Recovery of mobile internet transactions: algorithm, implementation and analysis
暂无分享,去创建一个
[1] Soo Mee Foo,et al. The Wireless Markup Language (WML) , 2002 .
[2] Krithi Ramamritham,et al. Guaranteeing recoverability in electronic commerce , 2001, Proceedings Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2001.
[3] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[4] Stuart D. Milner,et al. Performance and scalability of mobile wireless base-station-oriented networks , 2003, MOCO.
[5] Matjaz B. Juric,et al. Business process execution language for web services , 2004 .
[6] Julian Jang,et al. Transactions in Loosely Coupled Distributed Systems , 2003, ADC.
[7] Shamkant B. Navathe,et al. Mobile User Recovery in the Context of Internet Transactions , 2003, IEEE Trans. Mob. Comput..
[8] Ulrich Berger,et al. Computational Logic , 2001, NATO ASI Series.
[9] Moses Garuba,et al. A ubiquitous stable storage for mobile computing devices , 2001, SAC.
[10] Heon Young Yeom,et al. An efficient recovery scheme for mobile computing environments , 2001, Proceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001.
[11] Roger S. Barga,et al. Measuring and optimizing a system for persistent database sessions , 2001, Proceedings 17th International Conference on Data Engineering.
[12] W. Kent Fuchs,et al. Proxy-based recovery for applications on wireless hand-held devices , 2000, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000.
[13] Julian Jang,et al. Towards a Framework for Capturing Transactional Requirements of Real Workflows , 2002 .
[14] W. Kou. Wireless Application Protocol , 2006 .
[15] Robert S. Boyer,et al. Computational Logic , 1990, ESPRIT Basic Research Series.
[16] Dhiraj K. Pradhan,et al. Recoverable mobile environment: design and trade-off analysis , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.
[17] Krithi Ramamritham,et al. Support for Recovery in Mobile Systems , 2002, IEEE Trans. Computers.
[18] Julian Jang,et al. Expressiveness of Workflow Description Languages , 2003, ICWS.
[19] Christopher G. Lasater,et al. Design Patterns , 2008, Wiley Encyclopedia of Computer Science and Engineering.
[20] Julian Jang,et al. Compensation is Not Enough , 2003 .
[21] Walter H. Kohler,et al. A Survey of Techniques for Synchronization and Recovery in Decentralized Computer Systems , 1981, CSUR.
[22] R. K. Ghosh,et al. Recovery of mobile transactions , 2000, Proceedings 11th International Workshop on Database and Expert Systems Applications.
[23] W. Kent Fuchs,et al. Recovery proxy for wireless applications , 2001, Proceedings 12th International Symposium on Software Reliability Engineering.
[24] Adam Dunkels,et al. Connecting Wireless Sensornets with TCP/IP Networks , 2004, WWIC.
[25] Julian Jang,et al. Just what could possibly go wrong in B2B integration? , 2003, Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003.
[26] Jan Mendling,et al. Business Process Execution Language for Web Services , 2006, EMISA Forum.
[27] W. Kent Fuchs,et al. Message logging optimization for wireless networks , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.
[28] Bart Preneel,et al. The Wireless Application Protocol , 2005, Int. J. Netw. Secur..
[29] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .