首页 > 最新文献

2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

英文 中文
Using distributed consistent branching for efficient reconciliation of mobile workspaces 使用分布式一致分支来高效地协调移动工作区
Felix Hupfeld, M. Gordon
Optimistic replication allows mobile workspaces to remain accessible during interrupted network access, but require consecutive handling of any conflicts. When conflict handling requires manual intervention by the user, the system must not require that conflicts are resolved immediatley after their detection. We present a log-based algorithm for reconciling changes to replicated data that supports deferred manual conflict resolution, while sharing the favorable scalability properties of log-based approaches of small storage and communication overhead. Simulation results validate our design and show that it compares favorably in the relevant metrics with version vector-based designs.
乐观复制允许移动工作区在中断的网络访问期间保持可访问性,但需要连续处理任何冲突。当冲突处理需要用户手动干预时,系统不能要求在检测到冲突后立即解决冲突。我们提出了一种基于日志的算法,用于协调对复制数据的更改,该算法支持延迟的手动冲突解决,同时共享基于日志的方法的有利可伸缩性属性,具有较小的存储和通信开销。仿真结果验证了我们的设计,并表明它在相关指标上优于基于版本向量的设计。
{"title":"Using distributed consistent branching for efficient reconciliation of mobile workspaces","authors":"Felix Hupfeld, M. Gordon","doi":"10.1109/COLCOM.2006.361837","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361837","url":null,"abstract":"Optimistic replication allows mobile workspaces to remain accessible during interrupted network access, but require consecutive handling of any conflicts. When conflict handling requires manual intervention by the user, the system must not require that conflicts are resolved immediatley after their detection. We present a log-based algorithm for reconciling changes to replicated data that supports deferred manual conflict resolution, while sharing the favorable scalability properties of log-based approaches of small storage and communication overhead. Simulation results validate our design and show that it compares favorably in the relevant metrics with version vector-based designs.","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122560966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Managing and Recovering High Data Availability in a DHT under Churn 在DHT中管理和恢复高数据可用性
P. Knezevic, A. Wombacher, T. Risse
An essential issue in peer-to-peer data management is to keep data highly available all the time. A common idea is to replicate data hoping that at least one replica is available when needed. However, due to churns, the number of created replicas could be not sufficient for guaranteeing the intended data availability. If the number of replicas is computed according to the lowest expected peer availability (a classical case), but the expectation were too high, then the peer availability after a churn could be too low, and the system could not be able to recover the requested data availability. The paper is a continuation of previous work (Knezevic et al., 2006) and presents a replication protocol that delivers a configured data availability guarantee, and is resistant to, or recovers fast from churns. The protocol is based on a distributed hash table (DHT), measurement of peer online probability in the system, and adjustment of the number of replicas accordingly. The evaluation shows that we are able to maintain or recover the requested data availability during or shortly after stronger or weaker churns, and at the same time the storage overhead is close to the theoretical minimum
点对点数据管理的一个基本问题是始终保持数据的高可用性。一个常见的想法是复制数据,希望在需要时至少有一个副本可用。但是,由于频繁切换,创建的副本数量可能不足以保证预期的数据可用性。如果副本的数量是根据最低期望的对等可用性计算的(典型情况),但是期望过高,那么在中断后对等可用性可能过低,系统无法恢复所请求的数据可用性。这篇论文是之前工作(Knezevic et al., 2006)的延续,并提出了一种复制协议,该协议提供了配置的数据可用性保证,并且可以抵抗或从中断中快速恢复。该协议基于分布式哈希表(DHT),测量系统中对等在线的概率,并相应地调整副本的数量。评估表明,我们能够在较强或较弱的震荡期间或之后不久维护或恢复所请求的数据可用性,同时存储开销接近理论最小值
{"title":"Managing and Recovering High Data Availability in a DHT under Churn","authors":"P. Knezevic, A. Wombacher, T. Risse","doi":"10.1109/COLCOM.2006.361874","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361874","url":null,"abstract":"An essential issue in peer-to-peer data management is to keep data highly available all the time. A common idea is to replicate data hoping that at least one replica is available when needed. However, due to churns, the number of created replicas could be not sufficient for guaranteeing the intended data availability. If the number of replicas is computed according to the lowest expected peer availability (a classical case), but the expectation were too high, then the peer availability after a churn could be too