Sequence Related IT Functions for String Based Update Operations by New Operational Transformation Algorithms for Wide-Area Collaborative Applications
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Operational transformation (OT) is an established optimistic consistency control method in collaborative applications. This approach requires correct transformation functions. In general all OT algorithms only consider two character-based primitive operations and hardly two or three of them support string based two primitive operations, insert and delete. In our earlier paper [1] we have proposed new algorithms that consider first time in history new string operations that are update for atomic string operations in addition to primitive operations like insert and delete. In this paper we have proposed new algorithms LocalU and RemoteU for handling local and remote update operations of strings for both atomic and sequential perations. These algorithms first time in history are handling sequential update string perations. These algorithms satisfy correctness criteria like causality preservation and admissibility reservation. These algorithms are for sequential update operations but have synchronization with existing primitive operations like insert and delete also. It also handles verlapping and splitting of operations when concurrent perations are transformed. These algorithms can be applied in a wide range of practical collaborative applications.
Authors and Affiliations
Santosh kumawat , Ajay Khunteta
Classification of Medical Images using Fast Hilbert Transform and Decision Tree Algorithms
with generation of huge volume of patient data and advent of modern medical devices, large quantities of medical images are being generated. This has led to development of systems which can automatically compare, classif...
Information and Communication Technology for Rural Development
Due to the lack of knowledge and use of ICT in rural areas, development is at a very low rate. Some improvement and advancement in the technologies provided by the government but there is no more effect in the developmen...
The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the pro...
Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis
This paper discuss various opportunistic routing algorithm which is based on broadcast nature of opportunistic network and also provide novel solution of routing which have less data loss. This research work proposed bro...
Centroid based Categorization Approach for Extraction of Body Sensor Network Data
Monitoring human activities using wearable wireless sensor nodes has the potential to enable many useful applications for everyday situations. The long-term lifestyle categorization can greatly improve healthcare by gath...