The Theory and Practice of Concurrency
This page gives access to example files related to this book, in some cases with accompanying papers.
The ones available at present are
Various additional examples on computer security (some of which exploit and extend the theory of data independence).
Miscellaneous examples including distributed algorithms.Return to Book home page