3,445 research outputs found

    Comparing the expressive power of the Synchronous and the Asynchronous pi-calculus

    Full text link
    The Asynchronous pi-calculus, as recently proposed by Boudol and, independently, by Honda and Tokoro, is a subset of the pi-calculus which contains no explicit operators for choice and output-prefixing. The communication mechanism of this calculus, however, is powerful enough to simulate output-prefixing, as shown by Boudol, and input-guarded choice, as shown recently by Nestmann and Pierce. A natural question arises, then, whether or not it is possible to embed in it the full pi-calculus. We show that this is not possible, i.e. there does not exist any uniform, parallel-preserving, translation from the pi-calculus into the asynchronous pi-calculus, up to any ``reasonable'' notion of equivalence. This result is based on the incapablity of the asynchronous pi-calculus of breaking certain symmetries possibly present in the initial communication graph. By similar arguments, we prove a separation result between the pi-calculus and CCS.Comment: 10 pages. Proc. of the POPL'97 symposiu

    Multi-level Contextual Type Theory

    Full text link
    Contextual type theory distinguishes between bound variables and meta-variables to write potentially incomplete terms in the presence of binders. It has found good use as a framework for concise explanations of higher-order unification, characterize holes in proofs, and in developing a foundation for programming with higher-order abstract syntax, as embodied by the programming and reasoning environment Beluga. However, to reason about these applications, we need to introduce meta^2-variables to characterize the dependency on meta-variables and bound variables. In other words, we must go beyond a two-level system granting only bound variables and meta-variables. In this paper we generalize contextual type theory to n levels for arbitrary n, so as to obtain a formal system offering bound variables, meta-variables and so on all the way to meta^n-variables. We obtain a uniform account by collapsing all these different kinds of variables into a single notion of variabe indexed by some level k. We give a decidable bi-directional type system which characterizes beta-eta-normal forms together with a generalized substitution operation.Comment: In Proceedings LFMTP 2011, arXiv:1110.668

    Towards a GPU-based implementation of interaction nets

    Full text link
    We present ingpu, a GPU-based evaluator for interaction nets that heavily utilizes their potential for parallel evaluation. We discuss advantages and challenges of the ongoing implementation of ingpu and compare its performance to existing interaction nets evaluators.Comment: In Proceedings DCM 2012, arXiv:1403.757

    The debris flow occurred at ru secco creek, venetian dolomites, on 4 august 2015: Analysis of the phenomenon, its characteristics and reproduction by models

    Get PDF
    On 4 August 2015, a very high intensity storm, 31.5 mm in 20 min (94.5 mm/h), hit the massif of Mount Antelao on the Venetian Dolomites triggering three stony debris \ufb02ows characterized by high magnitude. Two of them occurred in the historical sites of Rovina di Cancia and Rudan Creek and were stopped by the retaining works upstream the inhabited areas, while the third routed along the Ru Secco Creek and progressively reached the resort area and the village of San Vito di Cadore, causing fatalities and damages. The main triggering factor of the Ru Secco debris \ufb02ow was a large rock collapse on the northern cliffs of Mount Antelao occurred the previous autumn. The fallen debris material deposited on the Vallon d\u2019Antrimoia inclined plateau at the base of the collapsed cliffs and, below it, on the Ru Salvela Creek, covering it from the head to the con\ufb02uence with the Ru Secco Creek. The abundant runoff, caused by the high intensity rainfall on 4 August 2015, entrained about 52,500 m3 of the debris material laying on the Vallon d\u2019Antrimoia forming a debris \ufb02ow surge that hit and eroded the debris deposit covering the downstream Ru Salvela Creek, increasing its volume, about 110,000 m3 of mobilized sediments. This debris \ufb02ow routed downstream the con\ufb02uence, \ufb02ooding the parking of a resort area where three people died, and reached the village downstream damaging some buildings. A geomorphological analysis was initially carried out after surveying the whole basin. All liquid and solid-liquid contributions to the phenomenon were recognized together with the areas subjected to erosion and deposition. The elaboration of pre and post-event topographical surveys provided the map of deposition-erosion depths. Using the rainfall estimated by weather radar and corrected by the nearest rain gauge, about 0.8 km far, we estimated runoff by using a rainfall-runoff model designed for the headwater rocky basins of Dolomites. A triggering model provided the debris \ufb02ow hydrographs in the initiation areas, after using the simulated runoff. The initial solid-liquid surge hydrographs were, then, routed downstream by means of a cell model. The comparison between the simulated and estimated deposition-erosion pattern resulted satisfactory. The results of the simulation captured, in fact, the main features of the occurred phenomenon

    Observational Equivalence and Full Abstraction in the Symmetric Interaction Combinators

    Full text link
    The symmetric interaction combinators are an equally expressive variant of Lafont's interaction combinators. They are a graph-rewriting model of deterministic computation. We define two notions of observational equivalence for them, analogous to normal form and head normal form equivalence in the lambda-calculus. Then, we prove a full abstraction result for each of the two equivalences. This is obtained by interpreting nets as certain subsets of the Cantor space, called edifices, which play the same role as Boehm trees in the theory of the lambda-calculus

    Probabilistic Rewriting: On Normalization, Termination, and Unique Normal Forms

    Full text link
    While a mature body of work supports the study of rewriting systems, even infinitary ones, abstract tools for Probabilistic Rewriting are still limited. Here, we investigate questions such as uniqueness of the result (unique limit distribution) and we develop a set of proof techniques to analyze and compare reduction strategies. The goal is to have tools to support the operational analysis of probabilistic calculi (such as probabilistic lambda-calculi) whose evaluation is also non-deterministic, in the sense that different reductions are possible. In particular, we investigate how the behavior of different rewrite sequences starting from the same term compare w.r.t. normal forms, and propose a robust analogue of the notion of "unique normal form". Our approach is that of Abstract Rewrite Systems, i.e. we search for general properties of probabilistic rewriting, which hold independently of the specific structure of the objects.Comment: Extended version of the paper in FSCD 2019, International Conference on Formal Structures for Computation and Deductio

    Observational equivalences for linear logic CC languages

    Full text link
    Linear logic Concurrent Constraint programming (LCC) is an extension of concurrent constraint programming (CC) where the constraint system is based on Girard's linear logic instead of the classical logic. In this paper we address the problem of program equivalence for this programming framework. For this purpose, we present a structural operational semantics for LCC based on a label transition system and investigate different notions of observational equivalences inspired by the state of art of process algebras. Then, we demonstrate that the asynchronous \pi-calculus can be viewed as simple syntactical restrictions of LCC. Finally we show LCC observational equivalences can be transposed straightforwardly to classical Concurrent Constraint languages and Constraint Handling Rules, and investigate the resulting equivalences.Comment: 17 page
    • …
    corecore