2012
DOI: 10.5121/ijdms.2012.4501
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Data and Transaction Management in Mobile Databases

Abstract: The popularity of the Mobile Database is increasing day by day as people need information even on the move in the fast changing world. This database technology permits employees using mobile devices to connect to their corporate networks, hoard the needed data, work in the disconnected mode and reconnect to the network to synchronize

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 66 publications
0
3
0
Order By: Relevance
“…Supporting mobile data services of mobile applications require a mobile accessible database solution [1,2], which is the union and integration of a central controlled distributed database and a disconnected database on mobile devices. Unlike conventional database systems, there are special features and needs for mobile databases, including mobility, location awareness, mobile transaction management, query process, data replication, data synchronization and caching.…”
Section: A Mobile Databasesmentioning
confidence: 99%
“…Supporting mobile data services of mobile applications require a mobile accessible database solution [1,2], which is the union and integration of a central controlled distributed database and a disconnected database on mobile devices. Unlike conventional database systems, there are special features and needs for mobile databases, including mobility, location awareness, mobile transaction management, query process, data replication, data synchronization and caching.…”
Section: A Mobile Databasesmentioning
confidence: 99%
“…Using checkpoint and message logging techniques, the mobile application may roll back to the last reliably stored state and resume execution with recovery assurances. Existing approaches operate under the assumption that MH disk storage is insecure and store checkpoint and log data at base stations [6][7][8][9]. The process for a mobile checkpoint may be coordinated or uncoordinated.…”
Section: Introductionmentioning
confidence: 99%
“…To maintain a consistent and recoverable global checkpoint, distributed applications need MHs to coordinate their local checkpoints. Because the MH can independently checkpoint its local state, uncoordinated protocols are preferred for mobile applications [7][8][9]. Recovery methods that are not coordinated are either nonlogging or logging [4,5].…”
Section: Introductionmentioning
confidence: 99%