Skip to main content

A Model for Checking the Integrity Constraints of Mobile Databases

  • Conference paper
On the Move to Meaningful Internet Systems: OTM 2008 Workshops (OTM 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5333))

  • 1239 Accesses

Abstract

In this paper we propose Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different levels. Sufficient and complete tests proposed in the previous works together with the idea of caching relevant data items for checking the integrity constraints are adopted. This has improved the checking mechanism by preventing delays during the process of checking constraints and performing the update. Also, the 3-L model reduces the amount of data accessed given that much of the tasks are performed at the mobile host, and hence speeds up the checking process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Alwan, A.A., Ibrahim, H., Udzir, N.I.: Local Integrity Checking using Local Information in a Distributed Database. In: Proceedings of the 1st Aalborg University IEEE Student Paper Contest 2007 (AISPC 2007), Aalborg (2007)

    Google Scholar 

  2. Epfl, Grenoble, U., Inria-Nancy, Int-Evry, Montpellier, U., Paris, U., Versailles, U.: Mobile Databases: a Selection of Open Issues and Research Directions. SIGMOD Record 33, 78–83 (2004)

    Article  Google Scholar 

  3. Gupta, A.: Partial Information Based Integrity Constraint Checking. PhD Thesis, Stanford University, USA (1994)

    Google Scholar 

  4. Hanandeh, F.A.H.: Integrity Constraints Maintenance for Parallel Databases. PhD Thesis, UPM, Malaysia (2006)

    Google Scholar 

  5. Ibrahim, H.: Checking Integrity Constraints – How it Differs in Centralized, Distributed and Parallel Databases. In: Proceedings of the Second International Workshop on Logical Aspects and Applications of Integrity Constraints (LAAIC 2006), Krakow, pp. 563–568 (2006)

    Google Scholar 

  6. Ibrahim, H., Gray, W.A., Fiddian, N.J.: Optimizing Fragment Constraints – A Performance Evaluation. International Journal of Intelligent Systems – Verification and Validation Issues in Databases, Knowledge-Based Systems, and Ontologies 16(3), 285–306 (2001)

    MATH  Google Scholar 

  7. Ken, C.K.L., Wang-Chien, L., Sanjay, M.: Pervasive Data Access in Wireless and Mobile Computing Environments. Journal of Wireless Communications and Mobile Computing (2006)

    Google Scholar 

  8. Madiraju, P., Sunderraman, R.: A Mobile Agent Approach for Global Database Constraint Checking. In: Proceedings of the ACM Symposium on Applied Computing (SAC 2004), Nicosia, pp. 679–683 (2004)

    Google Scholar 

  9. Martinenghi, D.: Advanced Techniques for Efficient Data Integrity Checking. PhD Thesis, Roskilde University (2005)

    Google Scholar 

  10. Mazumdar, S., Chrysanthis, P.K.: Localization of Integrity Constraints in Mobile Databases and Specification in PRO-MOTION. In: Proceedings of the Mobile Networks and Applications, pp. 481–490 (2004)

    Google Scholar 

  11. McCarroll, N.F.: Semantic Integrity Enforcement in Parallel Database Machines. PhD Thesis, University of Sheffield, UK (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ibrahim, H., Dzolkhifli, Z., Madiraju, P. (2008). A Model for Checking the Integrity Constraints of Mobile Databases. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems: OTM 2008 Workshops. OTM 2008. Lecture Notes in Computer Science, vol 5333. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88875-8_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88875-8_78

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88874-1

  • Online ISBN: 978-3-540-88875-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy