{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:04:09Z","timestamp":1754157849545,"version":"3.41.2"},"reference-count":14,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2006,12,31]],"date-time":"2006-12-31T00:00:00Z","timestamp":1167523200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,2,1]]},"abstract":"<jats:p>Caching is commonly used to improve the performance of mobile computers. Due to the limitations of wireless networks (e.g. low bandwidth, intermittent connectivity), ensuring the consistency of cached data becomes a difficult issue. Existing research have shown that broadcast\u2010based cache invalidation techniques can effectively maintain cache consistency for mobile applications. However, most existing performance analysis of cache invalidation algorithms were carried out through simulation. Therefore, an analytical study is important to provide a deeper understanding of broadcast\u2010based invalidation techniques. In this paper, we present detailed analytical models of the major existing cache invalidation schemes. The models provide a basis to highlight the strengths and weaknesses of the different schemes and facilitate further investigation into cache invalidation for mobile environments. Extensive simulation has also been performed, and verifies the accuracy of the models developed.<\/jats:p>","DOI":"10.1108\/17427370780000137","type":"journal-article","created":{"date-parts":[[2010,6,5]],"date-time":"2010-06-05T07:14:05Z","timestamp":1275722045000},"page":"3-14","source":"Crossref","is-referenced-by-count":1,"title":["An analytical study of cache invalidation algorithms in mobile environments"],"prefix":"10.1108","volume":"2","author":[{"given":"Kwong","family":"Yuen Lai","sequence":"first","affiliation":[]},{"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Bertok","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"p_1","doi-asserted-by":"publisher","DOI":"10.1145\/191839.191844"},{"key":"p_2","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223816"},{"key":"p_3","first-page":"489","volume-title":"Wireless Networks, 5(6)","author":"Cai J.","year":"1999"},{"key":"p_4","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345945"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013616213333"},{"key":"p_6","doi-asserted-by":"publisher","DOI":"10.1109\/71.940744"},{"key":"p_7","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(97)00046-7"},{"key":"p_8","doi-asserted-by":"publisher","DOI":"10.1145\/952700.952705"},{"key":"p_9","doi-asserted-by":"publisher","DOI":"10.1109\/71.946652"},{"key":"p_10","unstructured":"M. R. Lindsey, M. Papadopouli, F. Chinchilla and A. Singh. Measurement and analysis of the spatial locality of wireless information and mobility patterns in a campus. Technical Report, University of North Carolina, TR03-006,March 2003."},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749260"},{"key":"p_12","first-page":"15","volume-title":"Special issue on Characterization and Performance Evaluation, 2(1-2)","author":"Barford P.","year":"1999"},{"volume-title":"http:\/\/whale.hit.bme.hu\/omnetpp","year":"2003","author":"Varga A.","key":"p_13"},{"key":"p_14","first-page":"264","volume-title":"Proceedings of the International Symposium on High Performance Distributed Computing","author":"Hu Q.","year":"1997"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427370780000137\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427370780000137\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:22:21Z","timestamp":1753402941000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/2\/1\/3-14\/161331"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12,31]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,2,1]]}},"alternative-id":["10.1108\/17427370780000137"],"URL":"https:\/\/doi.org\/10.1108\/17427370780000137","relation":{},"ISSN":["1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2006,12,31]]}}}