Recovering Mobile Users in the Context of Internet Transactions (iTXs)

نویسندگان

  • Kaushik Dutta
  • Debra VanderMeer
  • Anindya Datta
  • Krithi Ramamritham
چکیده

With the expansion of Web sites to include business functions, a user interfaces with e-businesses through an interactive and multi-step process, which is often time-consuming. A loss of connection, or any other system failure, can result in the loss of work accomplished prior to the disruption. This work must then be repeated upon subsequent reconnection { often at signi cant cost in time and computation. In mobile wireless environments, this \disconnection-reconnection-repeat work" cycle may cause web clients to incur substantial monetary as well as resource (such as battery power) costs. With the introduction of high-speed 3G networks, the use of mobile devices to access Internet applications will no doubt increase dramatically, making this problem more acute. Consider a scenario in which a user is buying an airline ticket over his wireless Internet connection. He rst logs on to the airline site with his frequent ier number, then checks his frequent ier mileage. He then enters his preferred travel dates and destination, and chooses among the itineraries o ered by the site, selects his seat, enters his credit card information, and receives a con rmation of the purchase. If the user's wireless connection drops (as occurs frequently [6]) late in this interaction, e.g., during the purchase step, he must reconnect to the Internet, and restart the sequence of actions. This includes expensive steps, such as processor-intensive login and authentication, I/O intensive database lookups, as well as consume valuable connections to the database. Signi cant amounts of time and e ort are wasted in redoing previously completed work, and, in the case of a wireless environment, there are additional costs in battery resources and airtime. In the scenario described above, we would like to be able to avoid the repetition of work (computation, communication, I/O) required after a connection disruption. Ideally, we would like to reduce the cost of recovering a user's interaction. Much like a database transaction, in many ways, this interaction consists of a number of actions aimed at achieving a particular goal (or set of goals). However, the recovery of such interactions is quite di erent from the classical notion of transaction recovery. In recovering transactions, the focus is on ensuring that the underlying database system is rendered consistent. Thus, if a transaction prematurely aborts, the transaction is rolled back and is resubmitted after the database system recovers. Here, though, the database and application systems have the necessary recovery components in place to recover the database system. These system recovery components do not address the situation where the client portion of a user's interaction history is lost in a connection failure. What is needed here is a mechanism through which users can eÆciently and quickly restart from an appropriate point prior to disconnection (yet subsequent to the beginning of the interaction) so that the interactions can resume from that intermediate point. Thus, our concern is not \system recovery", but rather \user recovery". Note that the \user recovery" problem is not equivalent to the classical database transaction-processing and recovery problem. To illustrate this point, we brie y discuss the di erences between the two problem domains. The theory and application of transaction-based processing in the context of database systems are well-researched topics. Early work, such as [1], describes the basic tenets of transaction processing associated protocols. Long transactions (e.g., Sagas) are discussed in [5]. The metaphor of transaction processing has been extended to other application areas. The ACTA framework [3] describes a formal framework for extending the idea of a transaction to other areas. For example, [2] describes work ow processing using transactions and work ow templates, while [7] utilizes transactions to model mobile interactions. All the works cited above have one idea in common: the activity modeled as a transaction consists of a pre-de ned sequence of operations (typically called a template in the work ow literature). However, user activity with the Web often progresses in a \stream-of-consciousness" fashion, where neither the user nor the site knows the which operation will come next in the interaction.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile User Recovery in the Context of Internet Transactions

With the expansion of Web sites to include business functions, a user interfaces with e-businesses through an interactive and multistep process, which is often time-consuming. For mobile users accessing the Web over digital cellular networks, the failure of the wireless link, a frequent occurrence, can result in the loss of work accomplished prior to the disruption. This work must then be repea...

متن کامل

Designing an Intelligent Intrusion Detection System in the Electronic Banking Industry Using Fuzzy Logic

One of the most important obstacles to using Internet banking is the lack of Stability of transactions and some misuse in the course of transactions it is financial. That is why preventing unauthorized access Crime detection is one of the major issues in financial institutions and banks. In this article, a system of intelligence has been designed that recognizes Suspicious and unusual behaviors...

متن کامل

Analysis and Development of Technology Acceptance Model in Mobile Bank Field

Internet-based banking (Internet bank) has limitations such as access to the Internet Network and PC (Personal Computer) in addition to providing bank services at any time and easily to customers. The provision of mobile phone services with the title of Mobile Bank was introduced to eliminate these restrictions and limitations. Due to the importance of technology adoption by users, in this rese...

متن کامل

سیستم پیشنهاد دهنده زمینه‌آگاه برای انتخاب گوشی تلفن همراه با ترکیب روش‌های تصمیم‌گیری جبرانی و غیرجبرانی

Recommender systems suggest proper items to customers based on their preferences and needs. Needed time to search is reduced and the quality of customer’s choice is increased using recommender systems. The context information like time, location and user behaviors can enhance the quality of recommendations and customer satisfication in such systems. In this paper a context aware recommender sys...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001