction in execution Read_Set is the read set of the transaction in execution 1: if (d i is in local cache) then 2: Add d i into Read_Set of the transaction that issues the read operation; 3: else 4: Listen to the data broadcast; 5: Read current broadcasted data item and get its (Pos, Offset); 6: Search the index and locate d i 's relative position IPos; 7: DL(d i ) = (Deadline - Current_Time)/(NoQueries - i +1); 8: NODP(d i ) = (N+ IPos -Pos-Offset) MOD N (1+ UpdateRate + Ratio); 9: if ( NODP(d i ) > DL(d i )) then 10: Send a data request to the broadcast server; 11: else 12: if (it is time to receive IR) then 13: if (data items in Read_Set are found in IR) then 14: Restart the transaction and re-read data items from local cache and NV; 15: endif 16: else 17: if (d i appears) then 18: Read d i and add it into Read_Set; 19: endif 20: endif 21: endif 22: endif Fig. 2. Client-side protocol of MRTB

9 Table 1. Parameters and baseline values Server Parameters NoItems 1000 UpdateRange 1000 UpdateInterval 40 ConsistencyInterval 200 Ratio 0.1 NoIndexes 5 θ u 0.9 Client Parameters ReadRange 1000 ThinkInterval 4 NoQueries 4 MinLaxity 500 MaxLaxity 1000 CacheSize 125 θ r 0.9 Experiment 1: We change UpdateInterval to compare the performance metrics of MVB, IM, RTB and MRTB under different update rate. The number of versions for MVB is 2. Restart Rate % MVB UpdateInterval IM RTB Fig. 3. The restart rate comparison In Fig.3 the restart rate of several protocols are illustrated. The restart rate of MRTB is not depicted because it is similar to that of RTB. From Fig. 3 we can see that the restart rates of these three protocols all decrease with the reduction of the update rate. RTB has the highest restart rate due to the shortest consistency intervals and strict restart rules. MVB owns the lowest one since it allows transactions to read stale versions of data. Because the number of versions for MVB is 2, there are still probabilities for transactions to restart due to inconsistent read, which is especially obvious when the update rate is high. Miss Rate % MVB IM RTB MRTB UpdateInterval Fig. 4. The miss rate comparison The miss rates of these four protocols are compared in Fig. 4. IM has the highest one due to its highest restart rate and the lack of IUDP. Although the restart rate of RTB is higher than those of the others, the shortened waiting time of restarted transactions

10 thanks to IUDP leads to its better performance than IM. Compared with MVB, the miss rate of RTB is higher due to its high restart rate when the update rate is high. While with the decrease of the update rate, the difference of the miss rates between RTB and MVB diminishes gradually. Since MRTB can meet more transactions with short deadlines through mixed broadcast policy, it performs best. System Staleness % MVB IM RTB UpdateInterval Fig. 5. The system staleness comparison The system staleness of MVB, IM and RTB are depicted in Fig.5. This metric of MRTB is not given since it is similar to that of RTB. The system staleness of all three protocols decreases with the reduction of the update rate. MVB has the highest one because it allows transactions to read stale versions of data. Owing to the invalidation method, the metric of IM and RTB is observably better than that of MVB. Compared with IM, RTB has a better performance since the shorter length of consistency intervals further decreases the probability of reading outdated data. Because transactions begins and commits during one consistency interval still may read outdated data, the system staleness of RTB is not equal to 0. Experiment 2: In this experiment we change the system workload and the bandwidth ratio of BOD to BOS to observe the variation of performance metrics for RTB and MRTB. 50 Miss Rate % MRTB(CI = 5) MRTB(CI = 40) RTB(CI = 5) RTB(CI = 40) ThinkInterval Fig. 6. The miss rate comparison In Fig.6 the miss rates of RTB and MRTB are illustrated under different values of ThinkInterval. As ThinkInterval is across the range from 8 to , the amount of data needed by read-only transactions changes from 0.5 to 6 times as many as the

11 amount of data broadcast, i.e., the system workload increases by degrees. From Fig.6 we can see that with the increase of the system workload, the miss rate of MRTB increases accordingly due to the limited bandwidth of BOD. But it does not exceed that of RTB under the same update rate. 50 Miss Rate % MRTB(500,1000) MRTB(300,600) MRTB(800,1200) Ratio Fig.7. The miss rate comparison Fig.7 illustrates the miss rate of MRTB with the variation of Ratio under different transaction laxities. From Fig.7 we can see that the miss rate does not constantly decrease with the increase of on-demand bandwidth but ascends slightly after Ratio exceeds one critical point. Reason for this phenomenon may be that the increase of bandwidth for BOD results in the longer broadcast cycle, which in turn leads to transactions that can get their needed data through BOS before now have to acquire data from BOD. When the increasing speed of data requests becomes larger than that of bandwidth for BOD, the miss rate may drop instead of increasing constantly. At the same time, the transaction laxities also have an impact on the critical point. The shorter the transaction laxities are, the earlier the critical point emerges. 5 Conclusion and Future Work Data broadcast has got lots of attentions of relevant researcher due to its scalability and bandwidth effectiveness for disseminating a large volume of data to numerous mobile clients. In this paper, we study the problem of providing consistent data to read-only transactions in real-time data broadcast environment. The main contributions of this paper include the following. First, we formally define the performance objectives based on the detailed analysis of update dissemination protocols for readonly transaction processing in real-time data broadcast environment. Next, a new updates dissemination protocol called mixed real-time data broadcast is proposed. Finally, extensive simulation experiments are implemented and numerical results show that MRTB has better performance compared with existing updates dissemination protocols. The future emphasis of our research is the design and evaluation of more flexible and adaptive bandwidth allocation algorithm suitable for the proposed updates dissemination protocol.

12 Acknowledgements The work in this paper was partially supported by the National Nature Science Foundation under grant and SRF for ROCS, SEM References 1. Acharya, S., Franklin, M., Zdonik, S.: Disseminating updates on broadcast disks. Proceedings of the 22nd VLDB Conference, Sep. (1996) Acharya, S., Franklin, M., Zdonik, S.: Balancing push and pull for data broadcast. Proceedings of ACM SIGMOD, May (1997) Datta, A., Celik, A., Kim, J., VanderMeer, D.E.: Adaptive broadcast protocol to support power conservant retrieval by mobile users. Proceedings of International Conference on Data Engineering, Sep. (1997) Pitoura, E., Chrysanthis, P.K.: Multiversion data broadcast. IEEE Transactions on Computers,Oct. (2002) Pitoura, E., Chrysanthis, P.K.: Exploiting versions for handling updates in broadcast disks. Proceedings of Very Large Data Base Conference, Sept. (1999) Fernandez, J., Ramamritham, K.; Adaptive dissemination of data in real-time asymmetric communication environments. Proceedings of Euromicro Conference on Real-Time Systems, Jun. (1999) Shanmugasundaram, J., Nithrakashyap, A., Sivasankaran, R., Ramamritham, K.: Efficient concurrency control for broadcast environments. Proceedings of ACM SIGMOD International Conference on Management of Data, Jun. (1999) Hu, Q., Lee, D.L., Lee, W.C.: A comparison of indexing methods for data broadcast on the air. Proceedings of the 12th International Conference on Information Networking, Jan. (1998) Lam, K.Y., Kuo, T.W., Tsang, W.H., Law, C.K.: Concurrency control in mobile distributed real-time database systems. Information Systems,vol.25, no.4 (2000) Imielinski, T., Viswanathan, S., Badrinath, B.R.: Data on air: organization and access. IEEE TKDE, vol.9, no.3 (1994) Kayan, E., Ulusoy, O.: Real-time transaction management in mobile computing systems. Proceedings of the Sixth International Conference on Database Systems for Advanced Applications, Apr. (1999) Bowen, T., Gopal, G., Herman, G., Hickey, T., Lee, K., Mansfield, W., Raitz, J.,Weinrib, A.: The datacycle architecture. Comm. ACM, vol. 35, no. 12 (1992) Xuan, P., Gonzalez, O., Fernandez, J., Ramamritham, K.: Broadcast on demand: efficient and timely dissemination of data in mobile environments. Proceedings of the Third IEEE Real-Time Technology Application Symposium, Jun. (1997) Lee, G.L., Lo, S.C., Chen, Arbee L.P.: Data allocation on wireless broadcast channels for efficient query processing. IEEE Transaction on Computers, vol.51, no.10 (2002)

Multiversion Data Broadcast

Multiversion Data Broadcast 1224 IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 10, OCTOBER 2002 Multiversion Data Broadcast Evaggelia Pitoura, Member, IEEE Computer Society, and Panos K. Chrysanthis, Member, IEEE Abstract Recently,

