From: "J-P. Rosen" <rosen@adalog.fr>
Subject: Re: Presentations on-line - Ada&SPARK for Education&Research
Date: Fri, 05 Mar 2010 10:14:04 +0100
Date: 2010-03-05T10:14:04+01:00 [thread overview]
Message-ID: <hmqi16$5nh$1@news.eternal-september.org> (raw)
In-Reply-To: <4b90babf$0$7625$9b4e6d93@newsspool1.arcor-online.net>
Georg Bauhaus a écrit :
> True? With some effort, it seems possible to break an Ada
> monitor implemented as a protected object.
>
With enough pointers, you can make anything unreliable ;-), but the
important point in your remark is "with some effort". If you make a
special effort to publicly export something that is meant to be
protected, it ceases to be protected. But this can happen only if the
author of the PO provides facility for doing that; it cannot happen due
to misuse on the client side.
--
---------------------------------------------------------
J-P. Rosen (rosen@adalog.fr)
Visit Adalog's web site at http://www.adalog.fr
next prev parent reply other threads:[~2010-03-05 9:14 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-03-02 21:22 Presentations on-line - Ada&SPARK for Education&Research Dirk Craeynest
2010-03-05 8:03 ` Georg Bauhaus
2010-03-05 9:14 ` J-P. Rosen [this message]
2010-03-05 10:46 ` Georg Bauhaus
2010-03-06 8:43 ` Jerry van Dijk
2010-03-08 5:54 ` AdaMagica
2010-03-05 9:19 ` Dmitry A. Kazakov
2010-03-05 12:11 ` Peter Hermann
2010-03-06 12:40 ` Marco
replies disabled
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox