Preview

New Hoarding Technique for Handling Disconnection in Mobile

Powerful Essays
Open Document
Open Document
5440 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
New Hoarding Technique for Handling Disconnection in Mobile
Literature Survey On

New Hoarding Technique for Handling Disconnection in Mobile

Submitted by
Mayur Rajesh Bajaj (IWC2011021)
In Partial fulfilment for the award of the degree
Of
Master of Technology
In
INFORMATION TECHNOLOGY
(Specialization: Wireless Communication and Computing)
[pic]

Under the Guidance of

Dr. Manish Kumar

INDIAN INSTITUTE OF INFORMATION TECHNOLOGY, ALLAHABAD
(A University Established under sec.3 of UGC Act, 1956 vide Notification no. F.9-4/99-U.3 Dated 04.08.2000 of the Govt. of India)

(A Centre of Excellence in Information Technology Established by Govt. of India)
Table of Contents
[pic]
1. Introduction.........................................................................................................................3 2. Related Work and Motivation 1. Coda: The Pioneering System for Hoarding................................................................4 2. Hoarding Based on Data Mining Techniques..............................................................5 3. Hoarding Techniques Based on Program Trees...........................................................8 4. Hoarding in a Distributed Environment......................................................................9 5. Hoarding content for mobile learning........................................................................10 6. Mobile Clients Through Cooperative Hoarding........................................................ 10 7. Comparative Discussion previous techniques.............................................................11 3. Problem Definition.............................................................................................................11 4. New Approach Suggested 1. Zipf’s Law ....................................................................................................................12 2. Object Hotspot Prediction



References: [1]. James J. Kistler and Mahadev Satyanarayanan. Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems, vol. 10, no. 1, pp. 3–25, 1992. [2]. Mahadev Satyanarayanan. The Evolution of Coda. ACM Transactions on Computer Systems, vol. 20, no. 2, pp. 85–124, 2002 [3]. Geoffrey H [5]. Rakesh Agrawal and Ramakrishna Srikant, Fast Algorithms for Mining Association Rules. In Proceedings of the 20th International Conference on Very Large Databases, Chile, 1994. [6]. GUO Peng, Hu Hui, Liu Cheng. The Research of Automatic Data Hoarding Technique Based on Hyper Graph. Information Science and Engineering (ICISE), 1st International Conference, 2009. [7]. Huan Zhou, Yulin Feng, Jing Li. Probability graph based data hoarding for mobile environment. Presented at Information & Software Technology, pp.35-41, 2003. [8]. Carl Tait, Hui Lei, Swarup Acharya, and Henry Chang. Intelligent File Hoarding for Mobile Computers. In Proceedings of the 1st Annual International Conference on Mobile Computing and Networking (MOBICOM’95), Berkeley, CA, 1995. [9]. Anna Trifonova and Marco Ronchetti. Hoarding content for mobile learning. Journal International Journal of Mobile Communications archive Volume 4 Issue 4, Pages 459-476, 2006. [11]. G. Zipf, Human Behavior and the Principle of Least Effort. Addison-Wesley, 1949. [12]. Chentao Wu, Xubin He, Shenggang Wan, Qiang Cao and Changsheng Xie. Hotspot Prediction and Cache in Distributed Stream-processing Storage Systems. Performance Computing and Communications Conference (IPCCC) IEEE 28th International, 2009.

You May Also Find These Documents Helpful

  • Powerful Essays

    As the progress of the mobile phone, the standard is also improving. With the need for smartphones continually increasing, the need for data retaining across networks. New technologies are emerging to meet the need such as 3G on AT&T and IOS operating system was explored by Apple Cor. to be used in Apple’s products such as…

    • 5572 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    The proposed system will use distributed file system to facilitate information and documents sharing which can either permanently store information or only share information. The distributed file system will provide storage and retrieval, naming, sharing and protection of documents. Offices will share information through remote information sharing that allows a document to be transparently accessed by any office irrespective of the document’s location. The proposed system will also facilitate information sharing by the use of diskless…

    • 681 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 6 Discussion 2

    • 582 Words
    • 3 Pages

    Humans currently generate the same amount of data every 48 hours as we did in the time period from the beginning of history until 2003 (Rieland, 2012). Every action we take is recorded and data sent to its respective depository (Rieland, 2012). It is this constant data mining that has led to the development of entire industries centered around the collection, sale, and analysis of data. Google, for example, developed BigQuery, which scans huge amounts of data in mere seconds (Reiland, 2012). Other companies collect and exchange data as a commodity.…

    • 582 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    One of the benefits of information technology is also the capability to store a large amount of information.…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Ever since the introduction of the first mobile computer device, there has been a growing need and want for more and more mobile computing devices. Once users got the first taste of harnessing the power of the mobile device that was all they needed. Today, you cannot walk down any public road or walk into a public building without seeing users talking and connecting to the internet via mobile devices.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Going through the three individual courses this week in regards to Data Storage, Security, Recovery and Disposal has given me a new set of eyes on how information flows and is used among an organization’s computer infrastructure. What I found amazing about these processes is just how far we have come in these last few years when it comes to the technology of Digital Data. I will go over the individual topics that show the benefits, but also the drawbacks of such technology the way it is used at my work place, which is one of the largest Financial Institutions in the United States.…

    • 785 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Warehousing In Healthcare

    • 632 Words
    • 3 Pages

    Comparing the evolution of changes of data warehousing in healthcare industry in the early 90’s where patient’s records were written down in hardcopies and were filed accordingly to alphabetical orders in their registry, in the result when retrieving of data could wait up to as long as 30 days and lots of space had been taken out for storing these papers.…

    • 632 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Isys104 Tutorial – Week 7

    • 3300 Words
    • 14 Pages

    1. What are the problems of managing data resources in a traditional file environment and how are they solved by a database management system?…

    • 3300 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Operating System Comparisons

    • 2694 Words
    • 11 Pages

    An operating system (OS) is software that manages the hardware and software resources of a computer system. Basically an OS is a set of libraries or functions which programs may use to perform specific tasks relating to interfacing with computer system components (The Computer Technology Documentation Project, n.d.). Advantages and disadvantages exist in every operating system. Reviewed in this paper is a comparison of some of the primary responsibilities of popular operating systems. Although Microsoft Windows has taken its own approach as an operating system, Mac OS X is based heavily on the UNIX core. The review includes Unix/Linux, Mac OS X, and Microsoft Windows operating systems.…

    • 2694 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Db vs File System

    • 536 Words
    • 3 Pages

    References: File systems and databases [Online] Princeton: Princeton University. Available from http://www.cs.princeton.edu/courses/archive/fall11/cos109/09filesys.pdf (Accessed 1 June 2013).…

    • 536 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A practical analysis of low-density parity-check erasure codes for wide-area storage applications. DSN-04: Int. Conf. on Dependable Sys. and Networks, Florence, 2004, pp. 115124. [28] S. Rhea, C. Wells, P. Eaton, D. Geels, B. Zhao, H. Weatherspoon, and J. Kubiatowicz. Maintenance-free global data storage. IEEE Internet Computing, 5(5):40–49, 2001. [29] L. Rizzo. Effective erasure codes for reliable computer communication protocols. ACM SIGCOMM Computer Communication Review, 27(2):24–36, 1997. [30] S. B. Wicker and S. Kim. Fundamentals of Codes, Graphs, and Iterative Decoding. Kluwer Academic Publishers, Norwell, MA, 2003. [31] W. Wilcke et al. IBM intelligent brick project – petabytes and beyond. IBM Journal of Research and Development, to appear, 2006. [32] H. Xia and A. A. Chien. RobuSTore: Robust performance for distributed storage systems. Technical Report CS2005-0838, Univ. Calif. San Diego, October 2005. [33] L. Xu, V. Bohossian, J. Bruck, and D. Wagner. Low density MDS codes and factors of complete graphs. IEEE Trans. Inf. Thy, 45(6):1817–1826, 1999. [34] L. Xu and J. Bruck. X-Code: MDS array codes with optimal encoding. IEEE Trans. Inf. Thy, 45(1):272–276, 1999. [35] Z. Zhang and Q. Lian. Reperasure: Replication protocol using erasurecode in peer-to-peer storage network. 21st IEEE Symp. Reliable Distributed Systems, 2002, pp. 330–339.…

    • 7154 Words
    • 29 Pages
    Good Essays
  • Powerful Essays

    Data Recovery

    • 15337 Words
    • 62 Pages

    FOREWORD ---------------------------------------------------------------------------------------------------------------------The core of information age is the information technology, while the core of the information technology consists in the information process and storage. Along with the rapid development of the information and the popularization of the personal computer, people find information more and more useful and need it ever more than the past. Owning to the massive data, there is a huge challenge to the data storage technology. So how to save so many documents and how to visit document as fast as possible become the key point. We know we need storage devices to save data, while there are so many kinds of storage devices and modes to save data. What’s more, when saving the data and information, it is more important to ensure the storage security as well as the accuracy, usability, reliability of data. Often, what is invaluable is that invisible data. CONTENTS ---------------------------------------------------------------------------------------------------------------------Ⅰ.Elementary knowledge of data recovery..................................................................................3 1.Connotation of data................................................................................................................3 2.The essence of data recovery .................................................................................................3 3.The scope of data recovery ....................................................................................................3 4.The principle of data recovery ...............................................................................................4 Ⅱ.Data loss…

    • 15337 Words
    • 62 Pages
    Powerful Essays
  • Good Essays

    Distributed Cloud Computing

    • 5199 Words
    • 21 Pages

    [4] Gao Xin-cheng ,” Mass data storage system for campus network based on cloud computing”,in International Conference on published in 14-17 July 2012, Page(s): 226 – 230.…

    • 5199 Words
    • 21 Pages
    Good Essays
  • Powerful Essays

    maintaining the network systems. While storing the data external devices, so many factors need to be considered such as cost, performance, and speed and recovery time. Not all the organizations or business can invest more money for storage of data and recovery too. The devices should be faster enough not only while storage but also for recovery. Based on the amount of data either in gigabytes or terabytes the devices should be vulnerable to errors and system attacks. There are three different types of storage devices available for the networks.[2] One can choose Network attached storage, Storage area networks and Direct attached Storage too. Each of the devices has its pros and cons. Based on the requirement the storage device can vary. [1][4][15]…

    • 2919 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Just a Minitue

    • 353 Words
    • 2 Pages

    Looking for a challenging and Responsible position in the field of Information Technology wherein I can involve of myself in pursuit of Innovation and excellence along with company’s framework and its aspiring objectives and have the flexibility to adapt to any new environment.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays