Autonomous assurance technique in distributed database using mobile agent

K. Hirai, K. Mori

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)


Due to information technology advances, the business environment and user requirements are rapidly changing, and companies have been trying to cooperate among themselves to cope with the dynamic market. However, in an integrated system such as supply chain management (SCM), they have to coexist without violating their own requirements of real-time property and fault-tolerance under the evolving situation. That is, these integrated systems should be assured for their own characteristics. In order to realize the system, each of which has its own database (DB), with heterogeneous requirements-real-time property and fault-tolerance, an assurance system architecture is proposed. In this system architecture, each system has autonomy to manage access to the DB in cooperation with other systems through an autonomous mobile agent (MA). This MA has an "allowable volume" which means each system can update its DB independently, and the MA allocates the AV into systems by moving around them dynamically. While data consistency is achieved in this system architecture, the effectiveness of this assurance system is experimentally shown with the SCM system.

Original languageEnglish
Title of host publicationProceedings - 2000 International Workshop on Autonomous Decentralized System
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages8
ISBN (Print)0780365755, 9780780365759
Publication statusPublished - 2000
Externally publishedYes
EventInternational Workshop on Autonomous Decentralized System - Chengdu, China
Duration: 2000 Sept 212000 Sept 23


OtherInternational Workshop on Autonomous Decentralized System

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Control and Systems Engineering


Dive into the research topics of 'Autonomous assurance technique in distributed database using mobile agent'. Together they form a unique fingerprint.

Cite this