A data delivery strategy in ubiquitous computing systems

Chiang Lee, Chao Chun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Browsing Web pages through wireless devices will become more and more popular in the near future. However, accessing a large chunk of Web data incurs a great amount of access latency while a mobile user migrates across cells. This paper investigates this problem and proposes an effective way of delivering such data to a mobile user in a ubiquitous computing system. Our data delivery (script D2) strategy is based on the dynamic programming skill needed to pre-assign the user-requested data on the possible cells to be visited in order to reduce the access latency. We first design an encoding method for the cells and then derive the properties of the encoding scheme. These properties are then used in our algorithm to deliver the data. Finally, experiments are conducted to demonstrate the feasibility and efficiency of the proposed method.

Original languageEnglish
Title of host publicationProceedings - 7th International Conference on Database Systems for Advanced Applications, DASFAA 2001
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages210-217
Number of pages8
ISBN (Electronic)0769509967, 9780769509969
DOIs
Publication statusPublished - 2001
Event7th International Conference on Database Systems for Advanced Applications, DASFAA 2001 - Hong Kong, China
Duration: 2001 Apr 182001 Apr 21

Publication series

NameProceedings - 7th International Conference on Database Systems for Advanced Applications, DASFAA 2001

Other

Other7th International Conference on Database Systems for Advanced Applications, DASFAA 2001
Country/TerritoryChina
CityHong Kong
Period01-04-1801-04-21

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'A data delivery strategy in ubiquitous computing systems'. Together they form a unique fingerprint.

Cite this