transactions T that hold locks on resources required
by U are blocked, by obeying both possible outcomes
of the blocked transactions T . This allows transac-
tions U to commit even if they conflict with pending
transactions T .
We have focused on database table definitions,
on arbitrary read- and write-operations, and we pro-
posed a rewrite rule system that allows all these kinds
of operations to be executed on a database that uses
Bi-State-Termination. Furthermore, we presented a
technique for checking typical integrity constraints
even in situations where a database using Bi-State-
Termination is not sure about its current state as pend-
ing transactions may commit or abort. Our proposed
technique for consistency constraint checking allows
checking whether or not a transaction may violate
given constraints. The experimental evaluation has
shown the feasibility of our constraints checker and
has proposed an optimization for checking time con-
suming multiple tuples constraints.
Altogether, the constraint checking technique pro-
posed in this paper is feasible and efficient, and it can
be done in combination with Bi-State-Termination
in mobile databases, even in case of network fail-
ures. This is why we consider the constraint check-
ing technique as a very important addition to Bi-
State-Termination, which is useful to integrate mobile
databases into business transactions.
REFERENCES
Cellary, W. and Jomier, G. (1990). Consistency of versions
in object-oriented databases. In McLeod, D., Sacks-
Davis, R., and Schek, H.-J., editors, 16th International
Conference on Very Large Data Bases, August 13-16,
1990, Brisbane, Queensland, Australia, Proceedings,
pages 432–441. Morgan Kaufmann.
Chen, I.-M. A., Markowitz, V. M., Letovsky, S., Li, P., and
Fasman, K. H. (1996). Version management for sci-
entific databases. In Apers, P. M. G., Bouzeghoub,
M., and Gardarin, G., editors, Advances in Database
Technology - EDBT’96, 5th International Conference
on Extending Database Technology, Avignon, France,
March 25-29, 1996, Proceedings, volume 1057 of
Lecture Notes in Computer Science, pages 289–303.
Springer.
Gray, J. (1978). Notes on data base operating systems. In
Flynn, M. J., Gray, J., Jones, A. K., et al., editors,
Advanced Course: Operating Systems, volume 60 of
Lecture Notes in Computer Science, pages 393–481.
Gray, J. and Lamport, L. (2006). Consensus on transaction
commit. ACM Trans. Database Syst., 31(1):133–160.
Gray, J. and Reuter, A. (1993). Transaction Processing:
Concepts and Techniques. Morgan Kaufmann.
Katz, R. H. (1990). Toward a unified framework for ver-
sion modeling in engineering databases. ACM Com-
put. Surv., 22(4):375–409.
Kohler, W., Shah, A., and Raab, F. (1991). Overview
of TPC Benchmark C: The Order-Entry Benchmark.
Technical report, http://www.tpc.org, Transaction Pro-
cessing Performance Council.
Kumar, V., Prabhu, N., Dunham, M. H., and Seydim, A. Y.
(2002). Tcot-a timeout-based mobile transaction com-
mitment protocol. IEEE Trans. Com., 51(10):1212–
1218.
Obermeier, S. and Böttcher, S. (2007). Avoiding infinite
blocking of mobile transactions. In Proceedings of the
11th International Database Engineering & Applica-
tions Symposium (IDEAS), Banff, Canada.
Reddy, P. K. and Kitsuregawa, M. (2003). Reducing the
blocking in two-phase commit with backup sites. Inf.
Process. Lett., 86(1):39–47.
Reddy, P. K. and Kitsuregawa, M. (2004). Speculative lock-
ing protocols to improve performance for distributed
database systems. IEEE Transactions on Knowledge
and Data Engineering, 16(2):154–169.
Skeen, D. (1981). Nonblocking commit protocols. In Lien,
Y. E., editor, Proceedings of the 1981 ACM SIGMOD
International Conference on Management of Data,
Ann Arbor, Michigan, pages 133–142. ACM Press.
CONSTRAINT CHECKING FOR NON-BLOCKING TRANSACTION PROCESSING IN MOBILE AD-HOC
NETWORKS
175