A Collaborative Writing Mode for Avoiding Blind Modifications Center for E-Business Technology Seoul National University Seoul, Korea Nam, Kwang-hyun Intelligent.

Slides:



Advertisements
Similar presentations
Provenance-Aware Storage Systems Margo Seltzer April 29, 2005.
Advertisements

WWG a Wide-Area Infrastructure for Groups Joan Manuel Marquès. Universitat Oberta de Catalunya (UOC) Leandro Navarro Universitat.
Center for E-Business Technology Seoul National University Seoul, Korea Socially Filtered Web Search: An approach using social bookmarking tags to personalize.
Principles of Personalisation of Service Discovery Electronics and Computer Science, University of Southampton myGrid UK e-Science Project Juri Papay,
An Unsupervised Framework for Extracting and Normalizing Product Attributes from Multiple Web Sites Center for E-Business Technology Seoul National University.
Announcements Course project is on-going  Part 1 / Phase 1 description has been updated (typo in the submission filename convention) HW2 grades are out.
1 P2P Logging and Timestamping for Reconciliation M. Tlili, W. Dedzoe, E. Pacitti, R. Akbarinia, P. Valduriez, P. Molli, G. Canals, S. Laurière VLDB Auckland,
WikiConversation Scotty Allen Phong Le. Goal Support joint document production asynchronously via localized comment capability In context of different.
1 Fostering Asynchronous Collaborative Visualization Francis T. Marchese and Natasha Brajkovska Pace University New York, NY 10038
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 8 Slide 1 Tools of Software Development l 2 types of tools used by software engineers:
Tangible Flags Collaborative Educational Technology to enhance grade school field trips Gene Chipman PhD Candidate in Computer Science
Domain Modeling (with Objects). Motivation Programming classes teach – What an object is – How to create objects What is missing – Finding/determining.
GMD German National Research Center for Information Technology Innovation through Research Jörg M. Haake Applying Collaborative Open Hypermedia.
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Institute of Applied Informatics in Civil Engineering Dresden University of Technology A personal planning approach for the integration and coordination.
TEMPLATE DESIGN © GroupNotes: Encouraging Proactive Student Engagement in Lectures through Collaborative Note-taking on.
Introduction to Version Control with SVN & Git CSC/ECE 517, Fall 2012 Titus Barik & Ed Gehringer, with help from Gaurav.
BIS121 IT for Business Application Lecture 8 – Database (Part I)
Copyright © Jerzy R. Nawrocki Requirements Review Requirements Engineering & Project.
Automatically Identifying Localizable Queries Center for E-Business Technology Seoul National University Seoul, Korea Nam, Kwang-hyun Intelligent Database.
Design and Implementation of a Module to Synchronize Databases Amit Hingher Reviewers: Prof. Dr. rer. nat. habil. Andreas Heuer Prof. Dr.-Ing. Hartmut.
A service-oriented middleware for building context-aware services Center for E-Business Technology Seoul National University Seoul, Korea Tao Gu, Hung.
Version control Using Git Version control, using Git1.
Review Meeting – INSEAD, Fontainebleau – 30 March L 2 C Learning to Collaborate Knowledge Management Tools Development The L2C Knowledge Community.
1.8History of Java Java –Based on C and C++ –Originally developed in early 1991 for intelligent consumer electronic devices Market did not develop, project.
Information Systems and Network Engineering Laboratory II DR. KEN COSH WEEK 1.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Science and Technology, Osaka University Applying Clone.
Computer Science and Engineering The Ohio State University  Widely used, especially in the opensource community, to track all changes to a project and.
What’s new in Kentico CMS 5.0 Michal Neuwirth Product Manager Kentico Software.
User Behavior Analysis of Location Aware Search Engine Third international Conference of MDM, 2002 Takahiko Shintani, Iko Pramudiono NTT Information Sharing.
ICDL 2004 Improving Federated Service for Non-cooperating Digital Libraries R. Shi, K. Maly, M. Zubair Department of Computer Science Old Dominion University.
Contextual Ranking of Keywords Using Click Data Utku Irmak, Vadim von Brzeski, Reiner Kraft Yahoo! Inc ICDE 09’ Datamining session Summarized.
May 16-18, Skeletons and Asynchronous RPC for Embedded Data- and Task Parallel Image Processing IAPR Conference on Machine Vision Applications Wouter.
Team # 2 Members: Sowmya Krishnaswamy Hakan Terzioglu Manu Mehan Jerome Tunaya.
Multi-synchronous Collaborative Semantic Wikis Charbel Rahhal, Hala Skaf-Molli, Pascal Molli, Stéphane Weiss Inria Nancy-Grand Est Nancy University, France.
1 Distributed Databases BUAD/American University Distributed Databases.
A Method for Analyzing User Action Logs Center for E-Business Technology Seoul National University Seoul, Korea Jaeseok Myung Intelligent Database Systems.
A Low-bandwidth Network File System Athicha Muthitacharoen et al. Presented by Matt Miller September 12, 2002.
Monitoring Business Processes with Queries VLDB2007 CatrielBeeri, AnatEyal, Tova Milo, AlonPilberg Summarized by Gong GI Hyun, IDS Lab., Seoul.
A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems Tao Jiang, Ion Matei and John S. Baras Institute for Systems Research.
An approach for Framework Construction and Instantiation Using Pattern Languages Rosana Teresinha Vaccare Braga Paulo Cesar Masiero ICMC-USP: Institute.
Automatic Video Tagging using Content Redundancy Stefan Siersdorfer 1, Jose San Pedro 2, Mark Sanderson 2 1 L3S Research Center, Germany 2 University of.
Enhancing Web Search by Promoting Multiple Search Engine Use Ryen W. W., Matthew R. Mikhail B. (Microsoft Research) Allison P. H (Rice University) SIGIR.
Web Technologies Lecture 6 State preservation. Motivation How to keep user data while navigating on a website? – Authenticate only once – Store wish list.
Presentation OLOMOLA,Afolabi( ). Update Changes in CSV/SVN.
(1) Introduction to Continuous Integration Philip Johnson Collaborative Software Development Laboratory Information and Computer Sciences University of.
(1) Introduction to Continuous Integration Philip Johnson Collaborative Software Development Laboratory Information and Computer Sciences University of.
Requirement engineering & Requirement tasks/Management. 1Prepared By:Jay A.Dave.
DB Tuning : Chapter 10. Optimizer Center for E-Business Technology Seoul National University Seoul, Korea 이상근 Intelligent Database Systems Lab School of.
Online Evolutionary Collaborative Filtering RECSYS 2010 Intelligent Database Systems Lab. School of Computer Science & Engineering Seoul National University.
Lock-Free Consistency Control for Web 2.0 Applications Jiang-Ming Yang 1,3, Hai-Xun Wang 2, Ning Gu 1, Yi-Ming Liu 1, Chun-Song Wang 1, Qi-Wei Zhang 1.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Why PACKZ? Innovation No real innovations in pre-press for years Offers new approach using standard open file formats Technology is moving fast, we are.
Relational-Style XML Query Taro L. Saito, Shinichi Morishita University of Tokyo June 10 th, SIGMOD 2008 Vancouver, Canada Presented by Sangkeun-Lee Reference.
Awareness October 23, 2008 Dourish and Bellotti Ding and Patterson.
Information Systems and Network Engineering Laboratory I DR. KEN COSH WEEK 1.
A Multi-Dimensional Configurable Access Control Framework for Mobile Applications By: Yaira K. Rivera Sánchez Major Advisor: Steven A. Demurjian.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
© 2005 Prentice Hall, Decision Support Systems and Intelligent Systems, 7th Edition, Turban, Aronson, and Liang 6-1 Chapter 6 Decision Support System Development.
CASE Tools and their Effect on Software Quality
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Information Systems and Network Engineering Laboratory II
SOFTWARE DESIGN AND ARCHITECTURE
Content Management Systems
New Work Modes for Collaborative Writing
Presentation transcript:

A Collaborative Writing Mode for Avoiding Blind Modifications Center for E-Business Technology Seoul National University Seoul, Korea Nam, Kwang-hyun Intelligent Database Systems Lab School of Computer Science & Engineering Seoul National University, Seoul, Korea Claudia-Lavinia Ignat, G´erald Oster, Pascal Molli and Hala Skaf-Molli Nancy-Universit´e, LORIA-INRIA Lorraine Campus Scientifique France 9th International Workshop on Collaborative Editing Systems (IWCES), 2007

Copyright  2009 by CEBT Contents  Introduction  Motivating Example  Our approach  Revisiting Motivating Example  View user interface  Conclusions and Future Work  Discussion IDS Lab Seminar - 2

Copyright  2009 by CEBT Collaborative Editing IDS Lab Seminar - 3  Blind modification When user modify a document without being aware of concurrent changes

Copyright  2009 by CEBT Synchronous/Asynchronous Work Modes  Synchronous editing Reduces conflicts and task completion times Disadvantage – no support for work in isolation  Asynchronous editing Support for work in isolation Workspace copies kept in consistent states Risk of blind modifications – Useless work – Redundant work IDS Lab Seminar - 4

Copyright  2009 by CEBT Main Issue  How to allow Work in isolation? Avoid blind modifications?  Our proposition Provide information in real-time about group activities Deal with trade-off awareness/privacy Annotate the document with uncommitted changes IDS Lab Seminar - 5

Copyright  2009 by CEBT Motivating Example Actions User 1 Actions User 2 Actions User 3 Removes method isRealupdates method isRealcreates test class IntegerTest IDS Lab Seminar - 6

Copyright  2009 by CEBT Scenario with standard VCS StepActions User 1 Actions User 2 Actions User 3 1op1= removes method isReal op 2 = updates method isReal op 3 = creates test class IntegerTest 2COMMIT 3UPDATE (conflict op 1 ↔ op 2 ) UPDATE (IntegerTest does not compile) 4Reinsert new method isReal Remove test for isReal 5COMMIT 6UPDATE & COMMIT (no test for isReal) 7UPDATE IDS Lab Seminar - 7 Useless work Side effects Useless work Side effects Re-execution of own changes Re-execution of own changes Useless work Incomplete task Useless work Incomplete task

Copyright  2009 by CEBT User can perform…  Modifies a document by generating operations that are immediately applied on his local copy  Makes available his local changes to other users by committing his local operations to the repository If some non-integrated remote operations are available on the repository, the user is not allowed to commit local operation.  Updates his local copy of a document by integrating remote operations from the repository IDS Lab Seminar - 8

Copyright  2009 by CEBT Our approach  Assumption Users continuously connected – In order to notice real-time non-committed parallel modifications  However, this assumption can violate user privacy As users may not agree to send draft changes of their work  A trade-off between privacy and the usefulness of awareness To deal with this trade-off, a filtering mechanism is provided.  Ghost operation Filter non-committed local operations before sending them to other users by masking some operation parameters Filtered name, filtered type, and filtered value IDS Lab Seminar - 9

Copyright  2009 by CEBT Our approach  Send non-committed operations in real-time  Preserve user privacy by filtering the non-committed operations (ghost operations) Example: – op1= insert(User2,"file.txt",4,"Preventingblindmodifications") Original operation – g(op1) = insert(User2,"file.txt",4,30) The content of the inserted line is masked. – g(op1) = edit("file.txt",4) The identity of the user is masked. Trust metric may be used for automatic filtering  Integrate ghost operations as annotations within the document IDS Lab Seminar - 10

Copyright  2009 by CEBT Revisiting Motivating Examples IDS Lab Seminar - 11 Generated OperationsPrivacy filterGhost operations op 1 =delete(User 1, Integer.java, 15-18) No filterg(op 1 )=delete(User 1, Integer.java, 15-18) op 2 =update(User 2, Integer.java, 16, "return false“) Filter contentg(op 2 )=update(User 2, Integer.java, 16, -) op 3 : create IntegerTest.javaNo ghost-

Copyright  2009 by CEBT Interface User1  op 1 = delete(User 1, Integer.java, 15-18)  g(op 2 ) = update(User 2, Integer.java, 16, -)  No ghost operation from User 3 IDS Lab Seminar - 12 User 1 will not validate the removal of method isReal() User 1 will not validate the removal of method isReal()

Copyright  2009 by CEBT Interface User2  op 2 = update(User 2, Integer.java, 16, "return false")  g(op 1 ) = delete(User 1, Integer.java, 15-18)  No ghost operation from User 3 IDS Lab Seminar - 13 User 2 is aware of removal of isReal() – can Initiate communication User 2 is aware of removal of isReal() – can Initiate communication

Copyright  2009 by CEBT Interface User3  op 3 : createIntegerTest.java  g(op 1 ) = delete(User 1, Integer.java, 15-18)  g(op 2 ) = update(User 2, Integer.java, 16, -) IDS Lab Seminar - 14 User3 can examine changes in Integer and Postpone testing User3 can examine changes in Integer and Postpone testing

Copyright  2009 by CEBT Conclusions and Future Work  Conclusions Awareness approach for avoiding blind modifications (in text, wiki, source code documents) Ghost operations – Trade-off awareness – Privacy  Future work Develop a model for our proposed interaction mode (Operational Transformation Mechanism) Provide users suitable interfaces for filtering Implement a prototype for awareness in software engineering Perform user studies IDS Lab Seminar - 15

Copyright  2009 by CEBT Discussion  Pros The idea focus on not managing conflict after the task is done, but managing it during the task Consider privacy  Cons Assume many users modify same document or page, – Can this approach be effective? IDS Lab Seminar - 16