Cover image for Fundamentals of Pervasive Information Management Systems.
Fundamentals of Pervasive Information Management Systems.
Title:
Fundamentals of Pervasive Information Management Systems.
Author:
Kumar, Vijay.
ISBN:
9781118647691
Personal Author:
Edition:
2nd ed.
Physical Description:
1 online resource (391 pages)
Contents:
FUNDAMENTALS OF PERVASIVE INFORMATION MANAGEMENT SYSTEMS -- CONTENTS -- PREFACE -- ACKNOWLEDGMENTS -- 1 MOBILE DATABASE SYSTEM -- 1.1 INTRODUCTION -- 1.1.1 Mobile Database System Architecture -- 1.1.2 Data Distribution -- 1.1.3 Transaction Processing -- 1.1.4 Concurrency Control Mechanism -- 1.1.5 MDS Recovery -- 1.2 SUMMARY -- EXERCISES -- REFERENCES -- 2 MOBILE AND WIRELESS COMMUNICATION -- 2.1 INTRODUCTION -- 2.1.1 Mobility-The Most Desirable Environment -- 2.1.2 Fully Connected Information Space -- 2.2 TYPES OF MOBILITY -- 2.3 MOBILE AND WIRELESS COMMUNICATIONS -- 2.3.1 Radio Frequency: Spectrum and Band -- 2.3.2 Cellular Communication -- 2.4 CONTINUOUS CONNECTIVITY -- 2.4.1 Structure of a Channel -- 2.4.2 Absence of a Free Channel -- 2.4.3 Signal Fading -- 2.4.4 Frequency Reuse -- 2.4.5 PCS and GSM -- 2.4.6 PCS-Personal Communication Service -- 2.4.7 Interface -- 2.4.8 Call Processing -- 2.4.9 GSM-Global System for Mobile Communication -- 2.5 SUMMARY -- EXERCISES -- REFERENCES -- 3 LOCATION AND HANDOFF MANAGEMENT -- 3.1 INTRODUCTION -- 3.1.1 Location Management -- 3.1.2 Handoff Management -- 3.1.3 Roaming -- 3.2 SUMMARY -- EXERCISES -- REFERENCES -- 4 FUNDAMENTALS OF DATABASE PROCESSING -- 4.1 CONVENTIONAL DATABASE ARCHITECTURE -- 4.1.1 Database Partition and Distribution -- 4.2 DATABASE PROCESSING -- 4.2.1 Transaction Structure -- 4.3 SERIALIZATION OF TRANSACTIONS -- 4.3.1 Serializability-Based Correctness Criteria -- 4.3.2 Serializability Theory -- 4.3.3 Degree of Isolation -- 4.4 ADVANCED TRANSACTION MODELS -- 4.4.1 Nested Transaction Model -- 4.4.2 Saga -- 4.4.3 Cooperative Transaction -- 4.4.4 ConTract -- 4.4.5 Flex Transaction -- 4.5 SUMMARY -- EXERCISES -- REFERENCES -- 5 INTRODUCTION TO CONCURRENCY CONTROL MECHANISMS -- 5.1 INTRODUCTION -- 5.1.1 Ways of Locking Data Items -- 5.1.2 The Phantom Problem -- 5.1.3 Index Locking.

