NOTE: This transcription was contributed by Martin P.M. van der Burgt, who has devised a process for producing transcripts automatically. Although its markup is incomplete, we believe it serves a useful purpose by virtue of its searchability and its accessibility to text-reading software. It will be replaced by a fully marked-up version when time permits. —HR
Sequencing primitives revisited.
Let “db” equal the number of boys in the common dressing room of a swimming pool; the initial value of db obviously equals zero. Using the operators “inc” and “dec” respectively for increase and decrease by one of their integer argument(s), we can describe the life of a little boy —omitting all further irrelevant details— as the cyclic process
do inc(db); dec(db) od |
There is, however, another way of looking at the usage of the dressing room. From the point of view of the dressing room —which can be assumed not to be awfully interested in the identity of the boys using it, there are just two sequential processes
do inc(db) od and do dec(db) od , |
db ≥ 0 |
As a second example, consider the well-known version of Euclid’s algorithm for the computation of the greatest common divisor GCD(A, B) of two positive numbers, using addition and subtraction only:
a := A; b := B; | ||
while a ≠ b do if a > b then a := a - b | ||
else b := b - a fi od | ||
print(a) |
The first line establishes the relation “GCD(A, B) = GCD(a, b)” and both operations “a:= a - b” and “b:= b - a” leave that relation —For such are the properties of the GCD-function— invariant. Furthermore, the first line establishes
a > 0 and b > 0 |
Also this program, however, admits another interpretation, viz. the two cyclic processes
do a:= a - b od and do b:=b-a od |
P: | a > 0 and b > 0 |
Let us compute the synchronizing conditions that follow from this requirement. Using the notation
wp(S, P) |
wp(“a:=a - b”, a>0 and b>0) = (a - b>0 and b>0) | |
wp(“b:=b - a”, a>O and b>0) (a>O and b - a>0). |
(P and C) ⇒ wp(S, P) . |
The computation of C is simple. but I shall explain it slowly, as I can only have heart-felt sympathy with any reader who, through unfamiliarity, gets confused. (Students and staff from Aarhus, Denmark, may remember how, early 1973, I got completely entangled during one of my lectures, when lack of preparation could not be compensated by experience!) One uses the following theorems of propositional calculus
1) | From P ⇒ C2 follows (P and (C1 and C2)) = (P and C1) |
2) | From P ⇒ non C2 follows (P and (C1 or C2)) = (P and C1) . |
As first form of C, satisfying
(P and c) ⇒ wp(S, P) |
(P and a > b) ⇒ wp(“a:= a - b”, P) and | |
(P and b > a) ⇒ wp(“b:= b - a”, P) . |
And it is now very tempting —so tempting in fact, that I shall do it— to write our program for the greatest common divisor as follows:
a:= A; b:= B; | ||
do a > b: a:= a - b, | ||
b > a: b:= b - a od; | ||
print(a) |
< guarding head > ::= < boolean expression > : < statement >
< guarded command > ::= < guarding head > { ; < statement > }
where the braces {...} should be read as “followed zero or more times by the enclosed” —in our example above, this is zero times—< guarded command list > ::= < guarded command > { , < guarded command > }
The guarded command list is a semantically unordered list of guarded commands, separated by commas. (We have sticked to the usual convention to use the comma as separator in a list in which the relative order of the elements separated is semantically irrelevant, the above program could equally well have been written with
do b > a: b:=b - a, | ||
a.> b: a:= a - b od .) |
A guarded command is “executable” when its associated guard —here the boolean expression with which the guarding head starts— considered as a function of the initial state is true.
