1975
DOI: 10.1145/360933.360975
|View full text |Cite
|
Sign up to set email alerts
|

Guarded commands, nondeterminacy and formal derivation of programs

Abstract: So-called “guarded commands” are introduced as a building block for alternative and repetitive constructs that allow nondeterministic program components for which at least the activity evoked, but possibly even the final state, is not necessarily uniquely determined by the initial state. For the formal derivation of programs expressed in terms of these constructs, a calculus will be be shown.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
462
0
19

Year Published

1991
1991
2014
2014

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,511 publications
(483 citation statements)
references
References 2 publications
2
462
0
19
Order By: Relevance
“…The interval of execution of each b → idle is of finite length, i.e., b → idle must terminate. By (14), a guarded assignment to vector of variables b → y := e consists of two portions, where the guard and expressions e are evaluated in the first portion in the same apparent state, and y is updated to the new values in the second. Furthermore, execution of b → y := e ensures each output V not in y is stable and that each variable in V is right stable.…”
Section: Definition 5 (Action)mentioning
confidence: 99%
See 1 more Smart Citation
“…The interval of execution of each b → idle is of finite length, i.e., b → idle must terminate. By (14), a guarded assignment to vector of variables b → y := e consists of two portions, where the guard and expressions e are evaluated in the first portion in the same apparent state, and y is updated to the new values in the second. Furthermore, execution of b → y := e ensures each output V not in y is stable and that each variable in V is right stable.…”
Section: Definition 5 (Action)mentioning
confidence: 99%
“…In particular, we calculate the effect of (partially) developed actions on the enforced properties, which generates new properties and actions. However, unlike [14,25,26], we disallow arbitrary modifications to the program. Instead, each change must be justified by a lemma/theorem that ensures each new version is a refinement of the current version [20,17].…”
Section: Action System Refinementmentioning
confidence: 99%
“…Although these examples are easy these two problems clearly show the typical use of PAM. Because PAM is a reincarnation of POM within actors, it allows the implementation of advanced coordination mechanisms, like guards [22] and chords [18,21]. In this paper we show the PAM implementation of a coordination abstraction called Synchronizers [20].…”
Section: Canonical Examplesmentioning
confidence: 99%
“…In order to achieve Q, regression is used to make sure that any action added to the existing plan will not interfere with P . Waldinger's regression is based on the idea of "weakest precondition" proposed by Dijkstra in 1975 [8](see also, e.g., [2,7]). Intuitively, regression from a logical sentence that is represented by a conjunction of goals, conj, via an action, A, yields another logical sentence that encodes what must be true before A is performed to make conj true immediately afterwards.…”
Section: Related Workmentioning
confidence: 99%