{"title":"维护多访问数据的顺序和一致性","authors":"Ronald Tugender","doi":"10.1109/MARK.1979.8817153","DOIUrl":null,"url":null,"abstract":"The problem of controlling simultaneous access to shared data runs throughout the history of computer science. In order to preserve the consistency and integrity of such data, computer scientists and programmers have developed locks, 6 semaphores, 3 the notion of critical sections, 4 , 3 monitors, 5 and innumerable other techniques, both concrete and abstract. The great interest in such mechanisms throughout the computer community, both in the literature and in practice, is indicative of the importance of the problem.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"12 9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Maintaining order and consistency in multi-access data\",\"authors\":\"Ronald Tugender\",\"doi\":\"10.1109/MARK.1979.8817153\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The problem of controlling simultaneous access to shared data runs throughout the history of computer science. In order to preserve the consistency and integrity of such data, computer scientists and programmers have developed locks, 6 semaphores, 3 the notion of critical sections, 4 , 3 monitors, 5 and innumerable other techniques, both concrete and abstract. The great interest in such mechanisms throughout the computer community, both in the literature and in practice, is indicative of the importance of the problem.\",\"PeriodicalId\":341008,\"journal\":{\"name\":\"1979 International Workshop on Managing Requirements Knowledge (MARK)\",\"volume\":\"12 9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1899-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1979 International Workshop on Managing Requirements Knowledge (MARK)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MARK.1979.8817153\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1979 International Workshop on Managing Requirements Knowledge (MARK)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MARK.1979.8817153","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Maintaining order and consistency in multi-access data
The problem of controlling simultaneous access to shared data runs throughout the history of computer science. In order to preserve the consistency and integrity of such data, computer scientists and programmers have developed locks, 6 semaphores, 3 the notion of critical sections, 4 , 3 monitors, 5 and innumerable other techniques, both concrete and abstract. The great interest in such mechanisms throughout the computer community, both in the literature and in practice, is indicative of the importance of the problem.