NMT’s Computer Science and Engineering Education & Research Programs Dr. Lorie M. Liebrock Chair, Computer Science and Engineering.

Slides:



Advertisements
Similar presentations
Theodoros Chrysafis - Computer Science Department - CITY Liberal Studies - (24-25/05/2002) 1 Issues and Limitations on Mobile Computing Contents Wireless.
Advertisements

A Mobile Agent Architecture for Heterogeneous Devices Presented by: Chuong Hoang CS Software Architect and Design The University of Texas at Dallas.
Introduction Why do we need Mobile OGSI.NET? Drawbacks:
BY MAULIK PATEL CED, GPERI Computing Architecture.
Figures – Chapter 18. Figure 18.1 Procedural interaction between a diner and a waiter.
8.
Design of Web-based Systems IS Development: lecture 10.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
AgentOS: The Agent-based Distributed Operating System for Mobile Networks Salimol Thomas Department of Computer Science Illinois Institute of Technology,
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
©Silberschatz, Korth and Sudarshan18.1Database System Concepts Centralized Systems Run on a single computer system and do not interact with other computer.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Distributed Systems: Client/Server Computing
Client-Server Computing in Mobile Environments
DHCP Server © N. Ganesan, Ph.D.. Reference DHCP Server Issues or leases dynamic IP addresses to clients in a network The lease can be subject to various.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Introduction to Cloud Computing
Telecommunications. General Information Industry: Telecommunication Industry Patent Number: (US Patent) Title: Electronic Device Security.
MOBILE CLOUD COMPUTING
Mobile Databases: a Selection of Open Issues and Research Directions Authors: Rachid Guerraoui et al. Sources: SIGMOD Record, 33(2), pp.78-83, 2004 Adviser:
Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
College of Business Administration California State University, Long Beach Preview Day Saturday, May 4, 2013 Information Systems Presented by C. Sophie.
Lecture On Introduction (DBMS) By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
William Easton. Introduction  Mobile Environments  Locking and Data Starvation  Mobile DB Architecture  Timing Mechanisms  Static Timer  Dynamic.
The Network Performance Advisor J. W. Ferguson NLANR/DAST & NCSA.
Ch. 9. The Cloud of Things 1Ch. 9. CoT.  Current M2M/IoT solutions are focusing on communications and integration. Future Web of Things (WoT) evolution.
File-Mate 1500 Design Review III Keven Abbott Tyler Crouse Kiana Delventhal Liam Westby.
A Study of Wireless Virtual Network Computing Kiran Erra.
© 2007 The MITRE Corporation. All rights reserved Exposing Services in a Disadvantaged Environment S. Semy, M. Sabbouh, J. Higginson, F. Dandashi
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Networking Components 10/2/07. Parts of a Network Clients –Computers that request or order information from a server –Usually desktop computers with their.
Feb 5, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Data Dissemination and Management 2 of 3 Lecture 7 Paul I-Hai Lin, Professor Electrical.
Alex Leifheit NETWORKS. NETWORK A number of interconnected computers, machines, or operations. Key Components Network components, Network Architecture,
Communications & Networks National 4 & 5 Computing Science.
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 Essentials of Design.
CS 551, FALL 2001 DISTRIBUTED UNIVERSITY SERVICES ANKIT AGARWAL CHINTAN SHAH RAKESH PUNJABI.
TM 8-1 Copyright © 1999 Addison Wesley Longman, Inc. Client/Server and Middleware.
1 Database Environment. 2 Objectives of Three-Level Architecture u All users should be able to access same data. u A user’s view is immune to changes.
Lecture On Introduction (DBMS) By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
What the $#*! IS my password? Secure Online Password Storage Lon Smith Aaron Gremmert.
Wireless Communication & Mobile Programming 1 UNIT- 1 – MOBILECOMPUTINGINTRODUCTION Blog: aforajayshahnirma.wordpress.com.
INTRODUCTION Mobile Computing  A technology that allows transmission of data, via a computer, without having to be connected to a fixed Physical link.
MOBILE DATABASE A mobile database is either a stationary database that can be connected to by a mobile computing device - such as smart phones or PDAs.
Data and database administration
Module 8: Networking Services
Security Issues.
A Study of Wireless Virtual Network Computing
Internet LINGO.
Network Services.
Uses of Computer Networks Computer courses in Chandigarh.
File Transfer Protocol
Specializations Materials Management e-Procurement Strategy
Mobile Computing.
Tiers vs. Layers.
CSE 4340/5349 Mobile Systems Engineering
Mobile Agents M. L. Liu.
Information Technology Ms. Abeer Helwa
Introduction to Computing
Network Architecture By Dr. Shadi Masadeh 1.
Pedro M. Calixto George Chang, Ph.D. Math and Computer Science Dept.
E-LEARNING SOURCES IN COMPUTER NETWORKS SECURITY
Distributed Database Management System
Introduction to Mobile Computing
System-Level Support CIS 640.
Presentation transcript:

NMT’s Computer Science and Engineering Education & Research Programs Dr. Lorie M. Liebrock Chair, Computer Science and Engineering

Associate Professor Ph.D., Computer Science, University of Massachusetts Subhasish Mazumdar Specialities Mobile data management Document databases Integrating heterogeneous data sources

Subhasish Mazumdar Sample Research: Mobile Data Management Mobile devices have increasingly powerful computational ability, but limited computing resources, e.g., battery, storage; possibility of disconnections in network connectivity; Likelihood of loss and theft. Can mobile users be empowered just like users on desktops? No! What if a mobile client locks server data and disconnects (voluntarily/involuntarily)? Server resources may become unavailable to all other clients forever!

Subhasish Mazumdar New solutions are needed to address integrity & security. Our approach assumes a three-tier architecture: (i)server, (ii)stationary support stations, and (iii) the mobile hosts; rewrites global constraints into sufficient local constraints; allows local execution when disconnected while enforcing global integrity constraints; thwarts attempts to reconstruct a database from a stolen portable device; or even from a single query; develops the idea of a lease, i.e., a contract along with the cached data; illuminates the interaction between lease durations and user authority levels; shows that changing range constraints on data in mobile hosts is useful for security.