Concurrency control in groupware systems
SIGMOD '89 Proceedings of the 1989 ACM SIGMOD international conference on Management of data
Introduction to algorithms
Groupware: some issues and experiences
Communications of the ACM
Real time groupware as a distributed system: concurrency control and its effect on the interface
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
The art of computer programming, volume 1 (3rd ed.): fundamental algorithms
The art of computer programming, volume 1 (3rd ed.): fundamental algorithms
Networked virtual environments: design and implementation
Networked virtual environments: design and implementation
Large Scale Collaborative Virtual Environments
Large Scale Collaborative Virtual Environments
Interactive Multiuser VEs in the DIVE System
IEEE MultiMedia
Locales: Supporting Large Multiuser Virtual Environments
IEEE Computer Graphics and Applications
A Multicast Network Architecture for Large Scale Collaborative Virtual Environments
ECMAST '97 Proceedings of the Second European Conference on Multimedia Applications, Services and Techniques
VR '99 Proceedings of the IEEE Virtual Reality
VELVET: an adaptive hybrid architecture for very large virtual environments
Presence: Teleoperators and Virtual Environments
Hi-index | 0.00 |
Collaborative virtual environment (CVE) concepts have been used in many systems in the past few years. Applications of such technology range from military combat simulations to various civilian commercial applications. To make a CVE more interesting to users, it's possible to embed or "stitch" together copies of areas that users might have interest in from one virtual world into another one. This procedure augments both the physical size of a virtual world as well as the potential of having a larger number of users within the world--since the added attractions will work as an incentive for more users to join the world. On the other hand this procedure brings up a series of problems related to consistency, which is the focus of this article. The article introduces a methodology that ensures all copies of a given area of a world are kept consistent with each other, as well as with the original world. The article also discusses application of this methodology to several CVE architectures. Finally, it introduces two other approaches to be used when a less strict consistency model is sufficient.