Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing 2000
DOI: 10.1145/343477.343543
|View full text |Cite
|
Sign up to set email alerts
|

1/k phase stamping for continuous shared data (extended abstract)

Abstract: Interactive distributed applications are a relatively new class of applications that are enabled by sharing continuously evolving data across distributed sites (and users). The characteristics of application data include very fine-grained updates that can atomically access a subset of the shared data, masking of update effects, and irregular locality and contention for access. Existing programming approaches are not appropriate for programming such continuous shared data in a wide-area environment.We define an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2006
2006
2006
2006

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…A new class of so-called interactive distributed applications is emerging: distributed virtual environments, interactively steered scientific applications, collaborative design systems, etc [3]. These applications may need to run in a wide area asynchronous environment with widely distributed users and resources and no central authority.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A new class of so-called interactive distributed applications is emerging: distributed virtual environments, interactively steered scientific applications, collaborative design systems, etc [3]. These applications may need to run in a wide area asynchronous environment with widely distributed users and resources and no central authority.…”
Section: Introductionmentioning
confidence: 99%
“…For space reasons, the snRequest() function is not described. This function simply requests a sequence number from one member of the coalition pi relies on 3. For space reasons, we do not provide the pseudo-code of this mechanism.…”
mentioning
confidence: 99%
“…H ) be a history of S. Let r(x)v an atomic read in a method of H. r(x)v is legal iff the two following conditions hold: (1) objects in X such that objects( ) T objects( ) 6 = . is order before in the object order, also written !…”
Section: Modelmentioning
confidence: 99%
“…rw ), defined as follows: Definition 11 (Logical read) Let S = ( P X) be a shared memory system and let H = (H ! H ) be a history of S. Let , and three methods which interfere 2 One could say that it will be interesting to treat each method as a black box -as the o-set defined in [1] -modeling the objects spanned by it as an aggregate object. In the sequel we show that it is impossible to design a normal system using only local information.…”
Section: Notementioning
confidence: 99%
See 1 more Smart Citation