Process Algebra with Strategic Interleaving

In process algebras such as ACP (Algebra of Communicating Processes), parallel processes are considered to be interleaved in an arbitrary way. In the case of multi-threading as found in contemporary programming languages, parallel processes are actually interleaved according to some interleaving strategy. An interleaving strategy is what is called a process-scheduling policy in the field of operating systems. In many systems, for instance hardware/software systems, we have to do with both parallel processes that may best be considered to be interleaved in an arbitrary way and parallel processes that may best be considered to be interleaved according to some interleaving strategy. Therefore, we extend ACP in this paper with the latter form of interleaving. The established properties of the extension concerned include an elimination property, a conservative extension property, and a unique expansion property.


Introduction
In algebraic theories of processes, such as ACP [5,7], CCS [18,22] and CSP [12,19], processes are discrete behaviours that proceed by doing steps in a sequential fashion.The parallel composition of two processes is usually considered to incorporate all conceivable interleavings of their steps.In each interleaving, the steps of both processes occur in some order where each time one step is taken from either of the processes.According to many, this interpretation of parallel composition, called arbitrary interleaving, is a plausible, general, if not idealized interpretation.Underlying the usual justification of this claim is the assumption that at most one step is done at each point in time.However, others contend that interpretations in which this simplifying assumption is fulfilled are not faithful.
Be that as it may, arbitrary interleaving turns out to be appropriate for many applications and to facilitate formal algebraic reasoning.
Multi-threading as found in programming languages such as Java [16] and C# [17], gives rise to parallel composition of processes.In the case of multithreading, however, the steps of the processes concerned are interleaved according to a process-scheduling policy.We use the term strategic interleaving for this more constrained form of interleaving; and we further use the term interleaving strategy instead of process-scheduling policy.Arbitrary interleaving and strategic interleaving are quite different.The following points illustrate this: (a) whether the interleaving of certain processes leads to inactiveness depends on the interleaving strategy used; (b) sometimes inactiveness occurs with a particular interleaving strategy whereas arbitrary interleaving would not lead to inactiveness and vice versa.
In previous work, we studied strategic interleaving in the setting of thread algebra, which is built on a specialized algebraic theory of processes devoted to the behaviours produced by instruction sequences under execution (see e.g.[8,9,10]).We have, for instance, given demonstrations of points (a) and (b) above in this setting.Nowadays, multi-threading is often used in the implementation of systems.Because of this, in many systems, for instance hardware/software systems, we have to do with parallel processes that may best be considered to be interleaved in an arbitrary way as well as parallel processes that may best be considered to be interleaved according to some interleaving strategy.This is what motivated us to do the work presented in this paper, namely extending ACP such that it supports both arbitrary interleaving and strategic interleaving.
To our knowledge, there exists no work on strategic interleaving in the setting of a general algebraic theory of processes like ACP, CCS and CSP.In the work presented in this paper, we consider strategic interleaving where process creation is taken into account.The approach to process creation followed in this paper originates from the one first followed in [6] to extend ACP with process creation and later followed in [2,11,3] to extend different timed versions of ACP with process creation.The only other approach that we know of is the approach, based on [1], that has for instance been followed in [4,14].However, with that approach, it is unlikely that data about the creation of processes can be made available for the decision making concerning the strategic interleaving of processes.
The extension of ACP presented in this paper covers a generic interleaving strategy that can be instantiated with different specific interleaving strategies.We found two plausible ways to deal with inactiveness of a process whose steps are being interleaved with steps of other processes in the case of strategic interleaving.This gives rise to two plausible extensions of ACP.We will treat only one of them in detail.
The rest of this paper is organized as follows.In Section 2, we review ACP (Section 2.1) and guarded recursion in the setting of ACP (Section 2.2).In Section 3, we extend ACP with strategic interleaving (Section 3.1) and establish some important properties of the extension (Section 3.2).In Section 4, we make some concluding remarks.

ACP with Guarded Recursion
In this section, we give a survey of ACP (Algebra of Communicating Processes) and guarded recursion in the setting of ACP.For a comprehensive overview, the reader is referred to [5,13].

