275 Hits in 5.0 sec

Coercive Subtyping via Mappings of Reduction Behaviour

Paul Callaghan
2008 Electronical Notes in Theoretical Computer Science  
This paper reports preliminary work on a novel approach to Coercive Subtyping that is based on relationships between reduction behaviour of source and target types in coerced terms.  ...  These points restrict the practicality of coercive subtyping.  ...  subtyping The wider conception of coercive subtyping in this paper derives from [13] .  ... 
doi:10.1016/j.entcs.2007.09.017 fatcat:u5jew5ytzfffzm5pcpvmbfsvoq

Coercive subtyping in type theory [chapter]

Zhaohui Luo
1997 Lecture Notes in Computer Science  
The use of coercive subtyping in formal development and in reasoning about subsets of objects is discussed in the context of computerassisted formal reasoning. 1 type theories with subtyping.  ...  We propose and study coercive subtyping, a formal extension with subtyping of dependent type theories such as Martin-L of's type theory NPS90] and the type theory UTT Luo94].  ...  Communication and discussion with Anthony Bailey on his implementation of coercions in Lego has been very useful.  ... 
doi:10.1007/3-540-63172-0_45 fatcat:f2ygwdrulrbjnfzxvahqz2yg2a

Coercive subtyping

Z Luo
1999 Journal of Logic and Computation  
The use of coercive subtyping in formal development and in reasoning about subsets of objects is discussed in the context of computer-assisted formal reasoning.  ...  We propose and study coercive subtyping, a formal extension with subtyping of dependent type theories such as Martin-L of's type theory 38] and the type theory UTT 30].  ...  This work is partly supported by the UK EPSRC grant on `Subtyping, Inheritance and Reuse' (GR/K79130).  ... 
doi:10.1093/logcom/9.1.105 fatcat:dv2xyk5nzbf3dk5od6wuwsdovi

Subtyping dependent types

David Aspinall, Adriana Compagnoni
2001 Theoretical Computer Science  
Here we investigate a subtyping extension of the system P, which is an abstract version of the type system of the Edinburgh Logical Framework LF.  ...  By using an equivalent formulation, we establish some important properties of the new system P6, including subject reduction.  ...  In other related work, Luo has developed a system of coercive subtyping intended for dependent-type theories of proof assistants, where a subtyping relation is induced by coercion functions [19] .  ... 
doi:10.1016/s0304-3975(00)00175-4 fatcat:tktwmwuytrddjiupad7ogwfoou

Extending Hindley-Milner Type Inference with Coercive Structural Subtyping [chapter]

Dmitriy Traytel, Stefan Berghofer, Tobias Nipkow
2011 Lecture Notes in Computer Science  
We investigate how to add coercive structural subtyping to a type system for simply-typed lambda calculus with Hindley-Milner polymorphism.  ...  The algorithm is sound and, if the subtype relation on base types is a disjoint union of lattices, also complete. Also, a sound but incomplete extension of the algorithm to type classes is given.  ...  In contrast, the theorem prover Coq supports coercive subtyping, albeit in an incomplete manner.  ... 
doi:10.1007/978-3-642-25318-8_10 fatcat:q6yn43kgivh6vkgrbzmowxsjcu

Type Isomorphisms and Proof Reuse in Dependent Type Theory [chapter]

Gilles Barthe, Olivier Pons
2001 Lecture Notes in Computer Science  
We propose a theoretical foundation for proof reuse, based on the novel idea of a computational interpretation of type isomorphisms.  ...  Thus current implementations of coercive subtyping, and in particular [4, 13] , do not check coherence to the detriment of conceptual clarity; -computational interpretation of coercions: in most existing  ...  Instead, the meaning of coercive subtyping is given in a logical framework with equality judgements, as in [28] , or by a translation of the extended language with coercions into the original language  ... 
doi:10.1007/3-540-45315-6_4 fatcat:3uepwxg6ujcffondm5pefvw4xq

PhD Abstracts

2014 Journal of functional programming  
The Journal of Functional Programming would like to change that!  ...  As a service to the community, JFP is launching a new feature, in the form of a regular publication of abstracts from PhD dissertations that were completed during the previous year.  ...  Theory and implementation of coercive subtyping We point out the problem in the old formulation of coercive subtyping introduced by Luo.  ... 
doi:10.1017/s0956796814000215 fatcat:rs2j5wgm5ndf7ek2zls5pmg2w4

HasCasl: Integrated higher-order specification and program development

Lutz Schröder, Till Mossakowski
2009 Theoretical Computer Science  
Following seminal work by Moggi [46], side effects are encapsulated in functional programming via so-called monads; in particular, this is one of the central concepts of Haskell [80] .  ...  Sections 3-5 deal with the syntax and semantics of type class oriented shallow polymorphism, subtyping, and inductive datatypes, respectively.  ...  Catesbeiana contributed his opinion on matters of consistency. The authors' research was supported by the DFG project HasCASL (KR 1191/7-1/2) and the BMBF-project FormalSafe (FKZ 01IW07002).  ... 
doi:10.1016/j.tcs.2008.11.020 fatcat:fvluuyjf7ra2dk2izvb2br4uou