5.1.4 Multigranularity Locking -- 5.1.5 Nonlocking-Based Schemes -- 5.1.6 Mixed Approaches -- 5.1.7 Wound-Wait (WW) -- 5.1.8 Wait-Die (WD) -- 5.1.9 Multiversion Approach -- 5.1.10 Optimistic Concurrency Control Mechanisms -- 5.2 HEURISTIC APPROACH IN LOCKING SCHEMES -- 5.2.1 Cautious Waiting -- 5.2.2 Running Priority -- 5.2.3 Krishna -- 5.2.4 Two-Phase Locking for Distributed Database Systems -- 5.3 SUMMARY -- EXERCISES -- REFERENCES -- 6 EFFECT OF MOBILITY ON DATA PROCESSING -- 6.1 INTRODUCTION -- 6.2 EFFECT OF MOBILITY ON THE MANAGEMENT OF DATA -- 6.2.1 Data Fragmentation -- 6.2.2 Data Distribution -- 6.2.3 Location Dependent Data Distribution -- 6.2.4 Effect of Mobility on ACID Properties -- 6.3 SUMMARY -- EXERCISES -- REFERENCES -- 7 TRANSACTION MANAGEMENT IN MOBILE DATABASE SYSTEMS -- 7.1 MOBILE DATABASE SYSTEM -- 7.2 TRANSACTION EXECUTION IN MDS -- 7.2.1 Identification of Coordinator in MDS -- 7.2.2 Transaction Initiation -- 7.2.3 Transaction Execution -- 7.2.4 Coordinating Service -- 7.3 MOBILE TRANSACTION MODEL -- 7.3.1 Execution Model Based on ACID Transaction Framework -- 7.3.2 Execution Model with Reporting Transaction -- 7.3.3 Two-Level Consistency Model -- 7.3.4 Pro-Motion: Proactive Management of Mobile Transactions -- 7.4 PREWRITE TRANSACTION EXECUTION MODEL -- 7.4.1 Prewrite Execution in Mobile Database Systems -- 7.4.2 MDSTPM Transaction Execution Model -- 7.5 MOBILE TRANSACTION MODEL -- 7.5.1 HiCoMo: High Commit Mobile Transaction Model -- 7.5.2 Moflex Transaction Model -- 7.5.3 Kangaroo Mobile Transaction Model -- 7.5.4 Mobilaction-A Mobile Transaction Model -- 7.6 DATA CONSISTENCY IN INTERMITTENT CONNECTIVITY -- 7.7 THE CONSISTENCY MODEL -- 7.7.1 The Extended Database Operation Interface -- 7.7.2 Data Correctness -- 7.8 WEAK CONNECTIVITY OPERATION -- 7.8.1 Correctness Criterion -- 7.8.2 The Serialization Graph -- 7.8.3 Protocols.

7.9 A CONSISTENCY RESTORATION SCHEMA -- 7.9.1 Correctness Criterion -- 7.9.2 The Serialization Graph -- 7.10 DISCUSSION -- 7.11 RELATED WORK -- 7.12 CONCURRENCY CONTROL MECHANISM -- 7.12.1 Locking-Based CCMs -- 7.13 MULTIVERSION CONCURRENCY CONTROL MECHANISM FOR MOBILE DATABASE SYSTEMS -- 7.13.1 A Multiversion Mobile Transaction Execution Model -- 7.13.2 Management of Multiple Versions of Data Items -- 7.13.3 Locking Protocol -- 7.13.4 Constraints with Read and Write Operations -- 7.13.5 Rules for Terminating a Transaction -- 7.13.6 Comparison with Constrained Shared Locking Model -- 7.13.7 Formal Proof of Correctness -- 7.13.8 Proof of Correctness -- 7.13.9 CCM Based on Epsilon Serializability -- 7.13.10 Relationship with ESR -- 7.14 TRANSACTION COMMITMENT -- 7.14.1 Two-Phase Commit Protocol-Centralized 2PC -- 7.14.2 Node Failure and Timeout Action -- 7.14.3 Decentralized 2PC -- 7.14.4 Linear or Nested 2PC -- 7.15 COMMITMENT OF MOBILE TRANSACTIONS -- 7.15.1 Commit Protocols for Mobilaction -- 7.16 TRANSACTION COMMITMENT IN MOBILE DATABASE SYSTEMS -- 7.16.1 TCOT Steps-No Failure -- 7.16.2 Node Failure-Fragment Compensation -- 7.16.3 TCOT with Handoff -- 7.16.4 Special Cases -- 7.16.5 An Alternate TCOT Protocol -- 7.16.6 Correctness -- 7.17 SUMMARY -- EXERCISES -- REFERENCES -- 8 MOBILE DATABASE RECOVERY -- 8.1 INTRODUCTION -- 8.1.1 Application Recovery -- 8.2 LOG MANAGEMENT IN MOBILE DATABASE SYSTEMS -- 8.2.1 Where to Save the Log? -- 8.2.2 When and How to Save the Log -- 8.3 MOBILE DATABASE RECOVERY SCHEMES -- 8.3.1 A Three Phase Hybrid Recovery Scheme -- 8.3.2 Low-Cost Checkpointing and Failure Recovery -- 8.3.3 A Mobile Agent Based Log Management Scheme -- 8.3.4 Architecture of Agent-Based Logging Scheme -- 8.3.5 Interaction Among Agents for Log Management -- 8.3.6 Forward Strategy -- 8.3.7 Forward Log Unification Scheme.

