logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Process Algebra Equational Theories Of Communicating Processes J C M Baeten

  • SKU: BELL-1494074
Process Algebra Equational Theories Of Communicating Processes J C M Baeten
$ 31.00 $ 45.00 (-31%)

4.7

46 reviews

Process Algebra Equational Theories Of Communicating Processes J C M Baeten instant download after payment.

Publisher: CUP
File Extension: PDF
File size: 1.55 MB
Pages: 478
Author: J. C. M. Baeten, T. Basten, M. A. Reniers
ISBN: 9780521820493, 0521820499
Language: English
Year: 2010

Product desciption

Process Algebra Equational Theories Of Communicating Processes J C M Baeten by J. C. M. Baeten, T. Basten, M. A. Reniers 9780521820493, 0521820499 instant download after payment.

Process algebra is a widely accepted and much used technique in the specification and verification of parallel and distributed software systems. This book sets the standard for the field. It assembles the relevant results of most process algebras currently in use, and presents them in a unified framework and notation. The authors describe the theory underlying the development, realization and maintenance of software that occurs in parallel or distributed systems. A system can be specified in the syntax provided, and the axioms can be used to verify that a composed system has the required external behavior. As examples, two protocols are completely specified and verified in the text: the Alternating-Bit Protocol for Data Communication, and Fischer's Protocol of Mutual Exclusion. The book serves as a reference text for researchers and graduate students in computer science, offering a complete overview of the field and referring to further literature where appropriate.

Related Products