About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
MobiCom 1995
Conference paper
Intelligent file hoarding for mobile computers
Abstract
Mobile computing adds a new wrinkle to the age-old problem of caching. Today's wireless links are both slow and expensive, and are not always available to a user. Therefore, when a mobile user is disconnected, a cache miss means (at best) a substantial cost in time and money, or (at worst) a complete halt to work if critical information has not been cached. Existing solutions to this problem rely on some combination of explicit hoard profiles and spying on a user's file accesses. Neither of these approaches is ideal in terms of reliability or user-friendliness. Our solution might be called transparent analytical spying. Instead of simply recording a list of file accesses, we analyze program executions and tie them to specific files. By observing multiple executions of a program, we are able to build sets of files associated with each program, and can heuristically separate application files from user files. We can then present a high-level view to the user that is similar to loading a briefcase. We have an implementation of our hoarding tool running under OS/2.