Location of Repository

Using Policy to Control Data Synchronisation in Middleware for an Ad-hoc Mobile Network

By Vorapol Jittamas
Topics: QA76
OAI identifier: oai:kar.kent.ac.uk:24025

Suggested articles

Preview

Citations

  1. (2003). A middleware service for mobile ad hoc data sharing, enhancing data availability. doi
  2. (1999). A policy description language.
  3. (2002). A policy framework for management of distributed systems, doi
  4. (2001). A policy language for the management of distributed agents. doi
  5. (1976). A principle for resilient sharing of distributed resources.
  6. (2003). A survey of middleware paradigms for mobile computing. doi
  7. (2003). AdHocFS: Sharing files in WLANS. doi
  8. (1998). An architecture for next generation middleware. doi
  9. (2004). An artificial intelligence perspective on autonomic computing policies. In doi
  10. (2001). An overview of the Bluetooth wireless technology. doi
  11. (2006). Anthony Nadalin, Nataraj Nagaratnam, Hemma Prafullchandra, Claus von Riegen,
  12. (1990). Apologizing versus asking permission: optimistic concurrency control for abstract data types. doi
  13. (1988). Applications experience with Linda. In doi
  14. (2006). Asir Vedamuthu, and Umit Yalcinalp. Web services policy 1.2 - attachment (WS-PolicyAttachment),
  15. (2003). CARISMA: Context-aware reflective middleware system for mobile applications. doi
  16. (2006). COM: Component object model technologies.
  17. (1999). Conflicts in policy-based distributed systems management. doi
  18. (2004). Coordination and mobility doi
  19. (1990). CVS II: Parallelizing software development.
  20. (1997). Designing and implementing asynchronous collaborative applications with Bayou. doi
  21. (1992). Disconnected operation in the Coda file system. doi
  22. Distraction-free ubiquitous computing. doi
  23. (1996). Distributed Computing with IBM MQSeries.
  24. (1986). Distributed data structures in Linda. doi
  25. (1989). Distributed systems: A comprehensive survey.
  26. (2001). Dynamic cluster configuration and management using JavaSpaces. In doi
  27. (1985). Generative communication in Linda. doi
  28. (2006). Group. CORBA basics. http://www.omg.org/ gettingstarted/corbafaq.htm,
  29. (2004). Guest editors’ introduction: Overview of sensor networks. doi
  30. (1998). High-level planning and control with incomplete information using POMDP’s.
  31. (2002). Implementation and analysis of a JavaSpace supported by a relational database.
  32. (1990). Implementation of the Ficus Replicated File System. In
  33. (1999). Internet-based mobile ad hoc networking. doi
  34. (2002). JavaSpace in Practice.
  35. (2001). JavaSpaces Example by Example. Prentice Hall PTR, Upper Saddle River,
  36. (1999). JavaSpaces Principles, Patterns, and Practice.
  37. (1998). JSpace: implementation of a Linda system in Java. doi
  38. (1998). L2imbo: a distributed systems platform for mobile computing.
  39. (1997). Limbo: a tuple space based platform for adaptive mobile applications.
  40. (2001). Lime revisited: Reverse engineering an agent communication model. doi
  41. (1986). Linda in adolescence. doi
  42. (1999). Make room for JavaSpaces, part 1: Ease the development of distributed apps with JavaSpaces. http://www.javaworld.com/
  43. (2002). Meta-policies for distributed role-based access control systems. doi
  44. (1996). Middleware: a model for distributed system services. doi
  45. (2003). Mobile ad hoc networking: imperatives and challenges. doi
  46. (1999). Mobile Java objects. doi
  47. (2002). Mobile network evolution: a revolution on the move. doi
  48. (2002). Networked parking spaces: architecture and applications. doi
  49. (1998). On the expressive power of a language for programming coordination media. doi
  50. (1999). Open Source Development with CVS.
  51. (1999). Operation-based update propagation in a mobile file system. doi
  52. (1984). Optimism and consistency in partitioned distributed database systems. doi
  53. (2006). Policies in the alphabet soup.
  54. (2001). Policy core information model – version 1 specification. RFC 3060, , United States,
  55. (2000). Policy evaluation for network management. doi
  56. (2006). Policy specification: Meeting changing requirements without breaking the system design contract. doi
  57. (2000). Ponder: A language for specifying security and management policies for distributed systems. doi
  58. (2001). Ponder: Runtime object model policies as Java object. http://www-dse.doc.ic.ac.uk/Research/policies/ponder/
  59. (2002). Project Aura: Toward distraction-free pervasive computing. doi
  60. (1997). Quality of service support in a mobile environment: An approach based on tuple spaces”. doi
  61. (1993). Representing action and change by logic programs. doi
  62. Research. TSpace FAQS.
  63. (1999). Routing policy specification language (RPSL). RFC 2622, , United States,
  64. (2001). Rule-driven coordination agents: A self-configurable agent architecture for distributed control. doi
  65. (1988). Scale and performance in a distributed file system. doi
  66. (2002). Service provision in ad hoc networks. doi
  67. (2000). Software engineering and middleware: a roadmap. doi
  68. (1993). Supporting application-specific resolution in an optimistically replicated file system. doi
  69. (1994). The Bayou architecture: Support for data sharing among mobile users. doi
  70. (1998). The Coda distributed file system. Linux J.,
  71. (1999). The HiMAT model for mobile agent applications. doi
  72. (2001). The Ponder Policy Specification Language. In doi
  73. (1986). The S/Net’s Linda kernel. doi
  74. (2005). TinyLIME: bridging mobile and sensor networks through middleware. doi
  75. (2002). Tools for domain-based policy management of distributed systems. doi
  76. (2002). Toward open, secure, widely distributed services. doi
  77. (2005). Web services reliable messaging policy assertion (WS-RM Policy),
  78. (2005). Web services security policy language (WS-SecurityPolicy),
  79. (1979). Weighted voting for replicated data. doi
  80. (2000). Wireless ad hoc networking: The art of networking without a network. Ericsson Review,

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.