References
- ALWAN, A. A., H. IBRAHIM, AND N. I. UDZIR. 2007. Local integrity checking using local information in a distributed database. Proceedings of the 1st Aalborg University IEEE Student Paper Contest 2007 (AISPC'07).
- CHAN, D. AND J. F. RODDICK. 2003. Context-sensitive mobile database summarization. Proceedings of the Twenty-Sixth Australian Computer Science Conference (ACSC 2003).
- DZOLKHIFLI, Z., H. IBRAHIM, AND L. S. AFFENDEY. 2008a. Analyzing integrity tests for data caching in mobile databases. Proceedings of the International Conference on Distributed Computing and Internet Technologies (ICDCIT 2008), Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, New Delhi (India), 157-165. https://doi.org/10.1007/978-3-540-89737-8_16
- DZOLKHIFLI, Z., H. IBRAHIM, AND L. S. AFFENDEY. 2008b. Data caching strategies for checking integrity constraints of mobile database. Proceedings of the 10th @WAS International Conference on Information Integration and Web-based Applications & Services (iiWAS2008), Association for Computing Machinery (ACM), 186-192. https://doi.org/10.1145/1497308.1497345
- EPFL, GRENOBLE, U., INRIA-NANCY, INT-EVRY, MONTPELLIER, U., PARIS, U. AND VERSAILLES, U. 2004. Mobile databases: a selection of open issues and research directions. SIGMOD Record, 33, 2, 78-83. https://doi.org/10.1145/1024694.1024708
- GUPTA, A. 1994. Partial information based integrity constraint checking. PhD Thesis, Stanford University, USA.
- HANANDEH, F. A. H. 2006. Integrity constraints maintenance for parallel databases. PhD Thesis, UPM, Malaysia.
- IBRAHIM, H. 2006. Checking integrity constraints - how it differs in centralized, distributed and parallel databases. Proceedings of the Second International Workshop on Logical Aspects and Applications of Integrity Constraints (LAAIC'06), 563-568. https://doi.org/10.1109/DEXA.2006.39
- IBRAHIM, H., W. A. GRAY, AND N. J. FIDDIAN. 2001. Optimizing fragment constraints - a performance evaluation. International Journal of Intelligent Systems -Verification and Validation Issues in Databases, Knowledge-Based Systems, and Ontologies, 16, 3, 285-306. https://doi.org/10.1002/1098-111X(200103)16:3<285::AID-INT1008>3.0.CO;2-S
- KEN, C. K. L., L. WANG-CHIEN, AND M. SANJAY. 2006. Pervasive data access in wireless and mobile computing environments. Journal of Wireless Communications and Mobile Computing. https://doi.org/10.1002/wcm.v8:1
- MADIRAJU, P. AND R. SUNDERRAMAN. 2004. A mobile agent approach for global database constraint checking. Proceedings of the ACM Symposium on Applied Computing (SAC'04), 679-683. https://doi.org/10.1145/967900.968043
- MARTINENGHI, D. 2005. Advanced techniques for efficient data integrity checking. PhD Thesis, Roskilde University.
- MAZUMDAR, S. AND P. K. CHRYSANTHIS. 2004. Localization of integrity constraints in mobile databases and specification in PRO-MOTION. Proceedings of the Mobile Networks and Applications, 481-490.
- MCCARROLL, N. F. 1995. Semantic integrity enforcement in parallel database machines. PhD Thesis, University of Sheffield, UK.
- NICOLAS, J. M. 1982. Logic for improving integrity checking in relational data bases. Acta Informatica, 18, 3, 227-253. https://doi.org/10.1007/BF00263192