{"title":"网络数据库中的数据流表示","authors":"X. Pham","doi":"10.1145/503896.503954","DOIUrl":null,"url":null,"abstract":"Solutions to the problem of consistency and correctness of duplicate database have been tackled by many authors such as in [Elli77], [Grap76], and [Mull71]. In a network system, each update may bring up a different kind of consistency and a new proof of correctness. Data integrity and security in a concurrent environment are a big headache for the system implementor. Issues related to security and social impacts on a network system are discussed in [Denn72]. This paper attempts to use a new method, Dataflow Language, to represent the interactions in a network environment, and in doing so, the paper, hopefully, points out the consistency, and correctness of the duplicate database.","PeriodicalId":184493,"journal":{"name":"ACM-SE 20","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1982-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dataflow representation in a network database\",\"authors\":\"X. Pham\",\"doi\":\"10.1145/503896.503954\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Solutions to the problem of consistency and correctness of duplicate database have been tackled by many authors such as in [Elli77], [Grap76], and [Mull71]. In a network system, each update may bring up a different kind of consistency and a new proof of correctness. Data integrity and security in a concurrent environment are a big headache for the system implementor. Issues related to security and social impacts on a network system are discussed in [Denn72]. This paper attempts to use a new method, Dataflow Language, to represent the interactions in a network environment, and in doing so, the paper, hopefully, points out the consistency, and correctness of the duplicate database.\",\"PeriodicalId\":184493,\"journal\":{\"name\":\"ACM-SE 20\",\"volume\":\"95 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1982-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM-SE 20\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/503896.503954\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM-SE 20","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/503896.503954","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Solutions to the problem of consistency and correctness of duplicate database have been tackled by many authors such as in [Elli77], [Grap76], and [Mull71]. In a network system, each update may bring up a different kind of consistency and a new proof of correctness. Data integrity and security in a concurrent environment are a big headache for the system implementor. Issues related to security and social impacts on a network system are discussed in [Denn72]. This paper attempts to use a new method, Dataflow Language, to represent the interactions in a network environment, and in doing so, the paper, hopefully, points out the consistency, and correctness of the duplicate database.