More information

Project Report, CS 862 Quasi-Consistency and Caching with Broadcast Disks

Project Report, CS 862 Quasi-Consistency and Caching with Broadcast Disks Project Report, CS 862 Quasi-Consistency and Caching with Broadcast Disks Rashmi Srinivasa Dec 7, 1999 Abstract Among the concurrency control techniques proposed for transactional clients in broadcast

More information

Quasi-consistency and Caching with Broadcast Disks

Quasi-consistency and Caching with Broadcast Disks Quasi-consistency and Caching with Broadcast Disks Rashmi Srinivasa and Sang H. Son Department of Computer Science University of Virginia Charlottesville, VA {rashmi, son}@cs.virginia.edu Abstract. The

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

Reading Temporally Consistent Data in Broadcast Disks

Reading Temporally Consistent Data in Broadcast Disks Reading Temporally Consistent Data in Broadcast Disks Victor C.S. Lee Joseph K. Ng Jo Y. P. Chong Kwok-wa Lam csvlee@cityu.edu.hk jng@comp.hkbu.edu.hk csleric@cityu.edu.hk Department of Computer Science,City

More information

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information

More information

Dynamic Broadcast Scheduling in DDBMS

Dynamic Broadcast Scheduling in DDBMS Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research

More information

Data Access on Wireless Broadcast Channels using Keywords

Data Access on Wireless Broadcast Channels using Keywords Data Access on Wireless Broadcast Channels using Keywords Mr. Vijaykumar Mantri 1, Mr. Nagaraju A 2 Dept of IT, Padmasri Dr. B. V. Raju Institute of Technology, Narsapur, Dist.Medak, Andhra Pradesh, India.

More information

CERIAS Tech Report Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien

CERIAS Tech Report Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien CERIAS Tech Report 2003-56 Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien Center for Education and Research Information Assurance

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimal Round

More information

Efficient Priority Assignment Policies for Distributed Real-Time Database Systems

Efficient Priority Assignment Policies for Distributed Real-Time Database Systems Proceedings of the 7 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 7 7 Efficient Priority Assignment Policies for Distributed Real-Time

More information

Scalable Processing of Read-Only Transactions in Broadcast Push

Scalable Processing of Read-Only Transactions in Broadcast Push Scalale Processing of Read-Only Transactions in Broadcast Push Evaggelia Pitoura Department of Computer Science University of Ioannina, Greece pitoura@cs.uoi.gr Panos K. Chrysanthis Department of Computer

More information

Efficient validation of mobile transactions in wireless environments q

Efficient validation of mobile transactions in wireless environments q The Journal of Systems and Software 69 (2004) 183 193 www.elsevier.com/locate/jss Efficient validation of mobile transactions in wireless environments q Victor C.S. Lee a, *, Kwok Wa Lam a, Tei-Wei Kuo

More information

Pull vs. Hybrid: Comparing Scheduling Algorithms for Asymmetric Time-Constrained Environments

Pull vs. Hybrid: Comparing Scheduling Algorithms for Asymmetric Time-Constrained Environments Pull vs. Hybrid: Comparing Scheduling Algorithms for Asymmetric Time-Constrained Environments Jesus Fernandez-Conde and Daniel Mozos Department of Computer Architecture Universidad Complutense de Madrid,

More information

Autonomous Transaction Processing Using Data Dependency in Mobile Environments Λ

Autonomous Transaction Processing Using Data Dependency in Mobile Environments Λ Autonomous Transaction Processing Using Data Dependency in Mobile Environments Λ IlYoung Chung, 1y Bharat Bhargava, 1 Malika Mahoui, 2 and Leszek Lilien 1 1 Department of Computer Sciences and Center for

More information

Energy-Efficient Mobile Cache Invalidation

Energy-Efficient Mobile Cache Invalidation Distributed and Parallel Databases 6, 351 372 (1998) c 1998 Kluwer Academic Publishers. Manufactured in The Netherlands. Energy-Efficient Mobile Cache Invalidation KUN-LUNG WU, PHILIP S. YU AND MING-SYAN

More information

Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System

Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing System Location Database Clustering to Achieve Location Management Time Cost Reduction in A Mobile Computing ystem Chen Jixiong, Li Guohui, Xu Huajie, Cai Xia*, Yang Bing chool of Computer cience & Technology,

More information

Hybrid Cooperative Caching in a Mobile Environment

Hybrid Cooperative Caching in a Mobile Environment Hybrid Cooperative Caching in a Mobile Environment Hong Va Leong 1, Chi-yin Chow 2 1 Department of Computing, The Hong Kong Polytechnic University Hong Kong cshleong@comp.polyu.edu.hk 2 Department of Computing

More information

Data Indexing for Heterogeneous Multiple Broadcast Channel

Data Indexing for Heterogeneous Multiple Broadcast Channel Data Indexing for Heterogeneous Multiple Broadcast Channel Andrew Y. Ho and Dik Lun Lee Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Email:

More information

Transaction Processing in Mobile Database Systems

Transaction Processing in Mobile Database Systems Ashish Jain* 1 http://dx.doi.org/10.18090/samriddhi.v7i2.8631 ABSTRACT In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore,

More information

A Data Centered Approach for Cache Partitioning in Embedded Real- Time Database System

A Data Centered Approach for Cache Partitioning in Embedded Real- Time Database System A Data Centered Approach for Cache Partitioning in Embedded Real- Time Database System HU WEI CHEN TIANZHOU SHI QINGSONG JIANG NING College of Computer Science Zhejiang University College of Computer Science

More information

A Data Centered Approach for Cache Partitioning in Embedded Real- Time Database System

A Data Centered Approach for Cache Partitioning in Embedded Real- Time Database System A Data Centered Approach for Cache Partitioning in Embedded Real- Time Database System HU WEI, CHEN TIANZHOU, SHI QINGSONG, JIANG NING College of Computer Science Zhejiang University College of Computer

More information

DB2 Lecture 10 Concurrency Control

DB2 Lecture 10 Concurrency Control DB2 Lecture 10 Control Jacob Aae Mikkelsen November 28, 2012 1 / 71 Jacob Aae Mikkelsen DB2 Lecture 10 Control ACID Properties Properly implemented transactions are commonly said to meet the ACID test,

More information

4. Data Transmitting Agent based strategy for

4. Data Transmitting Agent based strategy for 120 Chapter 4 4. Data Transmitting Agent based strategy for Effective Cache Consistency 4.1 Architecture of Multicast-Data Dissemination Model Using Data Transmitting Agent The architecture of a mobile

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Efficient Remote Data Access in a Mobile Computing Environment

Efficient Remote Data Access in a Mobile Computing Environment This paper appears in the ICPP 2000 Workshop on Pervasive Computing Efficient Remote Data Access in a Mobile Computing Environment Laura Bright Louiqa Raschid University of Maryland College Park, MD 20742

More information

Etsuko Yajimay Takahiro Haraz Masahiko Tsukamotoz Shojiro Nishioz. ysales Department, Tokyo Oce, FM Osaka Co., Ltd.

Etsuko Yajimay Takahiro Haraz Masahiko Tsukamotoz Shojiro Nishioz. ysales Department, Tokyo Oce, FM Osaka Co., Ltd. Scheduling and Caching Strategies for Correlated Data in Push-based Information Systems 3 Etsuko Yajimay Takahiro Haraz Masahiko Tsukamotoz Shojiro Nishioz ysales Department, Tokyo Oce, FM Osaka Co., Ltd.

More information

Performance Analysis of Virtual Time Optimistic Transaction Processing

Performance Analysis of Virtual Time Optimistic Transaction Processing Performance Analysis of Virtual Time Optimistic Transaction Processing Cong Liu 1, Wei Huang 2, Zhiguo Zhang 1 1 Department of Computer Science, Information Science & Technology College, Sun Yat-sen University,

More information

Broadcast Disks: Scalable solution for an asymmetric environment

Broadcast Disks: Scalable solution for an asymmetric environment Broadcast Disks: Scalable solution for an asymmetric environment Byungho Lee Computer Science & Engineering, University of Texas at Arlington blee@cse.ute.edu Abstract As mobile computing gains more popularity,

More information

Data Dissemination in Mobile Computing Environments (2)

Data Dissemination in Mobile Computing Environments (2) Data Dissemination in Mobile Computing Environments (2) Sungwon Jung Dept. of Computer Science and Engineering Sogang University Seoul, Korea Email : jungsung@sogang.ac.kr Indexing Techniques for Broadcast

More information

On Improving the Performance of Cache Invalidation in Mobile Environments

On Improving the Performance of Cache Invalidation in Mobile Environments Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO

More information

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University

More information

Evaluation of a Broadcast Scheduling Algorithm

Evaluation of a Broadcast Scheduling Algorithm Evaluation of a Broadcast Scheduling Algorithm Murat Karakaya 1 and Özgür Ulusoy2 1 Department of Technical Sciences Turkish Land Forces Academy, Ankara 06100, Turkey 2 Department of Computer Engineering

More information

Periodic Scheduling in On-Demand Broadcast System

Periodic Scheduling in On-Demand Broadcast System Periodic Scheduling in On-Demand Broadcast System Nitin Prabhu, Vijay Kumar SCE, Computer Networking University of Missouri-Kansas City Kansas City, MO 64110 npp21c (kumarv)@umkc.edu Indrakshi Ray Computer

More information

A Hybrid Data Delivery Method of Data Broadcasting and On-demand Wireless Communication

A Hybrid Data Delivery Method of Data Broadcasting and On-demand Wireless Communication Vol. 47 No. SIG 19(TOD 32) IPSJ Transactions on Databases Dec. 2006 Regular Paper A Hybrid Data Delivery Method of Data Broadcasting and On-demand Wireless Communication Jing Cai, Tsutomu Terada, Takahiro

More information

Resolving Executing Committing Conflicts in Distributed Real-time Database Systems

Resolving Executing Committing Conflicts in Distributed Real-time Database Systems Resolving Executing Committing Conflicts in Distributed Real-time Database Systems KAM-YIU LAM 1,CHUNG-LEUNG PANG 1,SANG H. SON 2 AND JIANNONG CAO 3 1 Department of Computer Science, City University of

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Maintaining Mutual Consistency for Cached Web Objects

Maintaining Mutual Consistency for Cached Web Objects Maintaining Mutual Consistency for Cached Web Objects Bhuvan Urgaonkar, Anoop George Ninan, Mohammad Salimullah Raunak Prashant Shenoy and Krithi Ramamritham Department of Computer Science, University

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Real-Time Scheduling of Sensor-Based Control Systems

Real-Time Scheduling of Sensor-Based Control Systems In Proceedings of Eighth IEEE Workshop on Real-Time Operatings Systems and Software, in conjunction with 7th IFAC/IFIP Workshop on Real-Time Programming, Atlanta, GA, pp. 44-50, May 99. Real-Time Scheduling

More information

Mining Frequent Itemsets for data streams over Weighted Sliding Windows

Mining Frequent Itemsets for data streams over Weighted Sliding Windows Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology

More information

A Novel Replication Strategy for Efficient XML Data Broadcast in Wireless Mobile Networks

A Novel Replication Strategy for Efficient XML Data Broadcast in Wireless Mobile Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 32, 309-327 (2016) A Novel Replication Strategy for Efficient XML Data Broadcast in Wireless Mobile Networks ALI BORJIAN BOROUJENI 1 AND MEGHDAD MIRABI 2

More information

Kanban Size and its Effect on JIT Production Systems

Kanban Size and its Effect on JIT Production Systems Kanban Size and its Effect on JIT Production Systems Ing. Olga MAŘÍKOVÁ 1. INTRODUCTION Integrated planning, formation, carrying out and controlling of tangible and with them connected information flows

More information

Signature caching techniques for information filtering in mobile environments

Signature caching techniques for information filtering in mobile environments Wireless Networks 5 1999) 57 67 57 Signature caching techniques for information filtering in mobile environments Wang-Chien Lee a, and Dik Lun Lee b a GTE Laboratories Incorporated, 40 Sylvan Road, Waltham,

More information

RECENT advances in the development of portable computers

RECENT advances in the development of portable computers 1196 IEEE TRANSACTIONS ON COMPUTERS, VOL. 51, NO. 10, OCTOBER 2002 On Transaction Processing with Partial Validation and Timestamp Ordering in Mobile Broadcast Environments Victor C.S. Lee, Member, IEEE,

More information

REAL-TIME DATABASES (RTDB)

REAL-TIME DATABASES (RTDB) REAL-TIME DATABASES (RTDB) Prof. Fabio A. Schreiber Politecnico di Milano REAL-TIME DATABASE SYSTEMS DATABASE SYSTEMS WHICH MANAGE TIME CONSTRAINED DATA SPECIFIC TIME INTERVALS FOR DATA VALIDITY VALIDITY

More information

An Adaptive Routing Scheme for Wireless Mobile Computing

An Adaptive Routing Scheme for Wireless Mobile Computing An Adaptive Routing Scheme for Wireless Mobile Computing Ruixi Yuan C&C Software Technology Center, NEC Systems Laboratory, Inc. 1901 Gateway Drive, Irving, TX 75038 yuan@syl.dl.nec.com Abstract This paper

More information

CPET 565/CPET 499 Mobile Computing Systems. Lecture 8. Data Dissemination and Management. 2 of 3

CPET 565/CPET 499 Mobile Computing Systems. Lecture 8. Data Dissemination and Management. 2 of 3 CPET 565/CPET 499 Mobile Computing Systems Lecture 8 and Management 2 of 3 Based on the Text used in the course: Fundamentals of Mobile & Pervasive Computing, 2005, by Frank Adelstein, et. al, from McGraw-Hill

More information

SLA-Aware Adaptive Data Broadcasting in Wireless Environments. Adrian Daniel Popescu

SLA-Aware Adaptive Data Broadcasting in Wireless Environments. Adrian Daniel Popescu SLA-Aware Adaptive Data Broadcasting in Wireless Environments by Adrian Daniel Popescu A thesis submitted in conformity with the requirements for the degree of Masters of Applied Science Graduate Department

More information

Multimedia Systems 2011/2012

Multimedia Systems 2011/2012 Multimedia Systems 2011/2012 System Architecture Prof. Dr. Paul Müller University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de Sitemap 2 Hardware

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

Cache Replacement Strategies for Scalable Video Streaming in CCN

Cache Replacement Strategies for Scalable Video Streaming in CCN Cache Replacement Strategies for Scalable Video Streaming in CCN Junghwan Lee, Kyubo Lim, and Chuck Yoo Dept. Computer Science and Engineering Korea University Seoul, Korea {jhlee, kblim, chuck}@os.korea.ac.kr

More information

Fault tolerant scheduling in real time systems

Fault tolerant scheduling in real time systems tolerant scheduling in real time systems Afrin Shafiuddin Department of Electrical and Computer Engineering University of Wisconsin-Madison shafiuddin@wisc.edu Swetha Srinivasan Department of Electrical

More information

ISSN 2319-8885 Vol.03,Issue.35 November-2014, Pages:6974-6978 www.ijsetr.com A Caching Scheme in Location Based Application SANDI WINN AYE 1, ZAR ZAR WINT 2 1 Dept of Information and Communication Technology,

More information

Related Work The Concept of the Signaling. In the mobile communication system, in addition to transmit the necessary user information (usually voice

Related Work The Concept of the Signaling. In the mobile communication system, in addition to transmit the necessary user information (usually voice International Conference on Information Science and Computer Applications (ISCA 2013) The Research and Design of Personalization preferences Based on Signaling analysis ZhiQiang Wei 1,a, YiYan Zhang 1,b,

More information

A Cost-Efficient Scheduling Algorithm of On-Demand Broadcasts

A Cost-Efficient Scheduling Algorithm of On-Demand Broadcasts Wireless Networks 9, 239 247, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. A Cost-Efficient Scheduling Algorithm of On-Demand Broadcasts WEIWEI SUN, WEIBIN SHI and BOLE SHI Department

More information

Implementation and modeling of two-phase locking concurrency control a performance study

Implementation and modeling of two-phase locking concurrency control a performance study INFSOF 4047 Information and Software Technology 42 (2000) 257 273 www.elsevier.nl/locate/infsof Implementation and modeling of two-phase locking concurrency control a performance study N.B. Al-Jumah a,

More information

Scheduling On-Demand Broadcast Items

Scheduling On-Demand Broadcast Items Scheduling On-Demand Broadcast Items Miao Wang mwang@inf.fu-berlin.de Advisor: Ilias Michalarias Freie Universität Berlin, Institute for Computer Science Abstract. The demand for various information delivery

More information

A Transaction Processing Technique in Real-Time Object- Oriented Databases

A Transaction Processing Technique in Real-Time Object- Oriented Databases 122 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008 A Transaction Processing Technique in Real-Time Object- Oriented Databases Woochun Jun Dept. of Computer

