28 research outputs found

    The Power of Non-Determinism in Higher-Order Implicit Complexity

    Full text link
    We investigate the power of non-determinism in purely functional programming languages with higher-order types. Specifically, we consider cons-free programs of varying data orders, equipped with explicit non-deterministic choice. Cons-freeness roughly means that data constructors cannot occur in function bodies and all manipulation of storage space thus has to happen indirectly using the call stack. While cons-free programs have previously been used by several authors to characterise complexity classes, the work on non-deterministic programs has almost exclusively considered programs of data order 0. Previous work has shown that adding explicit non-determinism to cons-free programs taking data of order 0 does not increase expressivity; we prove that this - dramatically - is not the case for higher data orders: adding non-determinism to programs with data order at least 1 allows for a characterisation of the entire class of elementary-time decidable sets. Finally we show how, even with non-deterministic choice, the original hierarchy of characterisations is restored by imposing different restrictions.Comment: pre-edition version of a paper accepted for publication at ESOP'1

    A Flexible and Dynamic Access Control Policy Framework for an Active Networking Environment

    No full text
    To provide security for active networking nodes with respect to availability and controlled access the introduction of an access control mechanism and consequently a policy framework are mandatory. We follow the approach of a scenario-tailored runtime supervision of the service. During the development of the access control mechanism we strongly focused on keeping the mechanism as efficient as possible and to realize a modular design which allows to dynamically upgrade and configure the mechanism making use of the active networking technology itself while at the same time ensuring that mandatory security checks cannot be circumvented. Each service has to pass initial checks before it could be executed on an active node. Furthermore, also service-specific adaptive criterions could be included into the initial check

    Data type definition and handling for supporting interoperability across organizational borders

    No full text
    Organisational heterogeneity-especially in networks where new members may join at any time-requires ongoing actions to maintain interoperability. On the level of data interoperability, this highlights the importance of various aspects of data model and dataflow design, as well as handling of data at run-time. The latter is certain to require automated means of data model negotiation, and-while today's design processes are far from fully automated-such means can leverage productivity and support verification procedures in data modelling and dataflow design as well. The paper presents results in one possible approach to data type definition and manipulation, through the example of the ADVANCE dataflow engine and its type-related features. Aside from an XML-based type system, type inference algorithms are presented which are employed both during design and flow execution. © 2014 Springer Science+Business Media New York

    Types by Need

    Get PDF
    International audienceA cornerstone of the theory of λ-calculus is that intersection types characterise termination properties. They are a flexible tool that can be adapted to various notions of termination, and that also induces adequate denotational models. Since the seminal work of de Carvalho in 2007, it is known that multi types (i.e. non-idempotent intersection types) refine intersection types with quantitative information and a strong connection to linear logic. Typically, type derivations provide bounds for evaluation lengths, and minimal type derivations provide exact bounds. De Carvalho studied call-by-name evaluation, and Kesner used his system to show the termination equivalence of call-by-need and call-by-name. De Carvalho's system, however, cannot provide exact bounds on call-by-need evaluation lengths. In this paper we develop a new multi type system for call-by-need. Our system produces exact bounds and induces a denotational model of call-by-need, providing the first tight quantitative semantics of call-by-need

    Structure-based inhibitors of tau aggregation.

    No full text
    Aggregated tau protein is associated with over 20 neurological disorders, which include Alzheimer's disease. Previous work has shown that tau's sequence segments VQIINK and VQIVYK drive its aggregation, but inhibitors based on the structure of the VQIVYK segment only partially inhibit full-length tau aggregation and are ineffective at inhibiting seeding by full-length fibrils. Here we show that the VQIINK segment is the more powerful driver of tau aggregation. Two structures of this segment determined by the cryo-electron microscopy method micro-electron diffraction explain its dominant influence on tau aggregation. Of practical significance, the structures lead to the design of inhibitors that not only inhibit tau aggregation but also inhibit the ability of exogenous full-length tau fibrils to seed intracellular tau in HEK293 biosensor cells into amyloid. We also raise the possibility that the two VQIINK structures represent amyloid polymorphs of tau that may account for a subset of prion-like strains of tau

    Types of Fireballs

    No full text
    International audienceThe good properties of Plotkin's call-by-value lambda-calculus crucially rely on the restriction to weak evaluation and closed terms. Open call-by-value is the more general setting where evaluation is weak but terms may be open. Such an extension is delicate, and the literature contains a number of proposals. Recently, Accattoli and Guerrieri provided detailed operational and implementative studies of these proposals, showing that they are equivalent from the point of view of termination, and also at the level of time cost models. This paper explores the denotational semantics of open call-by-value, adapting de Carvalho's analysis of call-by-name via multi types (aka non-idempotent intersection types). Our type system characterises nor-malisation and thus provides an adequate relational semantics. Moreover, type derivations carry quantitative information about the cost of evaluation: their size bounds the number of evaluation steps and the size of the normal form, and we also characterise derivations giving exact bounds. The study crucially relies on a new, refined presentation of the fireball calculus, the simplest proposal for open call-by-value, that is more apt to denotational investigations
    corecore