Intelligent Cache Management for Mobile Data Warehouse Systems

2008 ◽  
pp. 1539-1556
Author(s):  
Shi-Ming Huang ◽  
Binshan Lin ◽  
Qun-Shi Deng

This research proposes an intelligent cache mechanism for a data warehouse system in a mobile environment. Because mobile devices can often be disconnected from the host server and due to the low bandwidth of wireless networks, it is more efficient to store query results from a mobile device in the cache. For more personal use of mobile devices, we use a data mining technique to determine the pattern from a record of previous queries. Then the data, which will be retrieved by the user, are prefetched and stored in the cache, thus, improving the query efficiency. We demonstrate the feasibility of the proposed approach with experiments using simulation. Comparison of our approach with a standard approach indicates that there is a significant advantage to using mobile data warehouse systems.

Author(s):  
Rania Mokhtar ◽  
Rashid Saeed

An important part of ISO/IEC 27002 cyber security standard is the conservation of confidentiality that falls under its computer facility protection part which insures that the computer and its stored information can only be accessed by the authorized users. Securing mobile devices and mobile data to ensure the confidentiality, integrity, and availability of both data and security applications requires special consideration to be paid to the typical mobile environment in which a mobile computing device would be utilized. Protecting mobile devices includes multiple security technologies such as the right identification of its particular user, data encryption, physical locking devices, monitoring and tracking software, and alarms. This chapter reviews security-specific hardware and software applied to mobile computing and presents its advantages and drawbacks. Then it considers the concept of usability constraints in context of mobile computing security and introduces the seamless security method for identity proof of a particular user or device.


2005 ◽  
Vol 16 (2) ◽  
pp. 46-65 ◽  
Author(s):  
Shi-Ming Huang ◽  
Binshan Lin ◽  
Qun-Shi Deng

2010 ◽  
Vol 43 ◽  
pp. 695-698
Author(s):  
Ji Nan Gu ◽  
Guo Jing Li

the striving development of mobile business and the wide use of mobile equipment have enlightened the requirement of high efficient analyst instrument of data stream. Mobile data mining is under the environment of pervasive and finds the knowledge from the continuous data stream. We apply the mining technology of data stream to mobile environment and discuss the algorithm. And we introduce the concrete idea and steps of mobile data mining on the base of improved data stream disposing model. At last, we introduce the application instance that is the application of mobile ERP.


2008 ◽  
pp. 3235-3251
Author(s):  
Carem C. Fabris ◽  
Alex A. Freitas

This paper focuses on the discovery of surprising unexpected patterns based on a data mining method that consists of detecting instances of Simpson’s paradox. By its very nature, instances of this paradox tend to be surprising to the user. Previous work in the literature has proposed an algorithm for discovering instances of that paradox, but it addressed only flat data stored in a single relation. This work proposes a novel algorithm that considerably extends that previous work by discovering instances of Simpson’s paradox in hierarchical multidimensional data — the kind of data typically found in data warehouse and OLAP environments. Hence, the proposed algorithm can be regarded as integrating the areas of data mining and data warehousing by using an adapted data mining technique to discover surprising patterns from data warehouse and OLAP environments.


2020 ◽  
Vol 10 (23) ◽  
pp. 8351
Author(s):  
Rosangela Casolare ◽  
Fabio Martinelli ◽  
Francesco Mercaldo ◽  
Antonella Santone

The increase in computing capabilities of mobile devices has, in the last few years, made possible a plethora of complex operations performed from smartphones and tablets end users, for instance, from a bank transfer to the full management of home automation. Clearly, in this context, the detection of malicious applications is a critical and challenging task, especially considering that the user is often totally unaware of the behavior of the applications installed on their device. In this paper, we propose a method to detect inter-app communication i.e., a colluding communication between different applications with data support to silently exfiltrate sensitive and private information. We based the proposed method on model checking, by representing Android applications in terms of automata and by proposing a set of logic properties to reduce the number of comparisons and a set of logic properties automatically generated for detecting colluding applications. We evaluated the proposed method on a set of 1092 Android applications, including different colluding attacks, by obtaining an accuracy of 1, showing the effectiveness of the proposed method.


2003 ◽  
Author(s):  
Lijuan Zhou ◽  
Chi Liu ◽  
Daxin Liu
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document