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Intelligent Data Receiver Mechanism for Wireless Broadcasting System

Intelligent Data Receiver Mechanism for Wireless Broadcasting System Intelligent Data Receiver Mechanism for Wireless Broadcasting System Lien-Fa Lin 1 and Yuan-Ko Huang 2 Department of Information Communication of Kao Yuan University 1,2 lienfa@cc.kyu.edu.tw 1, huangyk@cc.kyu.edu.tw

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

Adaptive Aggregation Scheduling Using. Aggregation-degree Control in Sensor Network

Adaptive Aggregation Scheduling Using. Aggregation-degree Control in Sensor Network Contemporary Engineering Sciences, Vol. 7, 2014, no. 14, 725-730 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4681 Adaptive Aggregation Scheduling Using Aggregation-degree Control in

More information

Design of a Real-Time Trader for Mobile Objects in Open Distributed Environments

Design of a Real-Time Trader for Mobile Objects in Open Distributed Environments Design of a Real-Time for Mobile Objects in Open Distributed Environments Song-yi Yi, Heonshik Shin Department of Computer Engineering Seoul National University Seoul 151-742, Korea fyis, shinhsg@ce2.snu.ac.kr

More information

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. # 20 Concurrency Control Part -1 Foundations for concurrency

More information

Improving object cache performance through selective placement

Improving object cache performance through selective placement University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Improving object cache performance through selective placement Saied

More information

Real-time Optimistic Concurrency Control based on Transaction Finish Degree

Real-time Optimistic Concurrency Control based on Transaction Finish Degree Journal of Computer Science 1 (4): 471-476, 2005 ISSN 1549-3636 Science Publications, 2005 Real-time Optimistic Concurrency Control based on Transaction Finish Degree 1 Han Qilong, 1,2 Hao Zhongxiao 1

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Chapter 4: Distributed Systems: Replication and Consistency. Fall 2013 Jussi Kangasharju

Chapter 4: Distributed Systems: Replication and Consistency. Fall 2013 Jussi Kangasharju Chapter 4: Distributed Systems: Replication and Consistency Fall 2013 Jussi Kangasharju Chapter Outline n Replication n Consistency models n Distribution protocols n Consistency protocols 2 Data Replication

More information

Maintaining Temporal Consistency: Issues and Algorithms

Maintaining Temporal Consistency: Issues and Algorithms Maintaining Temporal Consistency: Issues and Algorithms Ming Xiong, John A. Stankovic, Krithi Ramamritham, Don Towsley, Rajendran Sivasankaran Department of Computer Science University of Massachusetts

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

A Modified Maximum Urgency First Scheduling Algorithm for Real-Time Tasks

A Modified Maximum Urgency First Scheduling Algorithm for Real-Time Tasks Vol:, o:9, 2007 A Modified Maximum Urgency irst Scheduling Algorithm for Real-Time Tasks Vahid Salmani, Saman Taghavi Zargar, and Mahmoud aghibzadeh International Science Index, Computer and Information

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.

Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics

More information

arxiv: v2 [cs.ni] 23 May 2016

arxiv: v2 [cs.ni] 23 May 2016 Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science

More information

Caching video contents in IPTV systems with hierarchical architecture

Caching video contents in IPTV systems with hierarchical architecture Caching video contents in IPTV systems with hierarchical architecture Lydia Chen 1, Michela Meo 2 and Alessandra Scicchitano 1 1. IBM Zurich Research Lab email: {yic,als}@zurich.ibm.com 2. Politecnico

More information

Channel Reordering with Time-shifted Streams to Improve Channel Change Latency in IPTV Networks

Channel Reordering with Time-shifted Streams to Improve Channel Change Latency in IPTV Networks Channel Reordering with Time-shifted Streams to Improve Channel Change Latency in IPTV etworks Aytac Azgin, Member, IEEE, and Yucel Altunbasak, Member, IEEE Abstract In IPTV networks, channel change latency

More information

An Efficient Partition and Matching Algorithm for Query-Set-based. Broadcasting in Multiple Channel Mobile Environment

An Efficient Partition and Matching Algorithm for Query-Set-based. Broadcasting in Multiple Channel Mobile Environment An Efficient Partition and Matching Algorithm for Query-Set-based Broadcasting in Multiple Channel Mobile Environment Jing-Feng Lin, Guang-Ming Wu, and Derchian Tsaih 3 Department of Computer Science and

