DOI QR코드

DOI QR Code

3-L Model: A Model for Checking the Integrity Constraints of Mobile Databases

  • Published : 2009.12.31

Abstract

In this paper we propose a model for checking integrity constraints of mobile databases called Three-Level (3-L) model, wherein the process of constraint checking to maintain the consistent state of mobile databases is realized at three different levels. Sufficient and complete tests proposed in the previous works together with the idea of caching relevant data items for checking the integrity constraints are adopted. This has improved the checking mechanism by preventing delays during the process of checking constraints and performing the update. Also, the 3-L model reduces the amount of data accessed given that much of the tasks are performed at the mobile host, and hence speeds up the checking process.

Keywords

References

  1. ALWAN, A. A., H. IBRAHIM, AND N. I. UDZIR. 2007. Local integrity checking using local information in a distributed database. Proceedings of the 1st Aalborg University IEEE Student Paper Contest 2007 (AISPC'07).
  2. CHAN, D. AND J. F. RODDICK. 2003. Context-sensitive mobile database summarization. Proceedings of the Twenty-Sixth Australian Computer Science Conference (ACSC 2003).
  3. DZOLKHIFLI, Z., H. IBRAHIM, AND L. S. AFFENDEY. 2008a. Analyzing integrity tests for data caching in mobile databases. Proceedings of the International Conference on Distributed Computing and Internet Technologies (ICDCIT 2008), Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, New Delhi (India), 157-165. https://doi.org/10.1007/978-3-540-89737-8_16
  4. DZOLKHIFLI, Z., H. IBRAHIM, AND L. S. AFFENDEY. 2008b. Data caching strategies for checking integrity constraints of mobile database. Proceedings of the 10th @WAS International Conference on Information Integration and Web-based Applications & Services (iiWAS2008), Association for Computing Machinery (ACM), 186-192. https://doi.org/10.1145/1497308.1497345
  5. EPFL, GRENOBLE, U., INRIA-NANCY, INT-EVRY, MONTPELLIER, U., PARIS, U. AND VERSAILLES, U. 2004. Mobile databases: a selection of open issues and research directions. SIGMOD Record, 33, 2, 78-83. https://doi.org/10.1145/1024694.1024708
  6. GUPTA, A. 1994. Partial information based integrity constraint checking. PhD Thesis, Stanford University, USA.
  7. HANANDEH, F. A. H. 2006. Integrity constraints maintenance for parallel databases. PhD Thesis, UPM, Malaysia.
  8. IBRAHIM, H. 2006. Checking integrity constraints - how it differs in centralized, distributed and parallel databases. Proceedings of the Second International Workshop on Logical Aspects and Applications of Integrity Constraints (LAAIC'06), 563-568. https://doi.org/10.1109/DEXA.2006.39
  9. IBRAHIM, H., W. A. GRAY, AND N. J. FIDDIAN. 2001. Optimizing fragment constraints - a performance evaluation. International Journal of Intelligent Systems -Verification and Validation Issues in Databases, Knowledge-Based Systems, and Ontologies, 16, 3, 285-306. https://doi.org/10.1002/1098-111X(200103)16:3<285::AID-INT1008>3.0.CO;2-S
  10. KEN, C. K. L., L. WANG-CHIEN, AND M. SANJAY. 2006. Pervasive data access in wireless and mobile computing environments. Journal of Wireless Communications and Mobile Computing. https://doi.org/10.1002/wcm.v8:1
  11. MADIRAJU, P. AND R. SUNDERRAMAN. 2004. A mobile agent approach for global database constraint checking. Proceedings of the ACM Symposium on Applied Computing (SAC'04), 679-683. https://doi.org/10.1145/967900.968043
  12. MARTINENGHI, D. 2005. Advanced techniques for efficient data integrity checking. PhD Thesis, Roskilde University.
  13. MAZUMDAR, S. AND P. K. CHRYSANTHIS. 2004. Localization of integrity constraints in mobile databases and specification in PRO-MOTION. Proceedings of the Mobile Networks and Applications, 481-490.
  14. MCCARROLL, N. F. 1995. Semantic integrity enforcement in parallel database machines. PhD Thesis, University of Sheffield, UK.
  15. NICOLAS, J. M. 1982. Logic for improving integrity checking in relational data bases. Acta Informatica, 18, 3, 227-253. https://doi.org/10.1007/BF00263192