1972
DOI: 10.1007/bf00288684
|View full text |Cite
|
Sign up to set email alerts
|

A comparison of two synchronizing concepts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

1973
1973
1990
1990

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 75 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…Other proof procedures have been proposed which are more specific than ours, and assume some type of synchronization primitive (4], [10], [11], [15]. The basic reason for their assumptions is to insure that data cannot be accessed by one process while they might be modified by another process.…”
Section: Comparison With Previous Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Other proof procedures have been proposed which are more specific than ours, and assume some type of synchronization primitive (4], [10], [11], [15]. The basic reason for their assumptions is to insure that data cannot be accessed by one process while they might be modified by another process.…”
Section: Comparison With Previous Methodsmentioning
confidence: 99%
“…We will do this by proving the invariance of an interpretation containing the indicated assertions, where Dk and Ek, will be defined later. We assume that Dk is also attached to all arcs of subroutine 8, and A{Ek,:j = i,* , N} is attached to all arcs in subroutine 4 Our example showed how the program and the proof can be designed together in a top-down hierarchical fashion. At each stage, our proof required that the following conditions be satisfied by each subroutine: 1) the assertions attached to its input and output arcs are consistent, and 2) certain assertions are monotone under that subroutine.…”
Section: The Bakery Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Let D be a set of the form DlX ... XDk, and let "(Xl,...,Xk)" be a typical element of D. Then f(2,3) = (3,2). Moreover, we will delete "assignments" of the form "x ÷ x."…”
Section: Preliminariesmentioning
confidence: 98%
“…(Dijkstra [i]; Courtois, Heymans, Parnas [2]; Brinch Hmlsen [3]; Habermann [4]; and Dijkstra [5]) This approach has two drawbacks. First, the inability to find a solution does not prove that a given solution does not exist.…”
Section: Introductionmentioning
confidence: 99%