Event-Condition-Action (ECA) Rules for Maintaining the Integrity Constraints of Mobile Databases

Event-Condition-Action (ECA) Rules for Maintaining the Integrity Constraints of Mobile Databases

Hamidah Ibrahim
Copyright: © 2009 |Pages: 13
ISBN13: 9781605660462|ISBN10: 1605660469|EISBN13: 9781605660479
DOI: 10.4018/978-1-60566-046-2.ch021
Cite Chapter Cite Chapter

MLA

Ibrahim, Hamidah. "Event-Condition-Action (ECA) Rules for Maintaining the Integrity Constraints of Mobile Databases." Handbook of Research on Mobile Multimedia, Second Edition, edited by Ismail Khalil, IGI Global, 2009, pp. 285-297. https://doi.org/10.4018/978-1-60566-046-2.ch021

APA

Ibrahim, H. (2009). Event-Condition-Action (ECA) Rules for Maintaining the Integrity Constraints of Mobile Databases. In I. Khalil (Ed.), Handbook of Research on Mobile Multimedia, Second Edition (pp. 285-297). IGI Global. https://doi.org/10.4018/978-1-60566-046-2.ch021

Chicago

Ibrahim, Hamidah. "Event-Condition-Action (ECA) Rules for Maintaining the Integrity Constraints of Mobile Databases." In Handbook of Research on Mobile Multimedia, Second Edition, edited by Ismail Khalil, 285-297. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-046-2.ch021

Export Reference

Mendeley
Favorite

Abstract

An important problem for a database system is to guarantee database consistency. Difficulty arises in devising an efficient algorithm for checking database integrity against updates and for maintaining the consistency of the database, which indisputably desires great attention. However, it is intricate to accomplish particularly in a distributed and mobile environment due to the nature and characteristics of these environments. This chapter presents a model for maintaining the consistency of mobile databases. A rule-based mechanism based on the Event-Condition-Action (ECA) rules is proposed wherein the process of constraint maintenance will trigger the appropriate rule depending on the location (site) where the update is executed. In mobile databases, violation of integrity constraints can occur (detect) at three different levels (locations), namely: mobile host, local base station and remote base station. We believe that the proposed mechanism will reduce the amount of data accessed in addition to the amount of data transferred across the network during the process of maintaining the consistency of the mobile databases. Besides, it is without a doubt that it will speed up the checking process.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.