Please use this identifier to cite or link to this item: https://olympias.lib.uoi.gr/jspui/handle/123456789/11141
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPitoura, E.en
dc.contributor.authorBhargava, B.en
dc.date.accessioned2015-11-24T17:03:11Z-
dc.date.available2015-11-24T17:03:11Z-
dc.identifier.issn1041-4347-
dc.identifier.urihttps://olympias.lib.uoi.gr/jspui/handle/123456789/11141-
dc.rightsDefault Licence-
dc.subjectmobile computingen
dc.subjectconcurrency controlen
dc.subjectreplicationen
dc.subjectconsistencyen
dc.subjectdisconnected operationen
dc.subjecttransaction managementen
dc.subjectadaptabilityen
dc.subjectmobileen
dc.titleData consistency in intermittently connected distributed systemsen
heal.typejournalArticle-
heal.type.enJournal articleen
heal.type.elΆρθρο Περιοδικούel
heal.languageen-
heal.accesscampus-
heal.recordProviderΠανεπιστήμιο Ιωαννίνων. Σχολή Θετικών Επιστημών. Τμήμα Μηχανικών Ηλεκτρονικών Υπολογιστών και Πληροφορικήςel
heal.publicationDate1999-
heal.abstractMobile computing introduces a new form of distributed computation in which communication is most often intermittent, low-bandwidth, or expensive, thus providing only weak connectivity. In this paper, we present a replication scheme tailored for such environments. Bounded inconsistency is defined by allowing controlled deviation among copies located at weakly connected sites. A dual database interface is proposed that in addition to read and write operations with the usual semantics supports weak read and write operations. In contrast to the usual read and write operations that read consistent values and perform permanent updates, weak operations access only local and potentially inconsistent copies and perform updates that are only conditionally committed. Exploiting weak operations supports disconnected operation since mobile clients can employ them to continue to operate even white disconnected. The extended database interface coupled with bounded inconsistency offers a flexible mechanism for adapting replica consistency to the networking conditions by appropriately balancing the use of weak and normal operations. Adjusting the degree of divergence among copies provides additional support for adaptivity. We present transaction-oriented correctness criteria for the proposed schemes, introduce corresponding serializability-based methods, and outline protocols for their implementation. Then, some practical examples of their applicability are provided. The performance of the scheme is evaluated for a range of networking conditions and varying percentages of weak transactions by using an analytical model developed for this purpose.en
heal.journalNameIeee Transactions on Knowledge and Data Engineeringen
heal.journalTypepeer reviewed-
heal.fullTextAvailabilityTRUE-
Appears in Collections:Άρθρα σε επιστημονικά περιοδικά ( Ανοικτά)



This item is licensed under a Creative Commons License Creative Commons