More information

RECENTLY, researches on gigabit wireless personal area

RECENTLY, researches on gigabit wireless personal area 146 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 55, NO. 2, FEBRUARY 2008 An Indexed-Scaling Pipelined FFT Processor for OFDM-Based WPAN Applications Yuan Chen, Student Member, IEEE,

More information

An Optimal Cache Replacement Policy for Wireless Data Dissemination under Cache Consistency

An Optimal Cache Replacement Policy for Wireless Data Dissemination under Cache Consistency An Optimal Cache Replacement Policy for Wireless Data Dissemination under Cache Consistency Jianliang Xu HK University of Science and Technology Clear Water Bay, HK xujl@cs.ust.hk Wang-Chien Lee Verizon

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Two-Version-Based Concurrency Control and Recovery in Real-Time Client/Server Databases

Two-Version-Based Concurrency Control and Recovery in Real-Time Client/Server Databases Two-Version-Based Concurrency Control and Recovery in Real-Time Client/Server Databases Tei-Wei Kuo, Yuan-Ting Kao, and Chin-Fu Kuo Department of Computer Science and Information Engineering National Taiwan

More information

Performance Evaluations and Estimations of Workload of On-Demand Updates in Soft Real-Time Systems

Performance Evaluations and Estimations of Workload of On-Demand Updates in Soft Real-Time Systems Performance Evaluations and Estimations of Workload of On-Demand Updates in Soft Real-Time Systems Thomas Gustafsson a,b and Jörgen Hansson b,c a School of Engineering, Jönköping University, Sweden b Department

More information

Towards Low-Redundancy Push-Pull P2P Live Streaming

Towards Low-Redundancy Push-Pull P2P Live Streaming Towards Low-Redundancy Push-Pull P2P Live Streaming Zhenjiang Li, Yao Yu, Xiaojun Hei and Danny H.K. Tsang Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology

More information

CPS352 Lecture - The Transaction Concept

CPS352 Lecture - The Transaction Concept Objectives: CPS352 Lecture - The Transaction Concept Last Revised March 3, 2017 1. To introduce the notion of a transaction and the ACID properties of a transaction 2. To introduce the notion of the state

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

A Privacy Preserving Model for Ownership Indexing in Distributed Storage Systems

A Privacy Preserving Model for Ownership Indexing in Distributed Storage Systems A Privacy Preserving Model for Ownership Indexing in Distributed Storage Systems Tiejian Luo tjluo@ucas.ac.cn Zhu Wang wangzhubj@gmail.com Xiang Wang wangxiang11@mails.ucas.ac.cn ABSTRACT The indexing

More information

CS352 Lecture - The Transaction Concept

CS352 Lecture - The Transaction Concept CS352 Lecture - The Transaction Concept Last Revised 11/7/06 Objectives: 1. To introduce the notion of a transaction and the ACID properties of a transaction 2. To introduce the notion of the state of

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Scheduling in Multiprocessor System Using Genetic Algorithms

Scheduling in Multiprocessor System Using Genetic Algorithms Scheduling in Multiprocessor System Using Genetic Algorithms Keshav Dahal 1, Alamgir Hossain 1, Benzy Varghese 1, Ajith Abraham 2, Fatos Xhafa 3, Atanasi Daradoumis 4 1 University of Bradford, UK, {k.p.dahal;

More information

Multi-path based Algorithms for Data Transfer in the Grid Environment

Multi-path based Algorithms for Data Transfer in the Grid Environment New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School

More information

A mining method for tracking changes in temporal association rules from an encoded database

A mining method for tracking changes in temporal association rules from an encoded database A mining method for tracking changes in temporal association rules from an encoded database Chelliah Balasubramanian *, Karuppaswamy Duraiswamy ** K.S.Rangasamy College of Technology, Tiruchengode, Tamil

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

A Distributed Air Index Based on Maximum Boundary Rectangle over Grid-Cells for Wireless Non-Flat Spatial Data Broadcast

A Distributed Air Index Based on Maximum Boundary Rectangle over Grid-Cells for Wireless Non-Flat Spatial Data Broadcast Sensors 2014, 14, 10619-10643; doi:10.3390/s140610619 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article A Distributed Air Index Based on Maximum Boundary Rectangle over Grid-Cells

More information