8.3.8 Forward Notification Scheme -- 8.4 SUMMARY -- EXERCISES -- REFERENCES -- 9 WIRELESS INFORMATION DISSEMINATION -- 9.1 INTRODUCTION -- 9.1.1 Data Broadcast Mode -- 9.1.2 Push Advantages and Disadvantages -- 9.2 BROADCAST DISK -- 9.3 BROADCAST INFRASTRUCTURE -- 9.3.1 Data Access Frequency -- 9.3.2 Data Access Time -- 9.3.3 Broadcast Indexing -- 9.3.4 Nonclustering Index -- 9.3.5 Multiple Indexes -- 9.3.6 Dynamic Organization -- 9.4 EXPONENTIAL INDEX -- 9.4.1 Generalized Exponential Index -- 9.5 LOCATION-BASED INDEXING -- 9.5.1 Location Index Scheme -- 9.6 ON-DEMAND DATA SCHEDULING -- 9.7 DATA DISSEMINATION SYSTEM -- 9.7.1 Data Staging with Surrogates -- 9.8 SUMMARY -- EXERCISES -- REFERENCES -- 10 INTRODUCTION TO SENSOR TECHNOLOGY -- 10.1 INTRODUCTION TO SENSORS -- 10.1.1 Hardware and Software Components -- 10.1.2 Software Component -- 10.1.3 Wireless Sensor Network -- 10.2 OPERATING SYSTEMS AND DATABASE SYSTEMS -- 10.2.1 WSN Versus Conventional Networks -- 10.2.2 Operating System: TinyOS -- 10.2.3 TinyDB -- 10.2.4 Data Stream -- EXERCISES -- REFERENCES -- 11 SENSOR TECHNOLOGY AND DATA STREAMS MANAGEMENT -- 11.1 INTRODUCTION -- 11.2 DSMS AND DBMS: HIGH-LEVEL ARCHITECTURES -- 11.2.1 DSMS Architecture -- 11.3 COMPLEX EVENT PROCESSING (CEP) -- 11.4 DSMS AND COMPLEX EVENT PROCESSING: ARCHITECTURE -- 11.5 NETWORK FAULT MANAGEMENT APPLICATION -- 11.5.1 Network Fault Management Problem -- 11.5.2 Network Fault Management Issues -- 11.5.3 Three-Phase Processing Solution -- 11.5.4 Summary -- 11.6 PROCESSING MULTILEVEL SECURE SENSOR STREAMS -- 11.6.1 Subjects and Objects in Multilevel Secure DSMS -- 11.6.2 Multilevel Continuous Query Specification -- 11.6.3 Multilevel Continuous Query Processing -- 11.6.4 Design and Development of an MLS Architecture -- 11.6.5 Scheduling and Load-Shedding Strategies for MLS Continuous Queries -- 11.7 SUMMARY -- EXERCISES.

REFERENCES -- 12 SENSOR NETWORK DEPLOYMENT: CASE STUDIES -- 12.1 INTRODUCTION TO DEPLOYMENT -- 12.1.1 NOW-NOtification by Wireless System -- 12.1.2 Architecture of NOW -- 12.1.3 Landfill Gas Monitoring -- 12.1.4 Active Volcano Monitoring with WSN -- 12.1.5 Vehicle Speed Monitoring -- 12.1.6 Pipeline Monitoring -- 12.2 THE GATOR TECH SMART HOUSE -- 12.3 SUMMARY -- REFERENCES -- GLOSSARY -- INDEX.
Abstract:
VIJAY KUMAR, PhD, is Professor of Computer Science in the department of Computer Science Electrical Engineering at the University of Missouri-Kansas City. Dr. Kumar has served as a consultant to the United Nations and is on the editorial review board of several peer-reviewed journals. He is the editor-in-chief of two peer-reviewed journals: International Journal of Next Generation Computing (IJNGC) and International Journal of Computer Science (IJCS). His research interests include recovery and security in mobile database systems, workflow on the web, mobile computing databases, data warehousing, and web security.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: