Autonomous assurance technique in distributed database using mobile agent

K. Hirai, K. Mori

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Due to information technology advances, the business environment and user requirements are rapidly changing, and companies have been trying to cooperate among themselves to cope with the dynamic market. However, in an integrated system such as supply chain management (SCM), they have to coexist without violating their own requirements of real-time property and fault-tolerance under the evolving situation. That is, these integrated systems should be assured for their own characteristics. In order to realize the system, each of which has its own database (DB), with heterogeneous requirements-real-time property and fault-tolerance, an assurance system architecture is proposed. In this system architecture, each system has autonomy to manage access to the DB in cooperation with other systems through an autonomous mobile agent (MA). This MA has an "allowable volume" which means each system can update its DB independently, and the MA allocates the AV into systems by moving around them dynamically. While data consistency is achieved in this system architecture, the effectiveness of this assurance system is experimentally shown with the SCM system.

Original languageEnglish
Title of host publicationProceedings - 2000 International Workshop on Autonomous Decentralized System
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages180-187
Number of pages8
ISBN (Print)0780365755, 9780780365759
DOIs
Publication statusPublished - 2000
Externally publishedYes
EventInternational Workshop on Autonomous Decentralized System - Chengdu, China
Duration: 2000 Sept 212000 Sept 23

Other

OtherInternational Workshop on Autonomous Decentralized System
Country/TerritoryChina
CityChengdu
Period00/9/2100/9/23

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Autonomous assurance technique in distributed database using mobile agent'. Together they form a unique fingerprint.

Cite this