ACP
In ACP, it is assumed that a fixed but arbitrary set A of actions, with δ / ∈ A, has been given.We write A δ for A ∪ {δ}.It is further assumed that a fixed but arbitrary commutative and associative communication function γ :A δ ×A δ → A δ , with γ(δ, a) = δ for all a ∈ A δ , has been given.The function γ is regarded to give the result of synchronously performing any two actions for which this is possible, and to give δ otherwise.
The signature of ACP consists of the following constants and operators: for each a ∈ A, the action constant a ; -the inaction constant δ ; -the binary alternative composition operator + ; -the binary sequential composition operator • ; -the binary parallel composition operator ; -the binary left merge operator ⌊⌊ ; -the binary communication merge operator | ; -for each H ⊆ A, the unary encapsulation operator ∂ H .
We assume that there are infinitely many variables, including x, y, z.Terms are built as usual.We use infix notation for the binary operators.The precedence conventions used with respect to the operators of ACP are as follows: + binds weaker than all others, • binds stronger than all others, and the remaining operators bind equally strong.
The constants and operators of ACP can be explained as follows: the constant a denotes the process that is only capable of first performing action a and next terminating successfully; -the constant δ denotes the process that is not capable of doing anything; -a closed term of the form t + t ′ denotes the process that behaves either as the process denoted by t or as the process denoted by t ′ , but not both; -a closed term of the form t • t ′ denotes the process that first behaves as the process denoted by t and on successful termination of that process it next behaves as the process denoted by t ′ ; -a closed term of the form t t ′ denotes the process that behaves as the process that proceeds with the processes denoted by t and t ′ in parallel; -a closed term of the form t ⌊⌊ t ′ denotes the process that behaves the same as the process denoted by t t ′ , except that it starts with performing an action of the process denoted by t; a closed term of the form t | t ′ denotes the process that behaves the same as the process denoted by t t ′ , except that it starts with performing an action of the process denoted by t and an action of the process denoted by t ′ synchronously; -a closed term of the form ∂ H (t) denotes the process that behaves the same as the process denoted by t, except that actions from H are blocked.
The operators ⌊⌊ and | are of an auxiliary nature.They are needed to axiomatize ACP.
The axioms of ACP are the equations given in Table 1.In these equations, a, b and c stand for arbitrary constants of ACP, and H stands for an arbitrary subset of A. Moreover, γ(a, b) stands for the action constant for the action γ(a, b).In D1 and D2, side conditions restrict what a and H stand for.
In other presentations of ACP, γ(a, b) is regularly replaced by a | b in CM5-CM7.By CM12, which is more often called CF, these replacements give rise to an equivalent axiomatization.In other presentations of ACP, CM10 and CM11 are usually absent.These equations are not derivable from the other axioms, but all there closed substitution instances are derivable from the other axioms.Moreover, CM10 and CM11 hold in virtually all models of ACP that have been devised.
In the sequel, we will use the sum notation i<n t i .For each i ∈ N, let t i be a term of ACP or an extension of ACP.Then i<0 t i = δ and, for each n ∈ N 1 ,1 the term i<n t i is defined by induction on n as follows: i<1 t i = t 0 and i<n+1 t i = i<n t i + t n .

Guarded Recursion
A closed ACP term denotes a process with a finite upper bound to the number of actions that it can perform.Guarded recursion allows the description of processes without a finite upper bound to the number of actions that it can perform.Let T be ACP or a concrete extensions of ACP,2 and let t be a T term containing a variable X.Then an occurrence of X in t is guarded if t has a subterm of the form a • t ′ where a ∈ A and t ′ is a T term containing this occurrence of X.
Let T be ACP or a concrete extension of ACP.Then a T term t is a guarded T term if all occurrences of variables in t are guarded.
Let T be ACP or a concrete extension of ACP.Then a guarded recursive specification over T is a finite or countably infinite set of recursion equations E = {X = t X | X ∈ V }, where V is a set of variables and each t X is either a guarded T term in which variables other than the variables from V do not occur or a T term rewritable to such a term using the axioms of T in either direction and/or the equations in E, except the equation X = t X , from left to right.We write V(E) for the set of all variables that occur in E. A solution of E in some model of T is a set {P X | X ∈ V(E)} of elements of the carrier of that model such that the equations of E hold if, for all X ∈ V(E), X is assigned P X .We are only interested models of ACP and concrete extensions of ACP in which guarded recursive specifications have unique solutions.
Let T be ACP or a concrete extension of ACP.We extend T with guarded recursion by adding constants for solutions of guarded recursive specifications over T and axioms concerning these additional constants.For each guarded recursive specification E over T and each X ∈ V(E), we add a constant standing for the unique solution of E for X to the constants of T .The constant standing for the unique solution of E for X is denoted by X|E .We use the following notation.Let t be a T term and E be a guarded recursive specification.Then we write t|E for t with, for all X ∈ V(E), all occurrences of X in t replaced by X|E .We add the equation RDP and the conditional equation RSP given in Table 2 to the axioms of T .In RDP and RSP, X stands for an arbitrary variable, t X stands for an arbitrary T term, and E stands for an arbitrary guarded recursive specification over T .Side conditions restrict what X, t X and E stand for.We write T rec for the resulting theory.
The equations X|E = t X |E for a fixed E express that the constants X|E make up a solution of E. The conditional equations E ⇒ X = X|E express that this solution is the only one.
In extensions of ACP whose axioms include RSP, we have to deal with conditional equational formulas with a countably infinite number of premises.Therefore, infinitary conditional equational logic is used in deriving equations from the axioms of extensions of ACP whose axioms include RSP.A complete inference system for infinitary conditional equational logic can be found in, for example, [15].In the case of infinitary conditional equational logic derivation trees may be infinitely branching, but they may not have infinite branches.

