2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing 2006
DOI: 10.1109/colcom.2006.361867
|View full text |Cite
|
Sign up to set email alerts
|

Tombstone Transformation Functions for Ensuring Consistency in Collaborative Editing Systems

Abstract: http://ieeexplore.ieee.org/In collaborative editing, consistency maintenance of the copies of shared data is a critical issue. In the last decade, Operational Transformation (OT) approach revealed as a suitable mechanism for maintaining consistency. Unfortunately, none of the published propositions relying on this approach are able to satisfy the mandatory correctness properties TP1 and TP2 defined in the Ressel's framework. This paper addresses this correctness issue by proposing a new way to model shared sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
94
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 57 publications
(95 citation statements)
references
References 29 publications
1
94
0
Order By: Relevance
“…We adapt the Tombstone Transformation Functions (TTF) approach [25] to avoid these kind of conflicts. Before explaining our method we describe TTF algorithm.…”
Section: Adapted Mergementioning
confidence: 99%
“…We adapt the Tombstone Transformation Functions (TTF) approach [25] to avoid these kind of conflicts. Before explaining our method we describe TTF algorithm.…”
Section: Adapted Mergementioning
confidence: 99%
“…A detailed explanation of the TTF approach and its correctness can be found in [17]. The main idea of the model is to keep deleted characters as tombstones.…”
Section: The Tombstones Transformation Functionsmentioning
confidence: 99%
“…Indeed, many hand-proven transformation functions were finally revealed false (all counter examples can be found in [17]). …”
Section: Site1mentioning
confidence: 99%
“…TP2 is necessary if replay is in arbitrary order, e.g., in a peer-to-peer system. The vast majority of published non-serialised OT algorithms have been shown to violate TP2 [5].…”
Section: Operational Transformationmentioning
confidence: 99%