Techniques for the design of communicating processes
Abstract
References
- Techniques for the design of communicating processes
Recommendations
Filter Promotion Transformation Strategies for Deriving Efficient Programs from Z Specifications
ICFEM '00: Proceedings of the 3rd IEEE International Conference on Formal Engineering MethodsIn recent years, there have been growing interests in systematic methods for refining Z specifications into programs. In this paper, we consider a transformational programming strategy known as filter promotion and examine its use for refining a class ...
A state-based approach to communicating processes
Communicating processes, which may exhibit nondeterministic behaviour, are specified as state-transition systems. Equivalence and refinement relations are defined in terms of the failures model of processes. Downward and upward simulation are considered ...
Proving safety and liveness of communicating processes with examples
PODC '82: Proceedings of the first ACM SIGACT-SIGOPS symposium on Principles of distributed computingA method is proposed for reasoning about safety and liveness properties of message passing networks. The method is hierarchical and is based upon combining the specifications of component processes to obtain the specification of a network. The inference ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Jean-Pierre Finance,
- Program Chairs:
- Carlo Ghezzi,
- Gruia-Catalin Roman
Sponsors
- SIGSOFT: ACM Special Interest Group on Software Engineering
- IEEE-CS\DATC: IEEE Computer Society
Publisher
IEEE Computer Society Press
Washington, DC, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 110Total Downloads
- Downloads (Last 12 months)20
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in