Strategic Interleaving
In this section, we extend ACP with strategic interleaving, i.e. interleaving according to some interleaving strategy.Interleaving strategies are abstractions of scheduling algorithms.Interleaving according to some interleaving strategy is what really happens in the case of multi-threading as found in contemporary programming languages.

ACP with Strategic Interleaving
In the extension of ACP with strategic interleaving presented below, it is expected that an interleaving strategy uses the interleaving history in one way or another to make process-scheduling decisions.
The set H of interleaving histories is the subset of (N 1 × N 1 ) * that is inductively defined by the following rules: The intuition concerning interleaving histories is as follows: if the kth pair of an interleaving history is (i, n), then the ith process got a turn in the kth interleaving step and after its turn there were n processes to be interleaved.The number of processes to be interleaved may increase due to process creation (introduced below) and decrease due to successful termination of processes.
The presented extension of ACP is called ACP+SI (ACP with Strategic Interleaving).It covers a generic interleaving strategy that can be instantiated with different specific interleaving strategies that can be represented in the way that is explained below.
In ACP+SI, it is assumed that the following has been given: a fixed but arbitrary set S; 3 We write for the empty sequence, d for the sequence having d as sole element, and α α ′ for the concatenation of sequences α and α ′ .We assume that the usual identities, such as α = α and (α α ′ ) α ′′ = α (α ′ α ′′ ), hold.
The elements of S are called control states, σ n is called an abstract scheduler (for n processes), and ϑ n is called a control state transformer (for n processes).
The intuition concerning S, σ n , and ϑ n is as follows: the control states from S encode data that are relevant to the interleaving strategy, but not derivable from the interleaving history; -if σ n (h, s) = i, then the ith process gets the next turn after interleaving history h in control state s; -if ϑ n (h, s, i, a) = s ′ , then s ′ is the control state that arises from the ith process doing a after interleaving history h in control state s.
Thus, S, σ n n∈N1 , and ϑ n n∈N1 make up a way to represent an interleaving strategy.This way to represent an interleaving strategy is engrafted on [23].
Consider the case where S is a singleton set, for each and, for each n ∈ N 1 , ϑ n is defined by In this case, the interleaving strategy corresponds to the round-robin scheduling algorithm.More advanced strategies can be obtained if the scheduling makes more advanced use of the interleaving history and the control state.The interleaving history may, for example, be used to factor the individual lifetimes of the processes to be interleaved and their creation hierarchy into the processscheduling decision making.Individual properties of the processes to be interleaved that depend on the actions performed by them can be taken into account by making use of the control state.The control state may, for example, be used to factor the processes being interleaved that currently wait to acquire a lock from a process that manages a shared resource into the process-scheduling decision making. 4n ACP+SI, it is also assumed that a fixed but arbitrary set D of data and a fixed but arbitrary function φ : D → P , where P is the set of all closed terms over the signature of ACP+SI (given below), have been given and that, for each d ∈ D and a, b ∈ A, cr(d), cr(d) ∈ A, γ(cr(d), a) = δ, and γ(a, b) = cr(d).The action cr(d) can be considered a process creation request and the action cr(d) can be considered a process creation act.They represent the request to start the process denoted by φ(d) in parallel with the requesting process and the act of carrying out that request, respectively.
The signature of ACP+SI consists of the constants and operators from the signature of ACP and in addition the following operators: for each n ∈ N 1 , h ∈ H, and s ∈ S, the n-ary strategic interleaving operator n h,s ; -for each n, i ∈ N 1 with i ≤ n, h ∈ H, and s ∈ S, the n-ary positional strategic interleaving operator ⌋⌊ n,i h,s .The strategic interleaving operators can be explained as follows: a closed term of the form n h,s (t 1 , . . ., t n ) denotes the process that results from interleaving of the n processes denoted by t 1 , . . ., t n after interleaving history h in control state s, according to the interleaving strategy represented by S, σ n n∈N1 , and ϑ n n∈N1 .
The positional strategic interleaving operators are auxiliary operators used to axiomatize the strategic interleaving operators.The role of the positional strategic interleaving operators in the axiomatization is similar to the role of the left merge operator found in ACP.
The axioms of ACP+SI are the axioms of ACP and in addition the equations given in Table 3.In the additional equations, n and i stand for arbitrary numbers from N 1 with i ≤ n, h stands for an arbitrary interleaving history from H, s stands for an arbitrary control state from S, a stands for an arbitrary action constant that is not of the form cr(d) or cr(d), and d stands for an arbitrary datum d from D. Axiom SI2 expresses that, in the event of inactiveness of the process whose turn it is, the whole becomes inactive immediately.A plausible alternative is that, in the event of inactiveness of the process whose turn it is, the whole becomes inactive only after all other processes have terminated or become inactive.In that case, the functions ϑ n : H × S × {1, . . ., n} × A → S must be extended to functions ϑ n :H × S × {1, . . ., n}× (A∪{δ}) → S and axiom SI2 must be replaced by the axioms in Table 4.
In (ACP+SI) rec , i.e.ACP+SI extended with guarded recursion in the way described in Section 2, the processes that can be created are restricted to the ones denotable by a closed ACP+SI term.This restriction stems from the requirement that φ is a function from D to the set of all closed ACP+SI terms.The restriction can be removed by relaxing this requirement to the requirement that φ is a function from D to the set of all closed (ACP+SI) rec terms.We write (ACP+SI) + rec for the theory resulting from this relaxation.In other words, (ACP+SI) + rec differs from (ACP+SI) rec in that it is assumed that a fixed but arbitrary function φ : D → P , where P is the set of all closed terms over the signature of (ACP+SI) rec , has been given.
It is customary to associate transition systems with closed terms of the language of an ACP-like theory of processes by means of structural operational semantics and to use this to construct a model in which closed terms are identified if their associated transition systems are bisimilar.The structural operational semantics of ACP can be found in [5,13].The additional transition rules for the strategic interleaving operators and the positional strategic interleaving operators are given in Appendix A.

Basic Properties of ACP with Strategic Interleaving
In this section, the subject of concern is the connection between ACP and ACP+SI.The main results are an elimination result, a conservative extension result, and a unique expansion result.We begin with establishing some results that will be used in the proof of those main results.
Let T be ACP+SI or (ACP+SI) rec .Then the set HNF of head normal forms of T is inductively defined by the following rules: Each head normal form of T is derivably equal to a head normal form of the form i<n a i • t i + j<m b i , where n, m ∈ N, for all i ∈ N with i < n, a i ∈ A and t i is a T term, and, for all j ∈ N with j < m, b j ∈ A.
Each guarded (ACP+SI) rec term is derivably equal to a head normal form of (ACP+SI) rec .
Proposition 1 (Head normal form).For each guarded (ACP+SI) rec term t, there exists a head normal form t ′ of (ACP+SI) rec such that t = t ′ is derivable from the axioms of (ACP+SI) rec .
Proof.First we prove the following weaker result about head normal forms: For each guarded ACP+SI term t, there exists a head normal form t ′ of ACP+SI such that t = t ′ is derivable from the axioms of ACP+SI.
The proof is straightforward by induction on the structure of t.The case where t is of the form δ and the case where t is of the form a (a ∈ A) are trivial.The case where t is of the form t 1 • t 2 follows immediately from the induction hypothesis and the claim that, for all head normal forms t 1 and t 2 of ACP+SI, there exists a head normal form t ′ of ACP+SI such that t 1 • t 2 = t ′ is derivable from the axioms of ACP+SI.This claim is easily proved by induction on the structure of t 1 .The case where t is of the form t 1 + t 2 follows immediately from the induction hypothesis.The cases where t is of one of the forms h,s (t 1 , . . ., t n ) are proved along the same lines as the case where t is of the form t 1 • t 2 .In the case that t is of the form t 1 | t 2 , each of the cases to be considered in the inductive proof of the claim demands a proof by induction on the structure of t 2 .In the case that t is of the form ⌋⌊ n,i h,s (t 1 , . . ., t n ), the claim is of course proved by induction on the structure of t i instead of t 1 .The case that t is of the form t 1 t 2 follows immediately from the case that t is of the form t 1 ⌊⌊ t 2 and the case that t is of the form t 1 | t 2 .The case that t is of the form n h,s (t 1 , . . ., t n ) follows immediately from the case that t is of the form ⌋⌊ n,i h,s (t 1 , . . ., t n ).Because t is a guarded ACP+SI term, the case where t is a variable cannot occur.
The proof of the proposition itself is also straightforward by induction on the structure of t.The cases other than the case where t is of the form X|E is proved in the same way as in the above proof of the weaker result.The case where t is of the form X|E follows immediately from the weaker result and RDP.
⊓ ⊔ Each of the four theorems to come refer to several process algebras.It is implicit that the same set A of actions and the same communication function γ are assumed in the process algebras referred to.
Each guarded recursive specification over ACP+SI can be reduced to a guarded recursive specification over ACP.
Theorem 1 (Reduction).For each guarded recursive specification E over ACP+SI and each X ∈ V(E), there exists a guarded recursive specification E ′ over ACP such that X|E = X|E ′ is derivable from the axioms of (ACP+SI) rec .
Proof.We start with devising an algorithm to construct the guarded recursive specification E ′ .The algorithm keeps a set V of recursion equations from E ′ that are already found and a sequence W of equations of the form X k = t k |E that still have to be transformed.The algorithm has a finite or countably infinite number of stages.In each stage, V and W are finite.Initially, V is empty and W contains only the equation X 0 = X|E .
In each stage, we remove the first equation from W . Assume that this equation is X k = t k |E .We bring the term t k |E into head normal form.If t k is not a guarded term, then we use RDP here to turn t k into a guarded term first.Thus, by Proposition 1, we can always bring the term t k |E into head normal form.Assume that the resulting head normal form is i<n a i • t ′ i + j<m b j .Then, we add the equation X k = i<n a i •X k+i+1 + j<m b j , where the X k+i+1 are fresh variables, to the set V .Moreover, for each i < n, we add the equation X k+i+1 = t ′ i to the end of the sequence W . Notice that the terms t ′ i are of the form t k+i+1 |E .