low, and the system could not be able to recover the requested data availability. The paper is a continuation of previous work (Knezevic et al., 2006) and presents a replication protocol that delivers a configured data availability guarantee, and is resistant to, or recovers fast from churns. The protocol is based on a distributed hash table (DHT), measurement of peer online probability in the system, and adjustment of the number of replicas accordingly. The evaluation shows that we are able to maintain or recover the requested data availability during or shortly after stronger or weaker churns, and at the same time the storage overhead is close to the theoretical minimum","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129592465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure Communication and Cooperation via Shared Workspaces 通过共享工作区实现安全通信与合作
W. Appelt, Sanjin Pajo, W. Prinz
In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model as well a recent extension to the BSCW Shared Workspace System (Appelt, 1999) that satisfies high security requirements for communication and cooperation in an inter-organizational setting by using encryption technology
在本文中,我们讨论了基于Web的CSCW系统的安全问题,并描述了一个概念模型以及最近对BSCW共享工作空间系统(Appelt, 1999)的扩展,该系统通过使用加密技术满足了组织间环境中通信和合作的高安全性要求
{"title":"Secure Communication and Cooperation via Shared Workspaces","authors":"W. Appelt, Sanjin Pajo, W. Prinz","doi":"10.1109/COLCOM.2006.361865","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361865","url":null,"abstract":"In this paper, we discuss security issues of Web based CSCW systems and describe a conceptual model as well a recent extension to the BSCW Shared Workspace System (Appelt, 1999) that satisfies high security requirements for communication and cooperation in an inter-organizational setting by using encryption technology","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129683220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Secure Information Sharing and Management in Grid Environments 网格环境下的安全信息共享与管理
Jing Jin, Gail-Joon Ahn
The introduction of service-oriented paradigm in grid and corresponding Web services standards has recently demanded the evolution of access control solutions to support finegrained authorization requirements and dynamic natures derived from grid environments. In this paper, we present a role-based authorization infrastructure for data sharing and management services in grid. Our infrastructure advocates a dynamic and flexible resource-centric authorization approach with features of distributed role-based access control and systematic delegation of administrative authority. The infrastructure seamlessly integrates the existing XACML-based policy framework and authorization services in the RAMARS framework. We discuss our proof-of-concept prototype system that supports Web services and SAML based authorization assertions. We also describe how the framework can be deployed in being compatible with an open grid service architecture
在网格和相应的Web服务标准中引入面向服务的范式,最近要求发展访问控制解决方案,以支持细粒度的授权需求和源自网格环境的动态特性。本文提出了一种基于角色的网格数据共享和管理服务授权架构。我们的基础设施提倡动态和灵活的以资源为中心的授权方法,具有分布式基于角色的访问控制和系统的管理权限委托的特性。基础设施无缝地集成了RAMARS框架中现有的基于xacl的策略框架和授权服务。我们将讨论支持Web服务和基于SAML的授权断言的概念验证原型系统。我们还描述了如何部署该框架以与开放网格服务体系结构兼容
{"title":"Towards Secure Information Sharing and Management in Grid Environments","authors":"Jing Jin, Gail-Joon Ahn","doi":"10.1109/COLCOM.2006.361892","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361892","url":null,"abstract":"The introduction of service-oriented paradigm in grid and corresponding Web services standards has recently demanded the evolution of access control solutions to support finegrained authorization requirements and dynamic natures derived from grid environments. In this paper, we present a role-based authorization infrastructure for data sharing and management services in grid. Our infrastructure advocates a dynamic and flexible resource-centric authorization approach with features of distributed role-based access control and systematic delegation of administrative authority. The infrastructure seamlessly integrates the existing XACML-based policy framework and authorization services in the RAMARS framework. We discuss our proof-of-concept prototype system that supports Web services and SAML based authorization assertions. We also describe how the framework can be deployed in being compatible with an open grid service architecture","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132480594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ROBAC: Scalable Role and Organization Based Access Control Models 基于可伸缩角色和组织的访问控制模型
