[图书][B] The optimal implementation of functional programming languages

A Asperti, S Guerrini - 1998 - books.google.com
All traditional implementation techniques for functional languages fail to avoid useless
repetition of work. They are not" optimal" in their implementation of sharing, often causing a …

Rewriting for monoidal closed categories

M Alvarez-Picallo, D Ghica, D Sprunger… - … Conference on Formal …, 2022 - drops.dagstuhl.de
This paper develops a formal string diagram language for monoidal closed categories.
Previous work has shown that string diagrams for freely generated symmetric monoidal …

Functorial string diagrams for reverse-mode automatic differentiation

M Alvarez-Picallo, DR Ghica, D Sprunger… - arXiv preprint arXiv …, 2021 - arxiv.org
We enhance the calculus of string diagrams for monoidal categories with hierarchical
features in order to capture closed monoidal (and cartesian closed) structure. Using this new …

Resource operators for λ-calculus

D Kesner, S Lengrand - Information and Computation, 2007 - Elsevier
We present a simple term calculus with an explicit control of erasure and duplication of
substitutions, enjoying a sound and complete correspondence with the intuitionistic fragment …

[PDF][PDF] A study of normalisation through subatomic logic

AA Tubella - 2017 - academia.edu
We introduce subatomic proof theory, a new methodology where, by looking inside atoms,
we are able to represent a wide variety of proof systems in such a way that every rule is an …

Light logics and optimal reduction: Completeness and complexity

P Baillot, P Coppola, U Dal Lago - Information and Computation, 2011 - Elsevier
Typing of lambda-terms in elementary and light affine logic (EAL and LAL, respectively) has
been studied for two different reasons: on the one hand the evaluation of typed terms using …

Development of structure of a subsystem of information security of the automated system

Y Bakhracheva - MATEC Web of Conferences, 2017 - matec-conferences.org
Approach to synthesis of modular structure of a subsystem of information security of the
automated process control system is offered. The task has been solved on the basis of a set …

Tree transducers and tree compressions

S Maneth, G Busatto - … Conference on Foundations of Software Science …, 2004 - Springer
A tree can be compressed into a DAG by sharing common subtrees. The resulting DAG is at
most exponentially smaller than the original tree. Consider an attribute grammar that …

Non-deterministic functions as non-deterministic processes

JWN Paulus, D Nantes-Sobrinho… - … Conference on Formal …, 2021 - research.rug.nl
We study encodings of the λ-calculus into the π-calculus in the unexplored case of calculi
with non-determinism and failures. On the sequential side, we consider λ^↯ _⊕, a new non …

Coherence for sharing proof-nets

S Guerrini, S Martini, A Masini - Theoretical computer science, 2003 - Elsevier
Sharing graphs are an implementation of linear logic proof-nets in which a redex is never
duplicated. In their usual formulation, sharing graphs present a problem of coherence: if the …