Programming with Broadcasts

نویسنده

  • K. V. S. Prasad
چکیده

[Pra91, Pra92] develop CBS, a CCS-like calculus [Mil89] where processes communicate by broadcasting values along a single channel. These values are hidden or restricted by translation to noise. This paper types CBS and restricts it to processes with a unique response to each input. Nondeterminism arises only if two processes in parallel both wish to transmit. These restrictions do not reduce the programming power of CBS. But strong and weak bisimulation can now be de ned exactly as in CCS, yet capture observationally meaningful relations. Weak bisimulation is a congruence. This paper also shows how to program in CBS in a (lazy) ML framework. A simple CBS simulator is given, and a parallel implementation discussed. The simulator represents data evaluation, recursion and conditionals directly in Lazy ML. It implements an extended CBS with evaluation as well as communication transitions. [Pra91, Pra92] develop a CCS-like [Mil89] calculus of broadcasting systems, CBS. This paper continues the development, restricting the calculus without losing programming power, and yet simplifying the semantics substantially. The new CBS is presented in Sections 1 to 4. [Pra91, Pra92] should be consulted for more motivation, discussion of design, and comparison with CCS. No knowledge of these papers is necessary, however. Familiarity with CCS will be helpful. This paper also describes a way to program in CBS in a (lazy) functional programming framework [BW88], using a CBS simulator implemented in Lazy ML [AJ93] (LML for short). The resulting language is powerful, natural and welltyped. This part of the paper (Sections 5 to 7) is informal. It is not yet clear how to link proofs about the LML programs with proofs about CBS. Nonetheless, the programming concepts seem simple, and are now quite old; they are therefore reported here. The type system and many of the examples predate [Pra92]. The simpli ed CBS of this paper was inspired by programming experience. CBS compares well with attempts to combine CCS with ML, including PFL [Hol83], Facile [GMP89], and LCS [Ber93]. CML [Rep91, BMT92] adds concurrency primitives to ML, but its relationship to process calculi is unclear. All these

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Power of the Local in Sports Broadcasting: A Cross-Cultural Analysis of Rugby Commentary

This article explores how local pressures intersect to produce differing broadcasts in 2 cultural contexts. This is achieved via a cross-cultural analysis of a decade of televised rugby union matches between France and New Zealand and interviews with leading commentators in both countries. The authors argue that although the overarching commercial imperative to capture audiences might be the sa...

متن کامل

Uniform Resource Identifiers for Television Broadcasts

World-Wide Web browsers are starting to appear on a variety of consumer electronic devices, such as television sets and television set-top boxes, which are capable of receiving television programming from either terrestrial broadcast, satellite broadcast, or cable. In this context there is a need to reference television broadcasts using the URI format described in [RFC 2396]. This document desc...

متن کامل

Crosstalk and the spectrum of biological global broadcasts: Toward generalization of the Baars consciousness model across physiological subsystems

Once cognitive biological phenomena are recognized as necessarily having ‘dual’ information sources, it is easy to show that the information theory chain rule implies isolating coresident information sources from crosstalk requires more metabolic free energy than permitting correlation. This provides conditions for an evolutionary exaptation leading to dynamic global broadcasts of interacting c...

متن کامل

Authenticated In-Network Programming for Wireless Sensor Networks

Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We ...

متن کامل

Social Media Broadcasts and the Maintenance of Diverse Networks

Social media platforms like Facebook, Twitter, and LinkedIn let people broadcast messages to their entire network of contacts all at once. As the number of users and the amount of information they broadcast grow, platform managers face an increasingly pressing problem – which broadcasts should they show their users? To address this question, I study the database of a social media company that s...

متن کامل

Optimizing Network Bandwidth in Data Broadcasting

The focus of this research is delivering data, such as stock prices, news, and multimedia to wireless users, while consuming the least bandwidth. Currently, the pricing mechanism for wireless data services is based solely on the number of bits a client receives or sends. However, the actual cost to the service provider depends on the usage of network resources, particularly the wired and wirele...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993