Because V grows monotonically, there exists a limit.That limit is the finite or countably infinite linear recursive specification E ′ .Every equation that is added to the finite sequence W , is also removed from it.Therefore, the right-hand side of each equation from E ′ only contains variables that also occur as the left-hand side of an equation from E ′ .Now, we want to use RSP to show that X|E = X|E ′ is derivable from the axioms of (ACP+SI) rec .The variables occurring in E ′ are X 0 , X 1 , X 2 , . . . .For each k, the variable X k has been exactly once in W as the left-hand side of an equation.For each k, assume that this equation is X k = t k |E .To use RSP, we have to show for each k that the equation X k = i<n a i • X k+i+1 + j<m b j from E ′ with, for each l, all occurrences of X l replaced by t l |E is derivable from the axioms of (ACP+SI) rec .For each k, this follows from the construction.⊓ ⊔ The next three theorems will be proved by means of term rewriting systems.In Appendix B, basic definitions and results regarding term rewriting systems are collected.This appendix also serves to fix the terminology on term rewriting systems used in the proofs of the next three theorems.
Each closed (ACP+SI) + rec term is derivably equal to a closed ACP rec term.Theorem 2 (Elimination).For each closed (ACP+SI) + rec term t, there exists a closed ACP rec term t ′ such that t = t ′ is derivable from the axioms of (ACP+SI) + rec .
Proof.We prove this by means of a term rewriting system that takes equational axioms of (ACP+SI) + rec and equations derivable from the axioms of (ACP+SI) + rec as rewrite rules.Thus, the proof boils down to showing that (a) the term rewriting system concerned has the property that each (ACP+SI) + rec term has a unique normal form modulo axioms A1 and A2 and (b) each closed (ACP+SI) + rec term that is a normal form modulo axioms A1 and A2 is a closed ACP rec term.Henceforth, we will write AC for the set of equations that consists of axioms A1 and A2.
Let R be a set of equations that contains for each guarded recursive specification E over ACP+SI and X ∈ V(E) an equation X|E = X|E ′ , where E ′ is a guarded recursive specification over ACP, that is derivable from the axioms of (ACP+SI) + rec .Such a set R exists by Theorem 1.Consider the term rewriting system R((ACP+SI) + rec ) that consists of the axioms of (ACP+SI) + rec , with the exception of A1, A2, RDP, and RSP, and the equations from R taken as rewrite rules.
We show that R((ACP+SI) + rec ) has the property that each (ACP+SI) + rec term has a unique normal form modulo AC by proving that R((ACP+SI) + rec ) is terminating modulo AC and confluent modulo AC.
First, we show that R((ACP+SI) + rec ) is terminating modulo AC.This can be proved by the reduction ordering > induced by the extended integer polynomials θ(t) associated with (ACP+SI) + rec terms t as follows: where it is assumed that, for each variable X over processes, X is a variable over integers.The following is easy to see: (a) t > t ′ for all rewrite rules t = t ′ of R((ACP+SI) + rec ) and (b) t > t ′ implies s > s ′ for all (ACP+SI) + rec terms s and s ′ for which t = s and t ′ = s ′ are derivable from AC. 6 Hence, R((ACP+SI) + rec ) is terminating modulo AC.
Above, we have shown that R((ACP+SI) + rec ) is terminating modulo AC and confluent modulo AC and by this that it has the property that each (ACP+SI) + rec term has a unique normal form modulo AC.It remains to be shown that each closed (ACP+SI) + rec term that is a normal form modulo AC is a closed ACP rec term.It is not hard to see that, for each closed (ACP+SI) + rec term in which other operators than + and • occur, a reduction step modulo AC is still possible in R((ACP+SI) + rec ).Because a reduction step modulo AC is impossible for a normal form modulo AC, no other operators than + or • can occur in a closed (ACP+SI) + rec term that is a normal form modulo AC.Hence, each closed (ACP+SI) + rec term that is a normal form modulo AC is a closed ACP rec term.