Adjectival and Adverbial Modification: The View from Modern Type Theories

Stergios Chatzikyriakidis, Zhaohui Luo
2017 Journal of Logic, Language and Information  
There, we show that the rich type structure available in MTTs, along with a suitable subtyping framework, offers an adequate  ...  In this paper we present a study of adjectival/adverbial modification using modern type theories (MTTs), i.e. type theories within the tradition of Martin-Löf.  ...  This has to do with a defect in Coq's coercive subtyping mechanism.  ... 
doi:10.1007/s10849-017-9246-2 fatcat:ohsjlc2uprhkle4gsswjx37f4i

Well-Behaved Model Transformations with Model Subtyping [article]

Artur Boronat
2017 arXiv   pre-print
We introduce the big-step operational structural semantics of this language and its type system, which includes a notion of polymorphic model subtyping, showing that well-typed model transformations are  ...  In model-driven engineering, models abstract the relevant features of software artefacts and model transformations act on them automating complex tasks of the development process.  ...  Acknowledgements The author thanks the anonymous referees of SLE'15 and SLE'16 for their helpful comments on a previous draft of this document.  ... 
arXiv:1703.08113v1 fatcat:b3q55g2bczhi5gpjuzg2y7awj4

Toward a Clinically Meaningful Taxonomy of Violent Offenders

Kyra Low, Andrew Day
2016 Journal of Interpersonal Violence  
The finding of three subtypes, rather than the four hypothesised, that do not clearly map onto the previously identified overcontrolled/undercontrolled typology may reflect the nature of the sample as  ...  Subtypes of aggression. Several subtypes of aggression have been proposed across a range of disciplines.  ...  The following tables provide demographic and offence characteristics for the Treatment Completer sample used in the second study, grouped by the intensity of the program completed (i.e., MIVIP or HIVIP  ... 
doi:10.1177/0886260515586365 pmid:26002874 fatcat:2vjxysnnk5hl3oqv6ozggynrdm

Improvement of facial affect recognition in children and adolescents with attention-deficit/hyperactivity disorder under methylphenidate

Sophie Beyer von Morgenstern, Ingrid Becker, Judith Sinzig
2013 Acta Neuropsychiatrica  
Reasons for missing significance may be the small sample size or the fact that there exists some overlapping in cerebral connections and metabolic pathways of the site of action of methylphenidate and  ...  The present study is based on that association and addresses the question whether methylphenidate and the resulting amelioration of the disturbed dopamine metabolism lead to an improvement of the facial  ...  The parenting characteristics in children with attention-deficit hyperactivity disorder (ADHD) and disruptive behaviours are commonly described as reinforcement of mutually coercive behaviours, inconsistent  ... 
doi:10.1017/neu.2013.55 pmid:25142287 fatcat:x3ex7cva45hntdliewt3uxpmle

Modular type classes

Derek Dreyer, Robert Harper, Manuel M. T. Chakravarty, Gabriele Keller
2007 Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '07  
of use of modules.  ...  Modules emphasize explicit configuration of program components and the use of data abstraction. Type classes emphasize implicit program construction and ad hoc polymorphism.  ...  not appear in the argument of a functor signature.  ... 
doi:10.1145/1190216.1190229 dblp:conf/popl/DreyerHCK07 fatcat:vlb37pwrq5e5pi3x3z4cdj22iy

Education for Environmental Citizenship and Responsible Environmental Behaviour [chapter]

Daphne Goldman, Ralph Hansmann, Jan Činčera, Vesela Radović, Audronė Telešienė, Aistė Balžekienė, Jan Vávra
2020 Environmental Discourses in Science Education  
As a basis for the behavioural models, this chapter opens with a brief mapping of types of pro-environmental behaviour in the context of Environmental Citizenship.  ...  Stern (2000) proposed the subdivision of private-sphere behaviours into four subtypes based upon the type of decision involved: the purchase of major household goods or services, the use and maintenance  ... 
doi:10.1007/978-3-030-20249-1_8 fatcat:w6ial4rrtzea3fix5h7k3dje4y

Risk and resource factors of antisocial behaviour in children and adolescents: results of the longitudinal BELLA study

Christiane Otto, Anne Kaman, Michael Erhart, Claus Barkmann, Fionna Klasen, Robert Schlack, Ulrike Ravens-Sieberer
2021 Child and Adolescent Psychiatry and Mental Health  
The current study explores risk and resource factors of antisocial behaviour in children and adolescents based on population-based longitudinal data.  ...  Conclusions Our study provides important exploratory results on psychosocial risk, resource and protective factors in the context of antisocial behaviour in children and adolescents, which need confirmation  ...  Introduction Antisocial behaviour is a key symptom and subtype of conduct disorder (CD) as defined by DSM-5 and ICD-10.  ... 
doi:10.1186/s13034-021-00412-3 pmid:34686200 fatcat:3f6uulqfnffixhhfwsmxuqq6ju
« Previous Showing results 1 — 15 out of 275 results