Reference Hub1
Migrating Web Services in Mobile and Wireless Environments

Migrating Web Services in Mobile and Wireless Environments

Myung-Woo Park, Yeon-Seok Kim, Kyong-Ho Lee
Copyright: © 2009 |Volume: 6 |Issue: 2 |Pages: 19
ISSN: 1545-7362|EISSN: 1546-5004|ISSN: 1545-7362|EISBN13: 9781615204458|EISSN: 1546-5004|DOI: 10.4018/jwsr.2009092101
Cite Article Cite Article

MLA

Park, Myung-Woo, et al. "Migrating Web Services in Mobile and Wireless Environments." IJWSR vol.6, no.2 2009: pp.1-19. http://doi.org/10.4018/jwsr.2009092101

APA

Park, M., Kim, Y., & Lee, K. (2009). Migrating Web Services in Mobile and Wireless Environments. International Journal of Web Services Research (IJWSR), 6(2), 1-19. http://doi.org/10.4018/jwsr.2009092101

Chicago

Park, Myung-Woo, Yeon-Seok Kim, and Kyong-Ho Lee. "Migrating Web Services in Mobile and Wireless Environments," International Journal of Web Services Research (IJWSR) 6, no.2: 1-19. http://doi.org/10.4018/jwsr.2009092101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Mobile devices enabled with Web services are being considered as equal participants of the Web services environment. The frequent mobility of devices and the intermittent disconnection of wireless network require migrating or replicating Web services onto adjacent devices appropriately. This article proposes an efficient method for migrating and replicating Web services among mobile devices through code splitting. Specifically, the proposed method splits the source code of a Web service into subcodes based on users’ preferences for its constituent operations. The subcode with a higher preference is migrated earlier than others. The proposed method also replicates a Web service to other devices to enhance its performance by considering context information such as network traffic or the parameter size of its operations. To evaluate the performance of the proposed method, the effect of the code splitting on migration was analyzed. Furthermore, to show the feasibility of the proposed migration method, three application scenarios were devised and implemented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.