J.A. Zhang, S.F. Jones, and A.S. Helal
[1] J. Zhang & S. Helal, UbiData: Ubiquitous mobile file service,Proc. ACM Symp. on Applied Computing (SAC), Melbourne,Florida, March 2003. [2] M. Satyanarayanan, Coda: A highly available file system fora distributed workstation environment, IEEE Transactions onComputers, 39 (4), 1990. doi:10.1109/12.54838 [3] T. Berners-Lee, R. Fielding, & L. Masinter, Uniform resourceidentifiers (URI): generic syntax, Network Working Group, Re-quest for Comments: 2396. Available at http://www.ietf.org/ [4] J.P. MacDonald, File System Support for Delta Compres-sion, M.S. thesis, Department of Electrical Engineering andComputer Sciences, University of California at Berkeley, 2000. [5] P. Honeyman & L. Huston, Communication and consistencyin mobile file systems, IEEE Personal Communications, 2(6),1995. doi:10.1109/98.475987 [6] M. Lanham, A. Kang, J. Hammers, A. Helal, et al., Format-independent change detection and propagation in support of71mobile computing? Proc. of the SBBD2002 – XVII BrazilianSymp. on Databases, Gramado, Brazil, 2002. [7] W.F. Tichy, Design, implementation, and evaluation of arevision control system, Proc. Sixth Int. Conf. on SoftwareEngineering, Tokyo, Japan, September 1982, 58–67. [8] A. Tridgell & P. Mackerras, The rsync algorithm, TechnicalReport TR-CS-96-05, Australian National University. [9] NISTNet, NIST Net emulator. Available at http://snad.ncsl.nist.gov/itg/nistnet/, 2002. [10] L. Huston & P. Honeyman, Peephole log optimization, CITITechnical Report 95-3, University of Michigan at Ann Arbor. [11] M. Satyanarayanan, Mobile information access, IEEE PersonalCommunications, 3 (1), 1996, 26–33. doi:10.1109/98.486973 [12] M. Satyanarayanan, Fundamental challenges in mobile com-puting, Fifteenth ACM Symp. on Principles of DistributedComputing, Philadelphia, Pennsylvania, May 1996, pp. 1–7. doi:10.1145/248052.248053 [13] L. Mummert, Exploiting weak connectivity in a distributedfile system, Ph.D. dissertation, School of Computer Science,Carnegie-Mellon University, 1996. [14] Y. (Clement) Lee, Operation-based Update Propagation in aMobile File System, Ph.D. dissertation, Department of Com-puter Science and Engineering, The Chinese University ofHong Kong, January 2000. [15] M. Rosenblum & J. Ousterhout, The design and implemen-tation of a log-structured file system, ACM Transactions onComputer Systems, 10 (1), 1992. doi:10.1145/146941.146943 [16] A. Helal, J. Hammer, J. Zhang, & A. Khushraj, A three-tierarchitecture for ubiquitous data access, Proc. First ACS/IEEEInt. Conf. on Computer Systems and Applications, Beirut,Lebanon, 2001, 177–180. doi:10.1109/AICCSA.2001.933971 [17] A. Khushraj, A. Helal, & J. Zhang, Incremental hoardingand reintegration in mobile environments, Proc. IEEE/IPSJInt. Symp. on Applications and the Internet (SAINT), Nara,Japan, 2002, 8–11. [18] G.H. Kuenning, Seer: Predictive file hoarding for disconnectedmobile operation, Ph.D. dissertation, also available as TechnicalReport UCLA-CSD-970015, 1997. [19] W. Vogels, File system usage in Windows NT 4.0, Proc. 17thACM Symp. on Operating Systems Principles, Charleston,South Carolina, 1999, 93–103.
Important Links:
Go Back