Skip to main content

Part of the book series: Texts in Computer Science ((TCS))

  • 2058 Accesses

Abstract

We meet some new operators. Hiding (P\X) allows you to conceal the internal actions of a process from the outside world. Renaming (PR〛) gives a flexible way of changing the labels on the events that a process communicates into different labels seen by the outside world. We see how hiding can create more natural models of parallel systems but can create a few theoretical difficulties, and how renaming combined with parallelism can create seemingly magical effects such as allowing Adam and Eve to achieve a variable renaming so each can have their own choice of apple. We introduce link parallel: a combination of parallel, hiding and renaming that makes constructing practical networks comparatively simple, and see how it can be used in building some natural dynamic networks such as one for implementing mergesort. We find that renaming can help FDR solve Sudoku puzzles faster.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Some other process algebras, notably CCS, combine parallel and hiding into a single operator: they do not factor the ‘natural’ operator into two parts like CSP.

  2. 2.

    This is exactly how FDR and ProBE represent nondeterministic choice, as previously described in Sect. 1.6.

  3. 3.

    TPC identifies the process \(P\rhd Q\) with \( \left( {P\,\sqcap \,STOP} \right)\,\square \,Q \). This identification is correct, if a little hard to understand, in the theories of CSP that TPC considers. Since we will consider a number of theories in later chapters where it is not correct to identify these two terms, we prefer to think of \(\rhd\) as a primitive operator rather than one derived from others.

  4. 4.

    See p. 203 for further discussion of this point.

  5. 5.

    It is possible to achieve the effect of variable renaming by combining one-to-many renaming with parallel combination with a process that chooses the appropriate image of an event for the current trace. See Exercise 5.10 below.

  6. 6.

    Chaining (≫) is sometimes called piping.

  7. 7.

    A similar implementation of Hoare’s Quicksort can be found in TPC.

References

  1. Francez, N.: Fairness. Springer, Berlin (1986)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. W. Roscoe .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag London Limited

About this chapter

Cite this chapter

Roscoe, A.W. (2010). Hiding and Renaming. In: Understanding Concurrent Systems. Texts in Computer Science. Springer, London. https://doi.org/10.1007/978-1-84882-258-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-258-0_5

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-257-3

  • Online ISBN: 978-1-84882-258-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics