Specification and Implementation of Replicated List: The Jupiter Protocol Revisited
نویسندگان
چکیده
The replicated list object has been frequently used to model the core functionality (e.g., insertion, deletion, and read) of replicated collaborative text editing systems. In this paper we revisit the specification and implementation of a replicated list object, specifically the weak list specification proposed recently by Attiya et al. and the Jupiter protocol designed in the 1990s. We prove that Jupiter indeed satisfies the weak list specification, solving the conjecture of Attiya et al. To address the mismatch between the global property of weak list specification and the local views each replica maintains in the Jupiter protocol, we propose the CSS (Compact State-space) Jupiter protocol, which at a high level, maintains only a single novel n-ary ordered state-space for a client/server system with n clients. By contrast, the original Jupiter protocol, we call the CSCW protocol, needs to maintain 2n 2D state-spaces where replica states are dispersed. We first show that the CSS protocol and the CSCW protocol are equivalent in the sense that their behaviors are the same under the same schedule of operations/messages. Then, we prove that the CSS protocol satisfies the weak list specification.
منابع مشابه
Web Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملImpedance Control of Robots Using Voltage Control Strategy Revisited
In this note, we show that the impedance control strategy proposed in the paper is not feasible from practical implementation point of view. Next, a robust impedance controller is proposed for electrically driven robots using Fourier series (FS). The fact that robots' actuators have limited voltage is also considered in controller design procedure. In comparison with other impedance controllers...
متن کاملDetecting Denial of Service Message Flooding Attacks in SIP based Services
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
متن کاملImplementation of quadratic dose protocol for 18F-FDG whole-body PET imaging using a BGO-based PET/CT scanner, GE Discovery ST
Introduction: The ability of quadratic dose protocol to maintain a good quality image for an overweight and obese patient is well reported. However, a practical approach to the implementation of this protocol in whole-body imaging in Malaysia is currently lacking. Hence, the aim of this study is to derive the quadratic dose formula that suits our PET system. Metho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1708.04754 شماره
صفحات -
تاریخ انتشار 2017