Detail publikace

Active Transactions in Collaborative Virtual Environments

Originální název

Active Transactions in Collaborative Virtual Environments

Anglický název

Active Transactions in Collaborative Virtual Environments

Jazyk

en

Originální abstrakt

 Active transaction model is a novel consistency model for Collaborative Virtual Environments (CVE). Active transactions consistency model is focused on strength of the consistency model and usability because strong consistency model often results in simpler design of CVE system compared to weak consistency models. Theoretical foundations of Active transactions are based on active replication used in distributed systems and transaction concept developed in database systems. Both concepts were modified and adapted to reach the performance requirements of CVE systems.

Anglický abstrakt

 Active transaction model is a novel consistency model for Collaborative Virtual Environments (CVE). Active transactions consistency model is focused on strength of the consistency model and usability because strong consistency model often results in simpler design of CVE system compared to weak consistency models. Theoretical foundations of Active transactions are based on active replication used in distributed systems and transaction concept developed in database systems. Both concepts were modified and adapted to reach the performance requirements of CVE systems.

BibTex


@book{BUT61772,
  author="Jan {Pečiva}",
  title="Active Transactions in Collaborative Virtual Environments",
  annote=" Active transaction model is a novel consistency model for Collaborative Virtual
Environments (CVE). Active transactions consistency model is focused on strength
of the consistency model and usability because strong consistency model often
results in simpler design of CVE system compared to weak consistency models.
Theoretical foundations of Active transactions are based on active replication
used in distributed systems and transaction concept developed in database
systems. Both concepts were modified and adapted to reach the performance
requirements of CVE systems.",
  address="Faculty of Information Technology BUT",
  chapter="61772",
  howpublished="print",
  institution="Faculty of Information Technology BUT",
  year="2007",
  month="june",
  pages="0--127",
  publisher="Faculty of Information Technology BUT",
  type="book"
}