Process algebra
Task structure semantics through process algebra
Software Engineering Journal
Programming in Ada95
Handbook of logic in computer science (vol. 4)
Detecting concurrently executed pairs of statements using an adapted MHP algorithm
Proceedings of the 2001 annual ACM SIGAda international conference on Ada
Detecting Deadlock in Ada Rendezvous Flow Structure Based on Process Algebra
ICFEM '02 Proceedings of the 4th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
Symbolic Data Flow Analysis for Detecting Deadlocks in Ada Tasking Programs
Ada-Europe '00 Proceedings of the 5th Ada-Europe International Conference on Reliable Software Technologies
Static Dependency Analysis for Concurrent Ada 95 Programs
Ada-Europe '02 Proceedings of the 7th Ada-Europe International Conference on Reliable Software Technologies
Model Checking Performability Properties
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Model checking for probability and time: from theory to practice
LICS '03 Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science
Modeling of Advanced Tasking in Ada-95: A Petri Net Perspective
PDSE '97 Proceedings of the 2nd International Workshop on Software Engineering for Parallel and Distributed Systems
Compositional Petri net models of advanced tasking in Ada-95
Computer Languages
Hi-index | 0.00 |
The feasibility and efficiency of analyzing concurrent programs mostly relies on the programs' representations. So modeling concurrent programs in a proper and suitable way is very important. Protected objects, which have been introduced in Ada95, are of significant importance in concurrent programming language. In this paper, process algebra is used to model Ada95 protected objects in a neat and tidy way. Because using process algebra can simplify process composition and conveniently hide internal details, it becomes easy to analyze Ada concurrent programs with protected objects and to combat problems of state explosion. In addition, many mechanisms similar to protected objects can be modeled in this way. With these models, many analyses, such as model checking, can be performed.