• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liao Bin, He Fazhi, and Jing Shuxu. Survey of Operational Transformation Algorithms in Real-Time Computer-Supported Cooperative Work[J]. Journal of Computer Research and Development, 2007, 44(2): 326-333.
Citation: Liao Bin, He Fazhi, and Jing Shuxu. Survey of Operational Transformation Algorithms in Real-Time Computer-Supported Cooperative Work[J]. Journal of Computer Research and Development, 2007, 44(2): 326-333.

Survey of Operational Transformation Algorithms in Real-Time Computer-Supported Cooperative Work

More Information
  • Published Date: February 14, 2007
  • The partial relations of distributed operations and the consistency model are introduced and analyzed. Based on the development of typical operational transformation algorithms, basic operational transformation functions are discussed and summarized. The intention problems are carefully analyzed and the algorithm guides for intention preservation are presented. Open issues and future research directions are also discussed.
  • Related Articles

    [1]Luo Jun, Zhao Chuanzhi, Wang Fei. An Efficient Privilege Manage Method Based on RBAC[J]. Journal of Computer Research and Development, 2016, 53(5): 1000-1008. DOI: 10.7544/issn1000-1239.2016.20148288
    [2]Chen Lili, Shen Li, Wang Zhiying, Xiao Nong, and Yao Yiping. Computation Accelerator Virtualization for Domain Specific Applications[J]. Journal of Computer Research and Development, 2011, 48(11): 2103-2110.
    [3]Zhang Yingjun, Feng Dengguo. A Role-Based Access Control Model Based on Space, Time and Scale[J]. Journal of Computer Research and Development, 2010, 47(7): 1252-1260.
    [4]Tang Zhuo, Zhao Lin, Li Kenli, Li Ruixuan. A Dynamic Access Control Model for Inter-Operation in Multi-Domain Environment Based on Risk[J]. Journal of Computer Research and Development, 2009, 46(6): 948-955.
    [5]Xia Luning and Jing Jiwu. An Administrative Model for Role-Based Access Control Using Hierarchical Namespace[J]. Journal of Computer Research and Development, 2007, 44(12): 2020-2027.
    [6]He Yongzhong, Li Xiaofeng, Feng Dengguo. Implementing Chinese Wall Policies on RBAC[J]. Journal of Computer Research and Development, 2007, 44(4): 615-622.
    [7]Chen Ying, Yang Shoubao, Guo Leitao, and Shen Kai. A Dynamic Access Control Scheme Across Multi-Domains in Grid Environment[J]. Journal of Computer Research and Development, 2006, 43(11): 1863-1869.
    [8]Liao Junguo, Hong Fan, Zhu Xian, Xiao Haijun. Separation of Duty in Dynamic Role Translations Between Administrative Domains[J]. Journal of Computer Research and Development, 2006, 43(6): 1065-1070.
    [9]Sui Aina, Wu Wei, Chen Xiaowu, Zhao Qinping. A Assembly Constraint Semantic Model in Distributed Virtual Environment[J]. Journal of Computer Research and Development, 2006, 43(3): 542-550.
    [10]Zhang Yu, Zhang Wenyi, Li Xianxian, and Huai Jinpeng. Secure Access Control for Group Communication on Multi-Autonomous Domains Collaborative Environment[J]. Journal of Computer Research and Development, 2005, 42(9): 1558-1563.

Catalog

    Article views (984) PDF downloads (700) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return