Zhixiong Zhang, Xinwen Zhang, R. Sandhu
In RBAC, roles are typically created based on job functions inside an organization. Traditional RBAC does not scale up well for modeling security policies spanning multiple organizations. To solve this problem, a family of extended RBAC models called role and organization based access control (ROBAC) models is proposed and formalized in this paper. Two examples are used to motivate and demonstrate the usefulness of ROBAC. Comparison between ROBAC and other related RBAC models is given. We show that ROBAC can significantly reduce administration complexity for Web and Internet-based applications involving a large number of organizations. Some administrative issues for ROBAC are identified and discussed. Although the theoretical-expressive power of ROBAC is the same as that of RBAC, it is more succinct and intuitive to use ROBAC than to use RBAC when applications involve many organizations
在RBAC中,角色通常是根据组织内部的工作功能创建的。传统的RBAC不能很好地扩展到对跨多个组织的安全策略进行建模。为了解决这个问题,本文提出了一组扩展的RBAC模型,称为基于角色和组织的访问控制(ROBAC)模型。用两个例子来激励和演示ROBAC的有用性。并与其他相关的RBAC模型进行了比较。我们展示了ROBAC可以显著降低涉及大量组织的基于Web和internet的应用程序的管理复杂性。确定并讨论了ROBAC的一些管理问题。虽然ROBAC的理论表达能力与RBAC相同,但当应用程序涉及许多组织时,使用ROBAC比使用RBAC更简洁和直观
{"title":"ROBAC: Scalable Role and Organization Based Access Control Models","authors":"Zhixiong Zhang, Xinwen Zhang, R. Sandhu","doi":"10.1109/COLCOM.2006.361879","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361879","url":null,"abstract":"In RBAC, roles are typically created based on job functions inside an organization. Traditional RBAC does not scale up well for modeling security policies spanning multiple organizations. To solve this problem, a family of extended RBAC models called role and organization based access control (ROBAC) models is proposed and formalized in this paper. Two examples are used to motivate and demonstrate the usefulness of ROBAC. Comparison between ROBAC and other related RBAC models is given. We show that ROBAC can significantly reduce administration complexity for Web and Internet-based applications involving a large number of organizations. Some administrative issues for ROBAC are identified and discussed. Although the theoretical-expressive power of ROBAC is the same as that of RBAC, it is more succinct and intuitive to use ROBAC than to use RBAC when applications involve many organizations","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116205467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Operational Security Requirements for Large Collaborative Compute Infrastructures 大型协作计算基础设施的操作安全需求
H. Khurana, J. Basney, Von Welch, R. Campbell
Large collaborative infrastructures that span multiple organizations such as those that enable grid computing and scientific experimentation are being deployed and used today. In order to secure these infrastructures a comprehensive requirements study is needed that takes into account the novel risks, threats, and operational issues brought on by the large-scale, distributed nature of these systems. In this paper we argue that gaps in security policies and procedures combined with organizational autonomy are the primary drivers motivating a set of requirements that go beyond those observed today. With three example infrastructures in mind, namely, Teragrid, LHC Grid, and GEM, we explore the novel risks, threats, and operational issues to compose a set of operational security requirements; the satisfaction of which are essential for securing such large collaborative infrastructures
现在正在部署和使用跨越多个组织的大型协作基础设施,例如那些支持网格计算和科学实验的基础设施。为了确保这些基础设施的安全,需要进行全面的需求研究,考虑到这些系统的大规模、分布式特性带来的新风险、威胁和操作问题。在本文中,我们认为安全策略和过程与组织自治相结合的差距是激发超出当前观察到的一组需求的主要驱动因素。考虑到三个示例基础设施,即Teragrid、LHC Grid和GEM,我们探索了新的风险、威胁和操作问题,以组成一组操作安全需求;满足这些需求对于确保此类大型协作基础设施的安全至关重要
{"title":"Operational Security Requirements for Large Collaborative Compute Infrastructures","authors":"H. Khurana, J. Basney, Von Welch, R. Campbell","doi":"10.1109/COLCOM.2006.361884","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361884","url":null,"abstract":"Large collaborative infrastructures that span multiple organizations such as those that enable grid computing and scientific experimentation are being deployed and used today. In order to secure these infrastructures a comprehensive requirements study is needed that takes into account the novel risks, threats, and operational issues brought on by the large-scale, distributed nature of these systems. In this paper we argue that gaps in security policies and procedures combined with organizational autonomy are the primary drivers motivating a set of requirements that go beyond those observed today. With three example infrastructures in mind, namely, Teragrid, LHC Grid, and GEM, we explore the novel risks, threats, and operational issues to compose a set of operational security requirements; the satisfaction of which are essential for securing such large collaborative infrastructures","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Modeling and Analysis Approach for Mobile Information Systems 移动信息系统的建模与分析方法
