2007 International Conference on Mobile Data Management 2007
DOI: 10.1109/mdm.2007.24
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Our Computational Surroundings for Better Mobile Collaboration

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2010
2010

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…What some authors call hidden conflicts [35] explains this. Essentially, a hidden conflict occurs when a replica is aware of two or more concurrent tentative versions.…”
Section: Commit Ratiomentioning
confidence: 99%
“…What some authors call hidden conflicts [35] explains this. Essentially, a hidden conflict occurs when a replica is aware of two or more concurrent tentative versions.…”
Section: Commit Ratiomentioning
confidence: 99%