The principle of proof as program is based on the fact that a constructive proof of 'there exists xF(x)' can be viewed as a program calculating the value for x such that F(x) holds. In this paper we propose a ...
详细信息
ISBN:
(纸本)0262691477
The principle of proof as program is based on the fact that a constructive proof of 'there exists xF(x)' can be viewed as a program calculating the value for x such that F(x) holds. In this paper we propose a program transformation method under the principle of proof as program. The method is intended to decrease the number of mathematical inductions in a constructive proof. This amounts to the elimination of the recursive calls of ordinary programming languages. Compared to traditional program transformation methods, such as the fold/unfold method, our method has the following notable features. First, by analyzing the proof it is easily determined whether our method is effectively applicable or not. Secondly, the transformation proceeds very efficiently. The transformed proof is immediately obtained by our method whereas by the fold/unfold method the transformation proceeds step by step.
We develop a uniform type theory that integrates intensionality, extensionality, and proof irrelevance as judgmental concepts. Any object may be treated intensionally (subject only to alpha -conversion), extensionally...
详细信息
ISBN:
(纸本)076951281X
We develop a uniform type theory that integrates intensionality, extensionality, and proof irrelevance as judgmental concepts. Any object may be treated intensionally (subject only to alpha -conversion), extensionally (subject also to beta eta -conversion), or as irrelevant (equal to any other object at the same type), depending on where it occurs. Modal restrictions developed in prior work for simple types are generalized and employed to guarantee consistency between these views of objects. Potential applications are in logical frameworks, functional programming, and the foundations of first-order modal logics. Our type theory contrasts with previous approaches that a priori distinguish propositions (whose proofs are all identified-only their existence is important) from specifications (whose implementations are subject to some definitional equalities).
Constrained coding is a fundamental field in coding theory that tackles efficient communication through constrained channels. While fixed constraints (e.g., a fixed set of substrings may not appear in transmitted mess...
详细信息
ISBN:
(纸本)9798350382853;9798350382846
Constrained coding is a fundamental field in coding theory that tackles efficient communication through constrained channels. While fixed constraints (e.g., a fixed set of substrings may not appear in transmitted messages) have a general optimal solution, there is increasing demand for supporting parametric constraints that are dependent on the message length and portray some property that the substrings must satisfy (e.g., no log(n) consecutive zeros). Several works have tackled such parametric constraints through iterative algorithms following the sequence-replacement approach, yet this approach requires complex constraint-specific properties to guarantee convergence through monotonic progression. In this paper, we propose a universal framework for tackling any parametric constraint problem with far fewer requirements, through a simple iterative algorithm. By reducing an execution of this iterative algorithm to an acyclic graph traversal, we prove a surprising result that guarantees convergence with efficient average time complexity even without requiring any monotonic progression. We demonstrate how to apply this algorithm to the run-length-limited, minimal Hamming weight, local almost-balanced Hamming weight constraints, as well as repeat-free and secondary-structure constraints. Overall, this framework enables state-of-the-art results with minimal effort.
There is increasing evidence that cash transfer (CT) programs decrease intimate partner violence (IPV). However, little is known about how CTs achieve this impact. We conducted a mixed-method review of studies in low-...
详细信息
There is increasing evidence that cash transfer (CT) programs decrease intimate partner violence (IPV). However, little is known about how CTs achieve this impact. We conducted a mixed-method review of studies in low-and middle-income countries (LMICs). Fourteen quantitative and eight qualitative studies met our inclusion criteria, of which eleven and five, respectively, demonstrated evidence that CTs decrease IPV. We found little support for increases in IPV, with only two studies showing overall mixed or adverse impacts. Drawing on these studies, as well as related bodies of evidence, we developed a program theory proposing three pathways through which CT could impact IPV: (a) economic security and emotional well-being, (b) intra-household conflict, and (c) women's empowerment. The economic security and well-being pathway hypothesizes decreases in IPV, while the other two pathways have ambiguous effects depending on program design features and behavioral responses to program components. Future studies should improve IPV measurement, empirical analysis of program mechanisms, and fill regional gaps. Program framing and complementary activities, including those with the ability to shift intra-household power relations are likely to be important design features for understanding how to maximize and leverage the impact of CTs for reducing IPV, and mitigating potential adverse impacts. Intimate partner violence. Domestic violence. Cash transfers. Women's empowerment.
Program development can be made amenable to formal methods by using a logical framework. A logic specification, whose operational semantics is based on proof theory, provides an abstract and “implementation independ...
