{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:19:23Z","timestamp":1740028763745,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"abstract":"<jats:p>We propose a model of computation, based on data flow, that unifies several disparate programming phenomena, including local and shared variables, synchronised and buffered communication, reliable and unreliable channels, dynamic and static allocation, explicit and garbage-collected disposal, fine-grained and coarse-grained concurrency, and weakly and strongly consistent memory.<\/jats:p>","DOI":"10.3233\/978-1-60750-711-6-211","type":"book-chapter","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:11:46Z","timestamp":1739992306000},"source":"Crossref","is-referenced-by-count":0,"title":["Unifying Models of Data Flow"],"prefix":"10.3233","author":[{"family":"Hoare Tony","sequence":"additional","affiliation":[]},{"family":"Wickerson John","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["NATO Science for Peace and Security Series - D: Information and Communication Security","Software and Systems Safety"],"original-title":[],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:18:54Z","timestamp":1739992734000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISSNISBN&issn=1874-6268&volume=30&spage=211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-60750-711-6-211","relation":{},"ISSN":["1874-6268"],"issn-type":[{"value":"1874-6268","type":"print"}],"subject":[],"published":{"date-parts":[[2011]]}}}