Reference Hub6
Lightweight Wireless Web Service Communication Through Enhanced Caching Mechanisms

Lightweight Wireless Web Service Communication Through Enhanced Caching Mechanisms

Apostolos Papageorgiou, Marius Schatke, Stefan Schulte, Ralf Steinmetz
Copyright: © 2012 |Volume: 9 |Issue: 2 |Pages: 27
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781466614741|DOI: 10.4018/jwsr.2012040103
Cite Article Cite Article

MLA

Papageorgiou, Apostolos, et al. "Lightweight Wireless Web Service Communication Through Enhanced Caching Mechanisms." IJWSR vol.9, no.2 2012: pp.42-68. http://doi.org/10.4018/jwsr.2012040103

APA

Papageorgiou, A., Schatke, M., Schulte, S., & Steinmetz, R. (2012). Lightweight Wireless Web Service Communication Through Enhanced Caching Mechanisms. International Journal of Web Services Research (IJWSR), 9(2), 42-68. http://doi.org/10.4018/jwsr.2012040103

Chicago

Papageorgiou, Apostolos, et al. "Lightweight Wireless Web Service Communication Through Enhanced Caching Mechanisms," International Journal of Web Services Research (IJWSR) 9, no.2: 42-68. http://doi.org/10.4018/jwsr.2012040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Reducing the size of the wirelessly transmitted data during the invocation of third-party Web services is a worthwhile goal of many mobile application developers. Among many adaptation mechanisms that can be used for the mediation of such Web service invocations, the automated enhancement of caching mechanisms is a promising approach that can spare the re-transmission of entire content fields of the exchanged messages. However, it is usually impeded by technological constraints and by various other factors, such as the inherent risk of using responses that are not fresh, i.e., are not up-to-date. This paper presents the roadmap, the most important technical and algorithmic details, and a thorough evaluation of the first solution for generically and automatically enriching the communication with any third-party Web service in a way that cached responses can be exploited while a freshness of 100% is maintained.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.