Basically we propose two constructs with guarded command lists. The first is a possible form of a statement:
< statement > ::= if < guarded command list > fi
If one or more of the guarded commands is executable, the execution of the whole construct consists of the execution of one of the executable guarded commands. If none of the guarded commands in the enclosed list is executable, the program is wrong —and in attempted execution we assume program abortion. Note that there is no point in introducing the default convention that, if none of the n alternatives mentioned in the list is executable, the whole construct reduces to the empty statement. If we wish to provide that alternative, we should add it as the n+1st alternative and write instead ofif B1: S1, ... Bn: Sn fi |
if B1: S1, ... , Bn: Sn, non(B1 or ... or Bn): Slast fi |
if B1: S1, ... , Bn: Sn else Slast fi , |
< statement > ::= if < guarded command list > else < guarded command list > fi
If one or more guarded commands from the list are executable, one of them will will be executed, otherwise the statement following “else” .What used to be written as if B then S1 else S2 fi can now be written
if B: S1, non B: S2 fi |
if B: S1 else S2 fi . |
(In doing so, we can imagine ourselves to serve a dual purpose. On the one hand the use of else can be regarded as a hint to the implementation: after the evaluation of B the value of non B is known as well. On the other hand it is an explicit expression (for us!) of the fact that at least one of the alternatives is executable, stronger, that if none of the preceeding ones is executable, the last one is and that, if the last one is executable, it is the only one. In the following it will become apparent that the use of else is often to be avoided.)
Note that what we used to write as
if B then S fi |
if B: S else fi |
if B: S fi |
if B then S else ABORT fi . |
Secondly we note that in the case that more than one of the guarded commands in the list is executable, we have left undefined which of the ones will be chosen for execution. This is done intentionally; in this respect we are proposing what could be regarded as a non-deterministic machine. On the one hand we have the duty to see to it that this non-determinacy is only introduced “when it does not matter”, on the other hand —and that is at this stage more important— whenever “it does not matter” our notation does not force an arbitrary or premature decision upon us.
The second construct with guarded command lists that we propose is
< statement > ::= do < guarded command list > od
Here we do allow that the alternatives are exhausted. i.e. it is not a fatal error if none of the guarded commands is executable: in the case of exhaustion, the execution of the whole do ... od construct is regarded as completed. The complementary rule, however, is that this is the only way in which the do ... od construct can terminate and that, as long as at least one of the guarded commands is executable, one of the executable ones will be selected for execution. In the case of more than one executable command, it is again undefined which one will be selected, we postulate, however, that then they will be selected in “fair random order”, i.e. we disallow the non-determinacy permanent neglect of a permanently executable guarded command from the list. We have to postulate this, because in the constructdo B1: S1, B2: S2 od |
Again, if more than one of the guarded commands is executable we have what we can regard as a non-deterministic machine. We have to see to it that whenever we introduce this non-determinacy, “it does not matter”, on the other hand “whenever it does not matter” our notation relieves us from the duty to make an arbitrary choice.
But even in the case of mutually exclusive B’s —i.e. no non-determinacy— the text
do B1:S1, B2:S2 od |
1) while(B1 or B2)do | ||
if B1 then S1 else S2 fi | ||
od |
2) while(B1 or B2)do | ||
while B1 do D1 od; | ||
while B2 do S2 od | ||
od |
3) repeat ready:= true; | ||
while B1 do S1; ready:= false od; | ||
while B2 do S2; ready:= false od | ||
until ready |
* *
*
As we have pointed out, in the case of a non-deterministic choice between two or more guarded commands, we must ensure that “the choice does not matter” and before proceeding with more examples, we had better be sufficiently clear about
1) | what we mean by “does not matter” and |
2) | how we ensure that fact. |
There is a snag about non-determinacy. We recall that we denote by
wp(S, R) |
In the fourth relation. the non-determinacy replaces the equality by an implication. If initially wp(S, R) is not true, the truth of R after execution of S is not excluded.
Note. For a given S, wp(S, R) is uniquely defined for any postcondition R, even if S is non-deterministic!
Finally I introduce —inspired by, but possibly deviating from, C.A.R. Hoare— one further notation, viz.
{P} S {R} |
{P} S {R} | |
(wp(S, T) and P) ⇒ wp(S, R) . |
There are two typical applications of the concept of “a safe precondition”. Firstly, if we can establish a safe precondition and can establish separately that the execution of S will terminate properly, then we have derived a sufficient precondition —not necessarily the weakest one, but often we don’t need that, so why bother? The advantage is that the reasoning establishing the safeness of the precondition now need not be encumbered by arguments establishing proper termination (the latter arguments often being of quite a different nature). Secondly, we may be quite content with the assertion itself as we are often content with programs that either do the job or “give up” —e.g. a compiler refusing a source program, the compilation of which violates some capacity limits—, provided that we can be certain that “giving up” will be exceptional and not disastrous.
For our constructs with guarded commands we can now formulate the following properties.
Let S be “if B1:S1, ... , Bn:Sn fi” and let for 1 ≤ S ≤ n hold: {P and Bi} Si {R}, then we can assert about S: {P} S QR} . Note that S may fail to terminate properly because none of the guards is true, or because the guarded command selected fails to terminate properly.
Let S be “do B1:S1. ... , Bn:Sn od” and let for 1 ≤ S ≤ n hold: {P and Bi} Si {P}; then we can assert: {P} S {P and non(B1 or ... or Bn)}. Note that also this S may fail to terminate properly, but here either because the state with no guard true fails to occur, or because a guarded command selected fails to terminate properly.
Let S be “if B1:S1, ... , Bn,Sn fi” and let for 1 ≤ S ≤ n hold (P and Bi) ⇒ wp(Si, R). then (P and (B1 or ... or Bn))⇒wp(S, R) . Here we assert termination.
To give an example. Let S be
do y ≠ 1: x:= x + 1, | ||
y ≠ 1: x:= x - 1, | ||
y ≠ 1: y:=1 od |
wp(S, x = x0) = (y = 1 and x = x0) |
wp(S. y ≠ 1) = F |
wp(S, y = 1) = T |
Before turning to next examples, I once more return to Euclid’s algorithm
if A > 0 and B > 0: | |||
a:= A; b:= B; | |||
do a > b: a:= a - b, | |||
b > a: b:= b - a | |||
od | |||
print(a) fi |
P: | GCD(A, B) = GCD(a, b)and a >0 and b >0 . |
non (a > b or b > a) |
Does the loop terminate? Yes, for each execution of a guarded command from the list decreases a + b by at least 1 and therefore, in view of the invariance of P, this can happen only a finite number of times. We see here that “termination” —i.e. all the guards false— is here our goal; when synchronizing cyclic processes such as in an operating system, the situation “all the guards false” is called “a deadly embrace” and there one aims at avoiding this situation, because the show must go on! I hope to have shown the close connection between termination of sequential processes and deadlock in parallel programming.
Let us now try another problem. For N ≥ 0, we are requested to assign to an integer variable “a” such a value that the relation
R: |
a2 ≤ N and (a+1)2>N |
P: |
a2 ≤ N and b2>N |
a:= 0; b:= N + 1; | ||
do a+1 ≠ b: “bring a and b closer together | ||
under invariance of P” od . |
Let “d” be the amount, by which the difference b - a is going to be decreased. Without loss of generality, we can assume that in the operation “bring a and b closer together under invariance of P” only one of the two variables will be changed each time, because the other one can be adjusted in the (or a) next execution of the repeatable statement.
Under these life-simplifying restrictions the repeatable statement will be somthing of the structure
d:= ......; | ||
if ......: a:= a + d, | ||
......: b:= b - d fi |
Now our theorems about the if...fi construct tell us, that we can drop the terms implied by P and our repeatable statement becomes
d:= .......; | ||
if (a + d)2 ≤ N: a:= a + d, | ||
(b - d)2 > N: b:=b - d fi |
a:= 0; b:= N + 1; | |||
do a+1 ≠ b: d:=(b-a) div 2; | |||
if (a + d)2 ≤ N: a:= a + d, | |||
(b-d)2>N: b:=b-d fi | |||
od |
(26th November 1973). Since I wrote the previous pages of this report last week, I saw that Don Knuth pointed out in a letter to Tony Hoare, that this use of the comma violates all rules of interpunction: one should not use the comma as major separator between pieces of text that internally may contain the semicolon as minor separator. I agree and in the following text —this whole report is an experiment in notation!— I shall use —inspired by the vertical bar “|” of Peter Naur’s representation of BNF— a fat vertical bar “▯” instead, i.e.
< guarded command list > ::= < guarded command > { ▯ < guarded command > }
The next example I am going to code is known as “The Problem of the Dutch National Flag”. In frontof a row of buckets, numbered from 1 through N, there is a minicomputer. Each bucket contains one pebble and each pebble is either red, or white of blue. The minicomputer can permute the pebbles because it has two controllable mechanical hands. controlled by the instruction “swap(i, j)” (1 ≤ i, j ≤ N): if i = j, this is the empty command, if i ≠ j, the pebbles in buckets nr.i and nr.j respectively are interchanged. Also the machine has a movable eye used to compute the function “look(i)” (1 ≤ i ≤ N) of type colour: its value is the colour of the pebble in bucket nr.i (currently in bucket nr.i. I mean). The minicomputer must be programmed in such a way that it will rearrange the pebbles in the order of the Dutch National Flag, i.e. red, white, blue. There are, however, three constraints.
1) We know nothing about the numbers of red, white or blue pebbles, the program must even work in the case of missing colours
2) It is a minicomputer with such a small store that the program may not make use of internal arrays
3) It is assumed that the evaluation of the function “look” is so timeconsuming that we require that each pebble is “looked at” at most once.
The argument is the following. On account of the last requirement we have somewhere half way the computational process four kinds of pebbles: established red, established white, established blue and uninspected. We have to keep track of which is what, we cannot use an internal array for that purpose, we therefore use also the row of buckets and there contents as a memory element. We can represent then the information with three internal pointers, r, w and b according to the following convention:
for 1 ≤ k < r: | the pebble in bucket nr.k is established red, |
for r ≤ k ≤ w: | the pebble in bucket nr.k is uninspected |
for w < k ≤ b: | the pebble in bucket nr.k is established white |
for b < k ≤ N: | the pebble in bucket nr.k is established blue. |
Once we have chosen this general intermediate state, our problem is nearly solved, because both initial state (all pebbles uninspected) and final state (no pebbles uninspected and the remaining ones sorted out) are particular cases of the above described general state. So that one is established and under its invariance the number of uninspected pebbles is decreased one at a time. Inspection of the pebble in bucket nr. w gives on the average less swaps to perform than inspection of the pebble in bucket nr.r and we arrive ultimately at the following program
begin int var r, w, b; colour var v; | |||
r:=1; w:= N; b:= N; | |||
do r ≤ w: v:= look(w); | |||
if v = red: swap(r, w); inc(r) ▯ | |||
v = white: dec(w) ▯ | |||
v = blue: swap(b, w); dec(b, w) | |||
fi | |||
od | |||
end |
if v = red then swap(r, w); inc(r) | |||
else if v = blue then swap(b, w); dec(b) fi; | |||
dec(w) | |||
fi |
I know that I am now talking about minute details —some of my readers might already wonder why I bother!— but let us analyse the difference as completely as possible, so that we might learn from it. We have seen that decrementing “w” is part of the reaction in cases white and blue, so we decide to group them together in our first binary cut,where we ask for “v = red”. (I have shown this example in its old version for many audiences and I remember my “justification” more or less going as follows “What the repeatable statement has to do is to decrease the difference w - r, either by increasing r or by decreasing w , etc”. What a waste of words!) In passing we note, that this way of partitioning becomes definitely unattractive, if for some reasons, we may expect a minority of red pebbles, and that is suddenly a quite different sort of consideration! If the pebble is not red, we discover that waht has to be done in the case of a white pebble is really a subset of what has to be done with the blue pebble and as no programmer would think of writing
if v = white then else swap(B, w); dec(b) fi; dec(w) |
If a number of guarded commands from a list have a common tail, we might wish to save writing; we can do so by introducing an abbreviation, which syntactically can be presented as an alternative for the guarding head
< guarding head > ::= [ < guarded command list > ]: < statement >
allowing us to write
if v = red: swap(r, w); inc(r) ▯ | ||
[v = white: ▯ | ||
v = blue: swap(b, w); dec(b)]: dec(w) | ||
fi |
* *
*
The original reason to undertake these experiments was the following observation. Many a program shows the following phenomenon
while non null(x1) do | ||
begin temp:= tail(x1);..... |
< guarding head > ::= < boolean expression > : < statement > | < guarded primitive > .
Let me show, how these can be used; I use an example that I owe to W.H.J.Feijen. Let V be a set and let e be a variable of the type of the elements of V. We consider two guarded primitives
sel(V, e): | the guard of this primitive is the initial value of non empty(V); the corresponding action is to select any element from V, to remove it from V and to assign it to the variable a. |
sub(V, e): | the guard of this primitive is the initial value of “e in V”; the corresponding action is to remove this element from V. |
It is now requested to make a program establishing whether the set B0 is contained in the set A0. We introduce two variable sets, A and B and maintain the invariance of the following relation
(A0 contains B0) = (A contains B) |
A:= A0; B:= B0; | |
do se1(A, e);do sub(B, e) od od | |
answer:= empty(B) |
We are not finished with this example yet: the only possible change of B is that it loses an element: we are not interested in the final value of B. we only want to know of the final value of B is empty or not: as a result, if B becomes empty halfway, then we can stop the repetition, we can “extrapolate” the final value of B. And this suggests the following program
A:= A0; B:= B0; | |
do non empty(B) and sel(A, e); do sub(B, e) od od; | |
answer:= empty(B) |
< guarding head > ::= < boolean expression > and < guarded primitive > ,
This might seem to be at first sight a little piece of ad-hoccery, it is not. In order that something be evoked, in general we have two conditions: it most be possible to do it —and the guarded primitive presents that as a condition from below— but you must also be interested in doing it, and that is clearly somthing that must be specified by the upper level programmer! Once you have seen this separation of reasons why to do something, classical programs, in which these different conditions are often lumped together in a single boolean expression, can strike you as unnecessarily obscure.
I shall give a final program, doing a merge sort, merging three sets A, B, and C into a fourth one; initially D is empty, finally A, B and C are empty} I assume a guarded command “selmin”, that I have written in the form of a parallel assignment when used. Its guard is non-emptiness of the sets mentioned at the right hand side; its action is to select from each of the sets the minimum value and to assign this vector of values to the vector of variables at the left hand side. The sets are not changed. The operator “move(e, V, W)” transfers -if possible an element with value e from V to W; if there is no such element, it is the empty statement.
do (a, b, c):= selmin(A, B, C); d:= min(a, b, c); | |||||
if a = d: move(a, A, D) ▯ | |||||
b = d: move(b, B, D) ▯ | |||||
c = d: move(c, C, D) fi | |||||
od {comment: now at least one of the three input streams is empty}; | |||||
if empty(A): do (b, c):= selmin(B, C); d:= min(b, C); | |||||
if b = d: move(b, B, D) ▯ c: = d: move(c, c, D) fi | |||||
od ▯ | |||||
empty(B): do (a, c):= selmin(A, C); d:= min(a, c); | |||||
if a = d: move(a, A, D) ▯ c = d: move(c, C, D) fi | |||||
od ▯ | |||||
empty(C): do (a, b):= selmin(A, B); d:= min(a, b); | |||||
if a = d: move(a, A, D) ▯ b = d: move(b, B, D) fi | |||||
od | |||||
fi {now at least two of the three input streams are empty}; | |||||
if empty(A) and empty(B): do (c):= selmin(C); move(c, C, D) od ▯ | |||||
empty(B) and empty(C): do (a):= selmin(A); move(a, A, D) od ▯ | |||||
empty(C) and empty(A): do (b):= selmin(B): move(b, B, D) od | |||||
fi {now all the three input streams are empty} |
It is in this example quite clearly that the guarded primitive controls repetition, while —some sort of— negation of the guard is used for selection: they express our interest.
Concluding remarks.
I regard what I have sketched as an aspect of a programming language, but it could be “an abstract programming language”. i.e. a programming language for which we don’t have a processor that, without further human intervention, will process our programs with acceptable efficiency. I do not care about that too much, it is a very one-sided view to regard programs as “things to execute automatically”: they are also things to design, to enjoy, to embellish, to talk about and to use as a means of communication, either with yourself or with someone else. About algorithms. It is primarily with the latter aspects in mind; that the above has been written. Very tentatively written, even.
26th November 1973
BURROUGHS | prof.dr.Edsger W.Dijkstra | |
Plataanstraat 5 | Research Fellow | |
NUENEN 4565 | ||
The Netherlands |
Transcribed by Martin P.M. van der Burgt
Last revision 2014-11-15
.