V. Gruhn, André Köhler
This paper introduces a graphical modeling notation based on coloured Petri nets for the performance and cost evaluation of mobile applications. When developing such an application some restrictions due to the low bandwidth of mobile networks need to be considered. The notation can be used to model the workflow of a mobile application with just a small effort. The resulting model can be (automatically) transformed into a coloured Petri net for simulating the communication behaviour depending on typical user interactions. The simulation results are an important basis for improving the applications performance and the occurring costs for using mobile networks
介绍了一种基于彩色Petri网的图形化建模方法,用于移动应用程序的性能和成本评估。在开发这样的应用程序时,由于移动网络的低带宽,需要考虑一些限制。这种表示法可以用来对移动应用程序的工作流建模,只需要一点点努力。所得到的模型可以(自动)转换为彩色Petri网,用于模拟依赖于典型用户交互的通信行为。仿真结果是提高应用性能和降低移动网络使用成本的重要依据
{"title":"A Modeling and Analysis Approach for Mobile Information Systems","authors":"V. Gruhn, André Köhler","doi":"10.1109/COLCOM.2006.361853","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361853","url":null,"abstract":"This paper introduces a graphical modeling notation based on coloured Petri nets for the performance and cost evaluation of mobile applications. When developing such an application some restrictions due to the low bandwidth of mobile networks need to be considered. The notation can be used to model the workflow of a mobile application with just a small effort. The resulting model can be (automatically) transformed into a coloured Petri net for simulating the communication behaviour depending on typical user interactions. The simulation results are an important basis for improving the applications performance and the occurring costs for using mobile networks","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122034378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Tasks and Semi-structured Messages to Support Decision Follow Up 使用任务和半结构化消息来支持决策跟进
Carla Valle, W. Prinz, M. Jarke
This paper describes the design and implementation of a coordination mechanism to support follow up of decisions made in meetings, using task management and semi-structured messages in an integrated way. Two questions lead our research: i) can a set of group support mechanisms, enabling the link between pre-meeting, meeting and post-meeting activities, allow for better coordination of decisions being implemented?; ii) can electronic elements, which belong to daily project scenarios, provide awareness of decision implementation's problems? Our evaluations and conclusions indicate that such elements (ie. tasks and emails) provide means for coordination of decision follow up
本文描述了一个协调机制的设计和实现,以集成的方式使用任务管理和半结构化消息来支持会议决策的后续工作。我们的研究主要涉及两个问题:1)一套小组支持机制,使会前、会议和会后活动之间的联系能够更好地协调正在实施的决策吗?Ii)属于日常项目场景的电子元素能否提供决策执行问题的意识?我们的评估和结论表明,这些因素(即:任务和电子邮件)提供了协调决策跟进的手段
{"title":"Using Tasks and Semi-structured Messages to Support Decision Follow Up","authors":"Carla Valle, W. Prinz, M. Jarke","doi":"10.1109/COLCOM.2006.361866","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361866","url":null,"abstract":"This paper describes the design and implementation of a coordination mechanism to support follow up of decisions made in meetings, using task management and semi-structured messages in an integrated way. Two questions lead our research: i) can a set of group support mechanisms, enabling the link between pre-meeting, meeting and post-meeting activities, allow for better coordination of decisions being implemented?; ii) can electronic elements, which belong to daily project scenarios, provide awareness of decision implementation's problems? Our evaluations and conclusions indicate that such elements (ie. tasks and emails) provide means for coordination of decision follow up","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flexible Definition and Resolution of Conflicts through Multi-level Editing 通过多层次编辑灵活定义和解决冲突
C. Ignat, M. Norrie
Version control systems are widely used to support a group of people working together on a set of documents over a network by merging their changes into the same source repository. The existing versioning systems offer limited support concerning conflict resolution and tracking of user activity. In this paper we propose a multi-level editing approach that keeps the editing operations that refer to an element of a hierarchical document associated with that element. In this way, customisable merging is achieved, where the conflicts can be specified and resolved at different granularity levels
版本控制系统被广泛用于支持一组人通过网络一起处理一组文档,方法是将他们的更改合并到相同的源存储库中。现有的版本控制系统在冲突解决和用户活动跟踪方面提供了有限的支持。在本文中,我们提出了一种多级编辑方法,该方法使引用分层文档中的元素的编辑操作与该元素相关联。通过这种方式,可以实现可定制的合并,其中可以在不同的粒度级别上指定和解决冲突
{"title":"Flexible Definition and Resolution of Conflicts through Multi-level Editing","authors":"C. Ignat, M. Norrie","doi":"10.1109/COLCOM.2006.361869","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361869","url":null,"abstract":"Version control systems are widely used to support a group of people working together on a set of documents over a network by merging their changes into the same source repository. The existing versioning systems offer limited support concerning conflict resolution and tracking of user activity. In this paper we propose a multi-level editing approach that keeps the editing operations that refer to an element of a hierarchical document associated with that element. In this way, customisable merging is achieved, where the conflicts can be specified and resolved at different granularity levels","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115972492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Efficient Synchronous Collaborative Editing System Employing Dynamic Locking of Varying Granularity in Generalized Document Trees 基于变粒度动态锁定的高效同步协同编辑系统
J. Preston, S. Prasad
The primary goals in a synchronous collaborative editing system (CES) involve ensuring a high level of concurrent access while maintaining the properties of the CCI model. We revisit the idea of applying lock-based concurrency control algorithms to manage access to a shared document; this research overcomes the traditional problem of reduced concurrent access inherent in pessimistic concurrency control by dynamically managing the size of the portion of document locked based upon user demand, scaling up and down the lock granularity to accommodate user write requests. We present algorithms to efficiently maximize concurrent access while utilizing caching techniques to reduce communication costs. We also discuss how OT and other optimistic concurrency control techniques may be incorporated within our approach - leveraging best practices of both techniques. We conclude with an analysis of the communication and computational costs of our approach and compare these costs to costs incurred using OT-based concurrency control
同步协作编辑系统(CES)的主要目标包括在维护CCI模型属性的同时确保高水平的并发访问。我们重新考虑应用基于锁的并发控制算法来管理对共享文档的访问;本研究通过根据用户需求动态管理文档锁定部分的大小,并根据用户的写请求调整锁定粒度,从而克服了悲观并发控制中固有的并发访问减少的传统问题。我们提出了有效地最大化并发访问的算法,同时利用缓存技术来降低通信成本。我们还讨论了如何将OT和其他乐观并发控制技术整合到我们的方法中——利用这两种技术的最佳实践。最后,我们分析了我们的方法的通信和计算成本,并将这些成本与使用基于ot的并发控制所产生的成本进行了比较
{"title":"An Efficient Synchronous Collaborative Editing System Employing Dynamic Locking of Varying Granularity in Generalized Document Trees","authors":"J. Preston, S. Prasad","doi":"10.1109/COLCOM.2006.361858","DOIUrl":"https://doi.org/10.1109/COLCOM.2006.361858","url":null,"abstract":"The primary goals in a synchronous collaborative editing system (CES) involve ensuring a high level of concurrent access while maintaining the properties of the CCI model. We revisit the idea of applying lock-based concurrency control algorithms to manage access to a shared document; this research overcomes the traditional problem of reduced concurrent access inherent in pessimistic concurrency control by dynamically managing the size of the portion of document locked based upon user demand, scaling up and down the lock granularity to accommodate user write requests. We present algorithms to efficiently maximize concurrent access while utilizing caching techniques to reduce communication costs. We also discuss how OT and other optimistic concurrency control techniques may be incorporated within our approach - leveraging best practices of both techniques. We conclude with an analysis of the communication and computational costs of our approach and compare these costs to costs incurred using OT-based concurrency control","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127532624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1