详细信息
ISBN:
(纸本)0897914724
Program development can be made amenable to formal methods by using a logical framework. A logic specification, whose operational semantics is based on proof theory, provides an abstract and “implementation independent” definition of the problem, the data domains and the associated *** many of the current efforts in this area that use resolution, our approach is based on natural deduction, more specifically, sequent calculus. Following the methodology proposed by Manna and Waldinger, we propose the synthesis tableau technique by which we construct a proof for the well formed formula representing the specification. The desired program is obtained as a side effect of the proof process.
Consistent Global States (CGS) detection is a costly process. If CGS are constructed using real-time timestamps, then their hierarchical detection is possible. In a hierarchical detection scheme the load of a single c...
详细信息
ISBN:
(纸本)0769520804
Consistent Global States (CGS) detection is a costly process. If CGS are constructed using real-time timestamps, then their hierarchical detection is possible. In a hierarchical detection scheme the load of a single central monitor is distributed among a number of monitors. We show, that hierarchical CGS detection has advantages over centralized detection: it allows for online monitoring of larger systems and for a more effective application control based on observed CGS. Hierarchical CGS detection can be coupled with a hierarchical application control scheme for better results. Further improvement is obtained if a timeout mechanism allows unterminated local states to be used for CGS construction. Relevant algorithms and simulation results are presented and discussed.
This paper describes the initial results of a new form of evolutionary system specifically designed for time series modeling. The system combines a grammatically-based Genetic programming system with various optimisat...
详细信息
ISBN:
(纸本)0780366573
This paper describes the initial results of a new form of evolutionary system specifically designed for time series modeling. The system combines a grammatically-based Genetic programming system with various optimisation techniques. The system uses the evolutionary system to construct the structure of equations and optimisation techniques to essentially fill in the details. Three forms of optimisation are described: optimisation of constants in an equation;the optimisation of both the constants and variables in an equation;and the use of a hill-climbing mutation to further tune the evolved and optimised equations. Preliminary results indicate that this combination of techniques produces significant improvements in convergence based on the training data, and produces equivalent generalisation on unseen data, for a given number of population member evaluations.
A general definition of constraint systems utilizing Gentzen-style sequents is given. Constraint systems can be regarded as enriching the propositional Scott information systems with minimal first-order structure: the...
详细信息
ISBN:
(纸本)0818627352
A general definition of constraint systems utilizing Gentzen-style sequents is given. Constraint systems can be regarded as enriching the propositional Scott information systems with minimal first-order structure: the notion of variables, existential quantification, and substitution. Approximate maps that are generic in all but finitely many variables are taken as morphisms. It is shown that the resulting structure forms a category (called ConstSys). Furthermore, the structure of Scott information systems lifts smoothly to the first-order setting. In particular, it is shown that the category is Cartesian-closed, and other usual functors over Scott information systems (lifting, sums, Smyth power-domain) are also definable and recursive domain equations involving these functors can be solved.
We show how to implement a calculus with higher-order subtyping and subkinding by replacing uses of implicit subsumption with explicit coercions. To ensure this can be done, a polymorphic function is adjusted to take,...
详细信息
ISBN:
(纸本)9780897919180
We show how to implement a calculus with higher-order subtyping and subkinding by replacing uses of implicit subsumption with explicit coercions. To ensure this can be done, a polymorphic function is adjusted to take, as an additional argument, a proof that its type constructor argument has the desired kind. Such a proof is extracted from the derivation of a kinding judgement and may in turn require proof coercions, which are extracted from subkinding judgements. This technique is formalized as a type-directed translation from a calculus of higher-order subtyping to a subtyping-free calculus. This translation generalizes an existing result for second-order subtyping calculi (such as F-less than or equal to). We also discuss two interpretations of subtyping, one that views it as type inclusion and another that views it as the existence of a well-behaved coercion, and we show, by a type-theoretic construction, that our translation is the minimum consequence of shifting from the inclusion interpretation to the coercion-existence interpretation. This construction shows that the translation is the natural one, and it also provides a framework for extending the translation to richer type systems. Finally, we show how the two interpretations can be reconciled in a common semantics. It is then easy to show the coherence of the translation relative to that semantics.
The iteration space dependence graph (ISDG) of a loop captures the synchronization requirements of the execution of the loop on parallel machines. Some of the edges in an ISDG may correspond to redundant synchronizati...
详细信息
ISBN:
(纸本)0780318625
The iteration space dependence graph (ISDG) of a loop captures the synchronization requirements of the execution of the loop on parallel machines. Some of the edges in an ISDG may correspond to redundant synchronization statements. In this paper we investigate the removal of such edges in the ISDG of a triply nested loop with constant dependences. We identify a class of triply-nested loops with the property of uniform redundancy. In the case of a general triply-nested loop, we characterize points in the iteration space at which a dependence is redundant.
暂无评论