Abstract
In this paper we propose Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different levels. Sufficient and complete tests proposed in the previous works together with the idea of caching relevant data items for checking the integrity constraints are adopted. This has improved the checking mechanism by preventing delays during the process of checking constraints and performing the update. Also, the 3-L model reduces the amount of data accessed given that much of the tasks are performed at the mobile host, and hence speeds up the checking process.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alwan, A.A., Ibrahim, H., Udzir, N.I.: Local Integrity Checking using Local Information in a Distributed Database. In: Proceedings of the 1st Aalborg University IEEE Student Paper Contest 2007 (AISPC 2007), Aalborg (2007)
Epfl, Grenoble, U., Inria-Nancy, Int-Evry, Montpellier, U., Paris, U., Versailles, U.: Mobile Databases: a Selection of Open Issues and Research Directions. SIGMOD Record 33, 78–83 (2004)
Gupta, A.: Partial Information Based Integrity Constraint Checking. PhD Thesis, Stanford University, USA (1994)
Hanandeh, F.A.H.: Integrity Constraints Maintenance for Parallel Databases. PhD Thesis, UPM, Malaysia (2006)
Ibrahim, H.: Checking Integrity Constraints – How it Differs in Centralized, Distributed and Parallel Databases. In: Proceedings of the Second International Workshop on Logical Aspects and Applications of Integrity Constraints (LAAIC 2006), Krakow, pp. 563–568 (2006)
Ibrahim, H., Gray, W.A., Fiddian, N.J.: Optimizing Fragment Constraints – A Performance Evaluation. International Journal of Intelligent Systems – Verification and Validation Issues in Databases, Knowledge-Based Systems, and Ontologies 16(3), 285–306 (2001)
Ken, C.K.L., Wang-Chien, L., Sanjay, M.: Pervasive Data Access in Wireless and Mobile Computing Environments. Journal of Wireless Communications and Mobile Computing (2006)
Madiraju, P., Sunderraman, R.: A Mobile Agent Approach for Global Database Constraint Checking. In: Proceedings of the ACM Symposium on Applied Computing (SAC 2004), Nicosia, pp. 679–683 (2004)
Martinenghi, D.: Advanced Techniques for Efficient Data Integrity Checking. PhD Thesis, Roskilde University (2005)
Mazumdar, S., Chrysanthis, P.K.: Localization of Integrity Constraints in Mobile Databases and Specification in PRO-MOTION. In: Proceedings of the Mobile Networks and Applications, pp. 481–490 (2004)
McCarroll, N.F.: Semantic Integrity Enforcement in Parallel Database Machines. PhD Thesis, University of Sheffield, UK (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ibrahim, H., Dzolkhifli, Z., Madiraju, P. (2008). A Model for Checking the Integrity Constraints of Mobile Databases. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems: OTM 2008 Workshops. OTM 2008. Lecture Notes in Computer Science, vol 5333. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88875-8_78
Download citation
DOI: https://doi.org/10.1007/978-3-540-88875-8_78
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88874-1
Online ISBN: 978-3-540-88875-8
eBook Packages: Computer ScienceComputer Science (R0)