{"title":"A Design for File Access in a Mobile Environment","authors":"Nikki Mirghafori, A. Fontaine","doi":"10.1109/WMCSA.1994.2","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.2","url":null,"abstract":"Reducing communication cost is important-in a mobile enuironment, because transmission of data over the radio link is slow, expensive, and unreliable. Providing data consistencg is crucial because-many mobile applilcations are database applications which rely on consistent data. In this paper we propose a design for a fiIe access mechanism specific to a mobile environment. Our two main design goals are to reduce communication cost and to provide data consistency. We reduce the amount of communication by extensive use of caching, profile inforrnation (files the user accesses), a proxy process, delayed writes, and availability of loose-reads. We provide data consistency by using the prony services, a centralized data rnanager with callbacks, and strict-reads. Our design is general enough to suit the needs of both mobile database and office applicati,ons.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method Providing Identity Privacy to Mobile Users During Authentication","authors":"D. Samfat, R. Molva","doi":"10.1109/WMCSA.1994.5","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.5","url":null,"abstract":"The increasing development of mobile networks raises new security requirements and concerns. In addition to the basic need of authentification, confidentiality and key distribution services, a new problem involving privacy is the unauthorized tracking of users migration. In other words, accessing any information related to the mobile user's location data without his consent, is a serious violation of his privacy. Moreover, if no care is taken, the disclosure of the mobile user real identity may appear during the authentication process. The basic solution to this problem is the usc of aliases which insure non-traceability by hiding the user's real identity and also his relationship with domain authorities. In this paper we provide a classification of the different degrees of non-traceability and present a new efficient method for the computation of aliases. This technique can be used during authentification of mobile users and thus avoids the drawbacks of existing solutions such as GSM and CDPD.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122549399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Pen-Based Database Interface for Mobile Computers","authors":"R. Alonso, V. Mani","doi":"10.1109/WMCSA.1994.6","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.6","url":null,"abstract":"The appearance on the market of pen-based computers with wireless communication capabilities has led to the ability to access geographically distributed information bases. Moreover, such computing devices require database interfaces that are easy-to-use, avoid large scale data input via keyboard use, and are suited for smaller display screens. We establish the need for newer interfaces to deal with problems specific to mobile computing devices that use the pen as a primary input device. We describe an implementation of a pen-based graphical database interface on a pen computer (using the PenPoint operating system) with a built-in cellular phone. Using the cellular phone capability, the interface connects to remote databases and displays the schema information of the database chosen by the user. In response to gestures made by the user using the pen, the interface automatically generates queries and retrieves results. We use the Universal Relation concept to aid in automatically generating queries based on the attributes chosen by the user. We provide a summary of the status of this interface, some implementation details and suggest some future directions.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Documents: Mobile Wireless Access to the WWW","authors":"M. Kaashoek, T. Pinckney, J. A. Tauber","doi":"10.1109/WMCSA.1994.22","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.22","url":null,"abstract":"We propose dynamic documents as an approach to extending and customizing the WWW/Mosaic for mobile computing plaforms. Dynamic documents are programs executed on a mobile platform to generate a document; they are implemented as Tcl scripts. We have modified the NCSA Mosaic web client to run the dynamic documents it retrieves through a modfied Tcl interpreter The interpreter is designed to execute only commands that do not violate safety. To hide the latencies of slow links we have modified the Mosaic client to perform caching and prefetching. The policies for caching and prefetching can be under control of dynamic documents, allowing the strategies to be document specific. Using dynamic documents, we have built an adaptive email browser that employs application-specific caching and prefetching strategies. Both the browser and the displayed email messages are dynamically customized to the mobile computing environment in which they run.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130699590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility: A Medium for Computation, Communication, and Control","authors":"A. Mukherjee, D. Siewiorek","doi":"10.1109/WMCSA.1994.27","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.27","url":null,"abstract":"The advent of ubiquitous mobile computing has widely been regarded as the convergence of pager-like communications technology and laptop-like computational power enabling applications that span both realms of functionality. However ubiquitous mobile computing, coupled with the proliferation of microprocessor-controlled appliance s and networking, creates another important new application arena: that in which mobile computers act as controllers for and interfaces to, appliances and services in the surrounding environment. This position paper explores the convergence of computation with communications and control applications, and the models of mobile computing that consequently arise. Established applications and models are positioned relative to this framework, and hither to unexplored control-based models of mobile computation are described.