<span>Managing data in a mobile computing environment invariably involves caching or replication. In many cases, a mobile device has access only to data that is stored locally, and much of that data arrives via replication from other devices, PCs, and services. Given portable devices with limited re
Data Management for Mobile Computing
โ Scribed by Evaggelia Pitoura, George Samaras (auth.)
- Publisher
- Springer US
- Year
- 1998
- Tongue
- English
- Leaves
- 158
- Series
- The Kluwer International Series on Advances in Database Systems 10
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Earth date, August 11, 1997 "Beam me up Scottie!" "We cannot do it! This is not Star Trek's Enterprise. This is early years Earth." True, this is not yet the era of Star Trek, we cannot beam captain James T. Kirk or captain Jean Luc Pickard or an apple or anything else anywhere. What we can do though is beam information about Kirk or Pickard or an apple or an insurance agent. We can beam a record of a patient, the status of an engine, a weather report. We can beam this information anywhere, to mobile workers, to field engineers, to a track loading apples, to ships crossing the Oceans, to web surfers. We have reached a point where the promise of information access anywhere and anytime is close to realization. The enabling technology, wireless networks, exists; what remains to be achieved is providing the infrastructure and the software to support the promise. Universal access and management of information has been one of the driving forces in the evolution of computer technology. Central computing gave the ability to perform large and complex computations and advanced information manipulation. Advances in networking connected computers together and led to distributed computing. Web technology and the Internet went even further to provide hyper-linked information access and global computing. However, restricting access stations to physical location limits the boundary of the vision.
โฆ Table of Contents
Front Matter....Pages i-ix
Introduction....Pages 1-14
Software Architectures....Pages 15-35
System-Level Support....Pages 37-70
Information Management....Pages 71-85
Location Management....Pages 87-110
Case Studies....Pages 111-126
Conclusions....Pages 127-135
Back Matter....Pages 137-152
โฆ Subjects
Data Structures, Cryptology and Information Theory; Computer Communication Networks; Information Storage and Retrieval; Memory Structures; Processor Architectures
๐ SIMILAR VOLUMES
<span>New technologies and computing methodologies are now used to address the existing issues of urban traffic systems. The development of computational intelligence methods such as machine learning and deep learning, enables engineers to find innovative solutions to guide traffic in order to reduc
Discover grid computing-how to successfully build, implement, and manage widely distributed computing architectureWith technology budgets under increasing scrutiny and system architecture becoming more and more complex, many organizations are rethinking how they manage and use technology. Keeping a
Discover grid computing-how to successfully build, implement, and manage widely distributed computing architectureWith technology budgets under increasing scrutiny and system architecture becoming more and more complex, many organizations are rethinking how they manage and use technology. Keeping a
Taking an in-depth look at the mobile communications ecosystem, this book covers the two key components, i.e., Network and End-User Devices, in detail. Within the network, the sub components of radio access network, transmission network, core networks, services and OSS are discussed; component level