⊓ ⊔
Each equation between closed ACP terms that is derivable in ACP+SI is also derivable in ACP.

Theorem 3 (Conservative extension).
For each two closed ACP terms t and t ′ , t = t ′ is derivable from the axioms of ACP+SI only if t = t ′ is derivable from the axioms of ACP.
Proof.We prove this by means of a restriction of the term rewriting system from the proof of Theorem 2. Consider the term rewriting system R(ACP+SI) that consists of the axioms of ACP+SI, with the exception of A1 and A2.R(ACP+SI) is R((ACP+SI) + rec ) restricted to ACP+SI terms.Just like R((ACP+SI) + rec ), R(ACP+SI) is terminating modulo AC and confluent modulo AC.The proofs of these properties for R((ACP+SI) + rec ) carry over to R(ACP+SI).Let t and t ′ be two closed ACP terms such that t = t ′ is derivable from the axioms of ACP+SI.Reduce t and t ′ to normal forms s and s ′ , respectively, by means of the term rewriting system R(ACP+SI).By Theorem 5 in [20], being confluent modulo AC is equivalent to being Church-Rosser modulo AC for a term rewriting system that is terminating modulo AC.This means that t and t ′ have the same normal form modulo AC.In other words, s = s ′ is derivable from axioms A1 and A2.Because (a) no other operators than + and • occur in t and t ′ and (b) no rewrite rule introduces one or more of the other operators if one or more of the other operators was not already in its left-hand side, each rewrite rule applied in the reduction from t to s or the reduction from t ′ to s ′ is one of the axioms of ACP.Therefore, each rewrite rule involved in the reduction from t to s or the reduction from t ′ to s ′ is an axiom of ACP.Hence, the reduction from t to s shows that t = s is derivable from the axioms of ACP and the reduction from t ′ to s ′ shows that t ′ = s ′ is derivable from the axioms of ACP.From this and the fact that s = s ′ is derivable from axioms A1 and A2, it follows t = t ′ is derivable from the axioms of ACP.

⊓ ⊔
The following theorem concerns the expansion of minimal models of ACP to models of ACP+SI.
Theorem 4 (Unique expansion).Each minimal model of ACP has a unique expansion to a model of ACP+SI.
Proof.We write f A , where A is a model of ACP or ACP+SI and f is a constant or operator from the signature of A, for the interpretation of f in A. We write t A , where A is a model of ACP or ACP+SI and t is a closed term over the signature of A, for the interpretation of t in A.
Let A be a minimal model of ACP.Let CT be a function from the carrier of A to the set of all closed ACP terms such that, for each element p of the carrier of A, CT (p) A = p.Because A is a minimal model of ACP, CT (p) is a total function.We write p, where p is an element of the carrier of A, for CT (p).Let NF be a function from the set of all closed ACP+SI terms to the set of all closed ACP terms such that, for each closed ACP+SI term t, NF (t) is one of the normal forms that t can be reduced to by means of the term rewriting system R(ACP+SI) from the proof of Theorem 3.
We start with constructing an expansion of A with interpretations of the additional operators of ACP+SI.Let B be the expansion of A with interpretations of the additional operators of ACP+SI where these interpretations are defined as follows: for all p 1 , . . ., p n from the carrier of A.
We proceed with proving that B is a model of ACP+SI.By Theorem 3, it is sufficient to prove that B satisfies axioms SI1-SI8.By its construction, B is a minimal algebra and consequently it is sufficient to prove that B satisfies all closed substitution instances of SI1-SI8.We use the following three claims to prove this: for all closed substitution instances t = t ′ of SI1-SI8, t B = NF (t) A ; for all closed substitution instances t = t ′ of SI1-SI8, t ′B = NF (t ′ ) A ; for all closed substitution instances t = t ′ of SI1-SI8, NF (t) A = NF (t ′ ) A .
The first claim follows easily from the definitions of the interpretations of the additional operators of ACP+SI given above.The second claim follows easily from these definitions and the proof of the first claim.Because R(ACP+SI) is Church-Rosser modulo AC (see the proof of Theorem 3), we have that NF (t) = NF (t ′ ) is derivable from axioms A1 and A2.From this, the third claim follows immediately.It is an immediate consequence of the three claims that B satisfies all closed substitution instances of SI1-SI8.We still have to prove that B is the only expansion of A to a model of ACP+SI.We can prove this by contradiction.Assume that C is an expansion of A to a model of ACP+SI that differs from B. Then at least one of the additional operators of ACP+SI has different interpretations in B and C. By the definitions of the interpretations of the additional operators of ACP+SI in B, this means that there exists a closed ACP+SI term t such that t C = NF (t) A .Moreover, because because t = NF (t) is derivable from the axioms of ACP+SI, t C = NF (t) C .Hence, NF (t) C = NF (t) A .Because NF (t) is a closed ACP term, this contradicts the fact that C is an expansion of A.

Concluding Remarks
We have extended the algebraic theory of processes known as ACP with the form of interleaving that underlies multi-threading as found in contemporary programming languages.We have also established some basic properties of the resulting theory.It remains an open question whether strategic interleaving is definable in an established extension of ACP.
In [21], we extend a minor variant of ACP, known as ACP ǫ , with strategic interleaving and show that the resulting theory can deal with a process-scheduling policy that supports mutual exclusion of critical subprocesses.

A Structural Operational Semantics of ACP+SI
It is customary to associate transition systems with closed terms of the language of an ACP-like theory about processes by means of structural operational semantics and to use this to construct a model in which closed terms are identified if their associated transition systems are bisimilar.The structural operational semantics of ACP can be found in [5,13].The additional transition rules for the strategic interleaving operators and the positional strategic interleaving operators are given in Table 5.In this table, -t a − → √ indicates that t is capable of performing action a and then terminating successfully; -t a − → t ′ indicates that t is capable of performing action a and then behaving as t ′ .
The transition rules for the strategic interleaving operator are similar to the transition rules for the positional strategic interleaving operators, but each transition rule for the strategic interleaving operator has the side-condition i = σ n (h, s).

B Term Rewriting Systems
In this appendix, basic definitions and results regarding term rewriting systems are collected.This appendix also serves to fix the terminology on term rewriting systems used in the proofs that make use of term rewriting systems.
We assume that a set of constants, a set of operators with fixed arities, and a set of variables have been given; and we consider an arbitrary term rewriting system R for terms that can be built from the constants, operators, and variables in these sets.
A rewrite rule is a pair of terms t → s, where t is not a variable and each variable occurring in s occurs in t as well.A term rewriting system is a set of rewrite rules.
A reduction step of R is a pair t → s such that for some substitution instance t ′ → s ′ of a rewrite rule of R, t ′ is a subterm of t, and s is t with t ′ replaced by s ′ .Here, t ′ is called the redex of the reduction step.A reduction of R is a  A reduction ordering for R is a well-founded ordering on terms that is closed under substitutions and contexts.R is terminating if and only if there exists a reduction ordering > for R such that t > s for each rewrite rule t → s of R.
A unifier of two terms s and t is a substitution σ such that σ(s) ≡ σ(t).A critical pair of R is a pair (t 1 , t 2 ) of terms for which there exist rewrite rules s → s ′ and t → t ′ of R and a 'most general unifier' σ of s and a non-variable subterm of t such that t 1 ≡ σ(t ′′ ) and t 2 ≡ σ(t ′ ), where t ′′ is t with σ(s) replaced by σ(s ′ ). 7A critical pair (t 1 , t 2 ) of R is convergent if there exist reductions t 1 → → s and t 2 → → s of R. If R is terminating, then R is confluent if and only if all critical pairs of R are convergent.
Henceforth, we consider an arbitrary set E of equations between terms.A reduction step modulo E of R is a pair t → E s such that there exists a reduction step t ′ → s ′ of R such that t = t ′ and s = s ′ are derivable from E. A reduction modulo E of R is pair t → → E s such that either t = s is derivable from E or there exists a finite sequence t 1 → E t 2 , . . ., t n → E t n+1 of consecutive reduction steps modulo E of R such that t ≡ t 1 and s ≡ t n+1 .
A term t is a normal form modulo E of R if there does not exist a term s such that t → E s is a reduction step modulo E of R. A term t has a normal form modulo E in R if there exists a reduction modulo E t → → E s of R and s is a normal form modulo E of R. R is terminating modulo E on term t if there does not exist an infinite sequence t → E t 1 , t 1 → E t 2 , t 2 → E t 3 , . . . of consecutive reduction steps modulo E of R. R is terminating modulo E if R is terminating modulo E on all terms.R is confluent modulo E if for all reductions modulo E t → → E s 1 and t → → E s 2 of R there exist reductions modulo E s 1 → → E s and s 2 → → E s of R. If R is terminating modulo E and confluent modulo E, then each term has a unique normal form modulo E in R.
A reduction ordering > for R is E-compatible if t > s implies t ′ > s ′ for all terms t ′ and s ′ for which t = t ′ and s = s ′ are derivable from E. R is terminating modulo E if and only if there exists an E-compatible reduction ordering > for R such that t > s for each rewrite rule t → s of R.
A unifier modulo E of two terms s and t is a substitution σ such that σ(s) = σ(t) is derivable from E. A critical pair modulo E of R is a pair (t 1 , t 2 ) of terms for which there exist rewrite rules s → s ′ and t → t ′ of R and a substitution σ from a 'complete set of unifiers modulo E' of s and a non-variable subterm of t such that t 1 ≡ σ(t ′′ ) and t 2 ≡ σ(t ′ ), where t ′′ is t with σ(s) replaced by σ(s ′ ). 7 If R is terminating modulo E, then R is confluent modulo E if and only if all critical pairs modulo E of R are convergent.
An E-equality step is a pair t | −| E s such that, for some substitution instance t ′ = s ′ of an equation from E, either t ′ is a subterm of t and s is t with t ′ replaced by s ′ or s ′ is a subterm of t and s is t with s ′ replaced by t ′ .An R ∪ E-equality step is a pair t |=| E s such that t → s is a reduction step of R or s → t is a reduction step of R or t | −| E s is an E-equality step.An R ∪ E-equality is a pair t |= * | E s such that either t ≡ s or there exists a finite sequence t

Table 1 .
Axioms of ACP

Table 2 .
Axioms for guarded recursion

Table 3 .
Axioms for strategic interleaving

Table 5 .
Transition rules for strategic interleaving pair t → → s such that either t ≡ s or there exists a finite sequence t 1 → t 2 , . .., t n → t n+1 of consecutive reduction steps of R such that t ≡ t 1 and s ≡ t n+1 .A term t is a normal form of R if there does not exist a term s such that t → s is a reduction step of R. A term t has a normal form in R if there exists a reduction t → → s of R and s is a normal form of R. R is terminating on term t if there does not exist an infinite sequence t → t 1 , t 1 → t 2 , t 2 → t 3 , . . . of consecutive reduction steps of R. R is terminating if R is terminating on all terms.R is confluent if for all reductions t → → s 1 and t → → s 2 of R there exist reductions s 1 → → s and s 2 → → s of R. If R is terminating and confluent, then each term has a unique normal form in R.