287,797 Hits in 6.2 sec

Call by need computations to root-stable form

Aart Middeldorp
1997 Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '97  
We generalize this theorem to computations to root-stable form and we argue that the resulting notion of root-neededness is more fundamental than (other variants of) neededness when it comes to infinitary  ...  contraction of needed redexes results in the normal form, if the term under consideration has one.  ...  The work reported in this paper is partially supported by the Advanced Information Technology Program (AITP) of the Information Technology Promotion Agency (IPA).  ... 
doi:10.1145/263699.263711 dblp:conf/popl/Middeldorp97 fatcat:wb4hwar3qngerhc444co6zgvou

Decidable call by need computations in term rewriting (extended abstract) [chapter]

Irène Durand, Aart Middeldorp
1997 Lecture Notes in Computer Science  
In this paper we study decidable approximations to call by need computations to normal and root-stable forms in term rewriting.  ...  Surprisingly, by avoiding complicated concepts like index and sequentiality we are able to cover much larger classes of term rewriting systems.  ...  (R ) is recognizable by Lemma 3.9 and thus the recognizability of RS (R ) is consequence of Lemmata 2.6(3) and 2.3(2). For 2 fsh; gg we use Theorem 6.7 and Lemma 2.3(2) to obtain the same result.  ... 
doi:10.1007/3-540-63104-6_2 fatcat:pk3j6rmu4jghlkuwuja6pcjzji

Context-Sensitive Rewriting Strategies

Salvador Lucas
2002 Information and Computation  
We study how to de ne them in order to obtain e cient computations and to ensure that context-sensitive computations terminate whenever possible.  ...  Context-sensitive rewriting is a simple restriction of rewriting which is formalized by imposing xed restrictions on replacements.  ...  Su cient conditions to ensure that such a restriction of rewriting is still able to compute root-stable terms (also called head-normal forms) and values have been established in Luc98] .  ... 
doi:10.1006/inco.2002.3176 fatcat:imw5fhbgsbdp7ber2nq3bjugw4

Specialization of Functional Logic Programs Based on Needed Narrowing [article]

Maria Alpuente, Michael Hanus, Salvador Lucas, German Vidal
2004 arXiv   pre-print
Recent proposals for the partial evaluation of declarative multi-paradigm programs use (some form of) needed narrowing to perform computations at partial evaluation time.  ...  In particular, the structure of the original program is preserved by partial evaluation and, thus, the same evaluation strategy can be applied for the execution of specialized programs.  ...  root-stable form cannot be dropped.  ... 
arXiv:cs/0403011v1 fatcat:xrdmm5652fdlzfstopsv4s2f5y

Specialization of functional logic programs based on needed narrowing

2005 Theory and Practice of Logic Programming  
Given a substitution θ and a set of variables V ⊆ X , we denote by θ |V the substitution obtained from θ by restricting its domain to V .  ...  The identity substitution is denoted by id. Substitutions are extended to morphisms on terms by σ(f (t n )) = f (σ(t n )) for every term f (t n ).  ...  Acknowledgements We wish to thank Elvira Albert and Santiago Escobar for many helpful remarks and for their valuable contribution to the implementation and testing work.  ... 
doi:10.1017/s1471068404002303 fatcat:5e4v4ertwvhdxpoqhpxjahunie

Refining weakly outermost-needed rewriting and narrowing

Santiago Escobar
2003 Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming - PPDP '03  
rewriting (narrowing) in the avoidance of failing computations.  ...  With regard to inductively sequential constructor systems, we introduce a larger class of systems called inductively sequential preserving where natural rewriting and narrowing preserve optimality for  ...  I am also grateful to the anonymous referees for their detailed comments to improve the final version of this paper.  ... 
doi:10.1145/888251.888263 dblp:conf/ppdp/Escobar03 fatcat:bhh4kdtdvbaptbylardbz5xgni

Efficient Computation Method for Strong Stability Area of Neutral Equations

Daniel Bachrathy
2016 IFAC-PapersOnLine  
It is shown, that the computational time of the proposed method to obtain the strong stable area is comparable to the CPU time needed for the computation of the stability chart for a given fixed delay  ...  Finally the so-called instability gradients are used to classify the distinct domains of the chart.  ...  ACKNOWLEDGEMENTS This paper was supported by the Hungarian Scientific Research Fund -OTKA PD-112983 and the Janos Bolyai Research Scholarship of the Hungarian Academy of Sciences.  ... 
doi:10.1016/j.ifacol.2016.07.533 fatcat:o6ld5uyqnbevrbg3riqd77mqty

Page 5457 of Mathematical Reviews Vol. , Issue 88j [page]

1988 Mathematical Reviews  
Of par- 68Q_ Theory of computing 88j:68104 ticular interest are stable pattern trees, and for a term M, S(M) denotes the set of all stable pattern trees with term(root(t)) = M.  ...  A sufficient condition is shown first for the call-by-need in a linear term-rewriting system containing ambiguity to be a normalizing reduction strategy.  ... 

Computing the fine structure of real reductive symmetric spaces

Jennifer R. Daniel, Aloysius G. Helminck
2007 Journal of symbolic computation  
The structure of reductive symmetric spaces is very similar to that of the underlying Lie group and a computer algebra package for computations related to symmetric spaces would be an important tool for  ...  Then we proceed to give a number of algorithms for computing the fine structure of the latter.  ...  Acknowledgement The second author is partially supported by N.S.F. Grant DMS-9977392.  ... 
doi:10.1016/j.jsc.2006.08.003 fatcat:uoba4bngsvfrtbcx5mjindtx2e

Page 111 of Journal of the Association for Computing Machinery Vol. 5, Issue 1 [page]

1958 Journal of the Association for Computing Machinery  
Moreover, not only the existence of such a root w ‘is proved, but the proof gives a method to compute w and a characteristic vector belonging to w as exactly as needed without determining the characteristic  ...  Denote n X n real matrices by A, B, C, ---; denote transpose of A by A’; denote positive-definite symmetric matrices by B = B’ > 0. Call A stable if all eigenvalues \; satisfy Re A; < 0.  ... 

On systems of algebraic equations with parametric exponents

Kazuhiro Yokoyama
2004 Proceedings of the 2004 international symposium on Symbolic and algebraic computation - ISSAC '04  
The problems dealt with here are originally raised by Tadashi Takahashi in order to give a computational proof of non-degeneracy conditions of singularities of algebraic surfaces [9] .  ...  From studies on such cases, we derive a simple formulation and basic notions which will be helpful to deal with more complicated cases.  ...  In this case, G(A) is called of bounded form. This is also a special case of completely stable form. Definition 4 . 4 We call the above elimination ideal J the finite subideal of I.  ... 
doi:10.1145/1005285.1005330 dblp:conf/issac/Yokoyama04 fatcat:26k35mld7ndcpp7gydvvdxxogi

Study of D-decompositions by the methods of computational real-valued algebraic geometry

O. O. Vasil'ev
2012 Automation and remote control  
Theoretic results are supported by various numerical simulations that show higher precision of presented methods with respect to traditional ones.  ...  They are based on topology of real algebraic varieties and computational real algebraic geometry.  ...  Polynomial is called continuous-time stable(Hurwitz) if all of its roots have negative real part. Polynomial is called discrete-time stable(Schur) if all of it's roots is have modulus lesser than 1.  ... 
doi:10.1134/s0005117912120041 fatcat:xnksoo6n75f23ek6gvo2622f5u

Computing Theta-Stable Parabolic Subalgebras Using LiE [chapter]

Alfred G. Noël
2004 Lecture Notes in Computer Science  
This paper describes an algorithm for computing representatives of conjugacy classes of θ-stable parabolic subalgebras of a semisimple complex Lie algebra g C relative to any of its non-compact real forms  ...  The author wishes to thank the referees for their helpful and insightful comments.  ...  In order to finish the proof we need to show that the computation Γ is correct.  ... 
doi:10.1007/978-3-540-25944-2_43 fatcat:3jq7vkt5x5calbhhf2y66i637i

Proof logging for computer algebra based SMT solving

Oliver Marx, Markus Wedler, Dominik Stoffel, Wolfgang Kunz, Alexander Dreyer
2013 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)  
We show how to translate the SAT proofs into algebraic forms (polynomials) and how to check the combined Boolean and word-level proofs using a separate computer algebra engine.  ...  This paper proposes an approach for logging the proofs of the SMT solver STABLE which is a prover combining SAT and computer algebra engines.  ...  This is called a variety subset problem. This variety subset problem can be solved by normal form computation.  ... 
doi:10.1109/iccad.2013.6691188 dblp:conf/iccad/MarxWSKD13 fatcat:r5earzvznrhldinm74sneeveby

Propagation: a new operation in a framework for abstract interpretation of logic programs [chapter]

Maurice Bruynooghe, Gerda Janssens
1992 Lecture Notes in Computer Science  
O(S) until a stable abstract state is reached.  ...  That means, given a concrete state ,.q described by an abstract state AS and a concrete operation 0 producing 0(5), the corresponding abstract operation AO produces AO(AS) which must describe O(S).  ...  We are grateful to Danny De Schreye for reading the draft and discussing some technicalities and to Wire Simoens for the practical experiments.  ... 
doi:10.1007/3-540-56282-6_20 fatcat:vq7sgnazkjgejpioqxioxdis4q
« Previous Showing results 1 — 15 out of 287,797 results