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128595825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing in Ad Hoc Networks of Mobile Hosts","authors":"David B. Johnson","doi":"10.1109/WMCSA.1994.33","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.33","url":null,"abstract":"An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. In such an environment, it may be necessary for one mobile host to enlist the aid of others in forwarding a packet to its destination, due to the limited propagation range of each mobile host's wireless transmissions. Some previous attempts have been made to use conventional routing protocols for routing in ad hoc networks, treating each mobile host as a router This position paper points out a number of problems with this design and suggests a new approach based on separate route discovery and route maintenance protocols.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122236859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting Adaptive Services in a Heterogeneous Mobile Environment","authors":"N. Davies, G. Blair, K. Cheuerst, A. Friday","doi":"10.1109/WMCSA.1994.34","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.34","url":null,"abstract":"Future computer environments will include mobile computers which will eiUler be disconnected, weakly interconnected by low speed wireless networks such as GSM, or fully inter-connected by high speed networks ranging from Ethernet to ATM. While the transition between networks is currently a heavyweight operation we believe that developments in network interface technology will soon enable mobile computers to dynamically select their network service based on cost and performance requirements. Such flexibility, coupled with tile inherent unreliability of mobile communications, means that system services and applications will be subject to rapid and massive fluctuations in tile quality-of-service provided by their underlying communications infrastructure. In this paper we discuss the design of a distributed systems platform to support tile development of services which are able to tolerate this environment by dynamically adapting to changes in tile available communications quality-of-service.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129084061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ahamad, F. Torres-Rojas, R. Kordale, J. Singh, Shawn Smith
{"title":"Detecting Mutual Consistency of Shared Objects","authors":"M. Ahamad, F. Torres-Rojas, R. Kordale, J. Singh, Shawn Smith","doi":"10.1109/WMCSA.1994.19","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.19","url":null,"abstract":"In systems that support disconnected operations, shared objects must be cached at client sites to ensure that the objects are accessible while the client is disconnected. It is desirable that objects cached at a client site are mutually consistent with respect to the level of consistency provided by the system. We present a new technique for detecting mutual consistency of objects and show how it can be used to support causal consistency, which is appropriate in systems that support disconnected operations.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"52 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disconnected Operation in the Thor Object-Oriented Database System","authors":"R. Gruber, F. Kaashoek, B. Liskov, L. Shrira","doi":"10.1109/WMCSA.1994.21","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.21","url":null,"abstract":"This paper discusses issaes raised by providing disconnected operation in the Thor object-ortented database system. Disconnected operation in such a system poses new challenges because of the small size of obiects, the richness and complexity of their interconnections, the huge number of them, and the fact that they are accessed within atomic transactions. We propose three techniques to address these challenges: (l) using the database query language for hoarding; (2) using dependent commits to tentatively com' mit transactions at the disconnected client; (3) using the high-level semantic of objects to avoidtransaction aborts.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Universal Mobile Addressing in the Internet","authors":"J. Cobb, C. Edmondson-Yurkanan, M. Gouda","doi":"10.1109/WMCSA.1994.41","DOIUrl":"https://doi.org/10.1109/WMCSA.1994.41","url":null,"abstract":"To support mobility, we propose to use a triple (M, N, d) as an address for every stationary or mobile computer in a multi-network system, like the Internet. In this (M, N, d) address, M is the network where the computer is currently located, N is the network where the computer is usually located, and d is a unique identifier of the computer in network N. The address of a stationary computer is always (N, N, d), while the address of a mobile computer is (M, N, d), where M may be different from N. In this paper, we discuss how to use this universal addressing in a number of protocols for routing data messages to mobile computers, for establishing and maintaining mobile vir tual circuits, and for supporting mobile groups.","PeriodicalId":143500,"journal":{"name":"1994 First Workshop on Mobile Computing Systems and Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134158161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}