

An Efficient Cache Consistency Scheme in Mobile Networks
Abstract
Keywords
References
Y. Chung and C. Hwang, “Transactional Cache Management with Aperiodic Invalidation Scheme in Mobile Environments,” Advances in Computing Science, pp. 50-61, Springer, 1999.
A. Elmagarmid, J. Jing, A. Helal, and C. Lee, “Scalable Cache Invalidation Algorithms for Mobile Data Access,” IEEE Trans.Knowledge and Data Eng., vol. 15, no. 6, pp. 1498-1511, Nov. 2003.
H. Jin, J. Cao, and S. Feng, “A Selective Push Algorithm for Cooperative Cache Consistency Maintenance over MANETs,”Proc. Third IFIP Int’l Conf. Embedded and Ubiquitous Computing, Dec.2007.
IEEE Standard 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE, 1999.
J. Jing, A. Elmagarmid, A. Helal, and R. Alonso, “Bit-Sequences: An Adaptive Cache Invalidation Method in Mobile Client/ServerEnvironments,” Mobile Networks and Applications, vol. 15, no. 2,pp. 115-127, 1997.
J. Jung, A.W. Berger, and H. Balakrishnan, “Modeling TTL-Based Internet Caches,” Proc. IEEE INFOCOM, Mar. 2003.
X. Kai and Y. Lu, “Maintain Cache Consistency in Mobile Database Using Dynamical Periodical Broadcasting Strategy,” Proc. Second Int’l Conf. Machine Learning and Cybernetics, pp. 2389-2393, 2003.
B. Krishnamurthy and C.E. Wills, “Piggyback Server Invalidation for Proxy Cache Coherency,” Proc. Seventh World Wide Web (WWW) Conf., Apr. 1998.
B. Krishnamurthy and C.E. Wills, “Study of Piggyback Cache Validation for Proxy Caches in the World Wide Web,” Proc. USENIX Symp. Internet Technologies and Systems, Dec. 1997.
D. Li, P. Cao, and M. Dahlin, “WCIP: Web Cache Invalidation Protocol,” IETF Internet Draft, http://tools.ietf.org/html/draft-danli-wrec-wcip-01, Mar. 2001.
W. Li, E. Chan, Y. Wang, and D. Chen, “Cache Invalidation Strategies for Mobile Ad Hoc Networks,” Proc. Int’l Conf. Parallel Processing, Sept. 2007.
S. Lim, W.-C. Lee, G. Cao, and C.R. Das, “Performance Comparison of Cache Invalidation Strategies for Internet-Based Mobile-Ad Hoc Networks,” Proc. IEEE Int’l Conf. Mobile Ad-Hoc and Sensor Systems, pp. 104-113, Oct. 2004.
M.N. Lima, A.L. dos Santos, and G. Pujolle, “A Survey of Survivability in Mobile Ad Hoc Networks,” IEEE Comm. Surveys and Tutorials, vol. 11, no. 1, pp. 66-77, First Quarter 2009.
H. Maalouf and M. Gurcan, “Minimisation of the Update Response Time in a Distributed Database System,” Performance Evaluation, vol. 50, no. 4, pp. 245-266, 2002.
P. Papadimitratos and Z.J. Haas, “Secure Data Transmission in Mobile Ad Hoc Networks,” Proc. ACM Workshop Wireless Security (WiSe ’03), pp. 41-50, 2003.
J.P. Sheu, C.M. Chao, and C.W. Sun, “A Clock Synchronization Algorithm for Multi-Hop Wireless Ad Hoc Networks,” Proc. 24th Int’l Conf. Distributed Computing Systems, pp. 574-581, 2004.
W. Stallings, Cryptography and Network Security, fourth ed. Prentice Hall, 2006.
D. Wessels, “Squid Internet Object Cache,” http://www. squid-cache.org, Aug. 1998.
J. Xu, X. Tang, and D. Lee, “Performance Analysis of Location- Dependent Cache Invalidation Schemes for Mobile Environments,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 2, pp. 474-488, Feb. 2003.
L. Yin, G. Cao, and Y. Cai, “A Generalized Target Driven Cache Replacement Policy for Mobile Environments,” Proc. Int’l Symp. Applications and the Internet (SAINT ’03), Jan. 2003.
J. Yuen, E. Chan, K. Lain, and H. Leung, “Cache Invalidation Scheme for Mobile Computing Systems with Real-Time Data,”SIGMOD Record, vol. 29, no. 4, pp. 34-39, Dec. 2000.
D. Zhou and T.H. Lai, “An Accurate and Scalable Clock Synchronization Protocol for IEEE 802.11-Based Multihop Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 12, pp. 1797-1808, Dec. 2007.
G. Zipf, Human Behavior and the Principle of Least Effort. Addison-Wesley, 1949.
S. Acharya, R. Alonso, M. Franklin, and S. Zdonik, “Broadcast Disks: Data Management for Asymmetric Communications Environments,” Proc. ACM SIGMOD, pp. 199-210, May 1995.
H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman, “COACS: A Cooperative and Adaptive Caching System for MANETS,” IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 961-977, Aug. 2008.
H. Artail and K. Mershad, “MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 10, pp. 1412- 1426, Oct. 2009.
O. Bahat and A. Makowski, “Measuring Consistency in TTL-Based Caches,” Performance Evaluation, vol. 62, pp. 439-455, 2005.
D. Barbara and T. Imielinski, “Sleepers and Workaholics: Caching Strategies for Mobile Environments,” Proc. ACM SIGMOD, pp. 1-12, May 1994.
C. Bettstetter and J. Eberspacher, “Hop Distances in Homogeneous Ad Hoc Networks,” IEEE Proc. 57th IEEE Semiann. Vehicular Technology Conf., vol. 4, pp. 2286-2290, Apr. 2003.
N.A. Boudriga and M.S. Obaidat, “Fault and Intrusion Tolerance in Wireless Ad Hoc Networks,” Proc. IEEE Wireless Comm. And Networking Conf. (WCNC), vol. 4, pp. 2281-2286, 2005.
J. Cai and K. Tan, “Energy-Efficient Selective Cache Invalidation,” Wireless Networks J., vol. 5, no. 6, pp. 489-502, Dec. 1999.
J. Cao, and C. Liu, “Maintaining strong Cache Consistency of Cooperative Caching in the world wide web,” IEEE Trans. Computers, vol. 47, no. 4, pp. 445-457, Apr. 1998.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.