Probabilistic Applicative Bisimulation and Call-by-Value Lam
|
|
- Cornelius Merritt
- 5 years ago
- Views:
Transcription
1 Probabilistic Applicative and Call-by-Value Lambda Calculi Joint work with Ugo Dal Lago ENS Lyon February 9, 2014 Probabilistic Applicative and Call-by-Value Lam
2 Introduction Fundamental question: when can two programs be considered equivalent? Probabilistic Applicative and Call-by-Value Lam
3 Introduction Fundamental question: when can two programs be considered equivalent? Context equivalence [Morris1968] : Two terms M and N are context equivalent if their observable behavior is the same in any context. Probabilistic Applicative and Call-by-Value Lam
4 Introduction Fundamental question: when can two programs be considered equivalent? Context equivalence [Morris1968] : Two terms M and N are context equivalent if their observable behavior is the same in any context. Proving that two programs are not equivalent is relatively easy: just find a context that separates them. Proving that two program are indeed equivalent, on the other hand, can be quite complicated. Other equivalence notion : Bisimilarity Probabilistic Applicative and Call-by-Value Lam
5 Our result For a probabilistic λ-calculus (Λ ) : Context Equivalence = Bisimilarity Probabilistic Applicative and Call-by-Value Lam
6 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam
7 Syntax and Operational Semantics Motivating Example : Perfect Security 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam
8 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Probabilistic Applicative and Call-by-Value Lam
9 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Values: V ::= λx.m; Probabilistic Applicative and Call-by-Value Lam
10 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Values: V ::= λx.m; Approximation (Big-Step) Semantics: M D, where D : Values [0, 1] sub-probability distribution. Approximation from below : only finite distributions M V {V 1 } M D N E M N 1 2 D E M K N F {P[V /x] E P,V } λx.p S(K ), V S(F) ( ) MN F (V ) λx.p S(K ) K (λx.p)e P,V V S(F) Probabilistic Applicative and Call-by-Value Lam
11 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Values: V ::= λx.m; Approximation (Big-Step) Semantics: M D, where D : Values [0, 1] sub-probability distribution. Approximation from below : only finite distributions M V {V 1 } M D N E M N 1 2 D E M K N F {P[V /x] E P,V } λx.p S(K ), V S(F) ( ) MN F (V ) λx.p S(K ) K (λx.p)e P,V V S(F) Semantics: M = sup M D D; Probabilistic Applicative and Call-by-Value Lam
12 Syntax and Operational Semantics Motivating Example : Perfect Security Syntax and Operational Semantics of Λ [DLZorzi2012] Terms: M, N ::= x λx.m MM M M; Values: V ::= λx.m; Approximation (Big-Step) Semantics: M D, where D : Values [0, 1] sub-probability distribution. Approximation from below : only finite distributions M V {V 1 } M D N E M N 1 2 D E M K N F {P[V /x] E P,V } λx.p S(K ), V S(F) ( ) MN F (V ) λx.p S(K ) K (λx.p)e P,V V S(F) Semantics: M = sup M D D; Variations: Small-Step Semantics, Call-by-name Evaluation. Probabilistic Applicative and Call-by-Value Lam
13 Syntax and Operational Semantics Motivating Example : Perfect Security Why Probabilistic Computation? Probabilistic Applicative and Call-by-Value Lam
14 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Probabilistic Applicative and Call-by-Value Lam
15 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. Probabilistic Applicative and Call-by-Value Lam
16 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; Probabilistic Applicative and Call-by-Value Lam
17 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; b {0, 1}; k GEN; Probabilistic Applicative and Call-by-Value Lam
18 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; b {0, 1}; k GEN; c ENC(m b, k); Probabilistic Applicative and Call-by-Value Lam
19 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; b {0, 1}; k GEN; c ENC(m b, k); b A 2 (c); Probabilistic Applicative and Call-by-Value Lam
20 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security Let Π = (GEN, ENC, DEC) be a cryptoscheme. Let A = (A 1, A 2 ) be an adversary. PrivK Π A m 0, m 1 A 1 ; b {0, 1}; k GEN; c ENC(m b, k); b A 2 (c); return b = b. Probabilistic Applicative and Call-by-Value Lam
21 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security For every adversary A, Pr(PrivK Π A = true) = 1 2 Probabilistic Applicative and Call-by-Value Lam
22 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security One-Time-Pad GEN = true false : bool; ENC = λx.λy.if x then (NOT y) else y : bool bool bool; DEC = ENC. Probabilistic Applicative and Call-by-Value Lam
23 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security One-Time-Pad GEN = true false : bool; ENC = λx.λy.if x then (NOT y) else y : bool bool bool; DEC = ENC. The Experiment as a Pair of Terms EXP FST = λx.λy.enc x GEN : bool bool bool; EXP SND = λx.λy.enc y GEN : bool bool bool. Probabilistic Applicative and Call-by-Value Lam
24 An Example: Perfect Security Syntax and Operational Semantics Motivating Example : Perfect Security One-Time-Pad GEN = true false : bool; ENC = λx.λy.if x then (NOT y) else y : bool bool bool; DEC = ENC. The Experiment as a Pair of Terms EXP FST = λx.λy.enc x GEN : bool bool bool; EXP SND = λx.λy.enc y GEN : bool bool bool. A.Pr(PrivK OTP A = true) = 1 2 EXP FST EXP SND Probabilistic Applicative and Call-by-Value Lam
25 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam
26 Bisimilarity (deterministic case) Probabilistic in the abstact A Labelled Markov Chain for Λ Example Let (S, Act, ) be a LTS (Labelled Transition System). A Simulation is a relation R on S such that : If p R q, and p a s, there exists t such that q a t and s R t. p R q a s Bisimilarity : p and q are bisimilar if : p R q, and R is a bisimulation. Probabilistic Applicative and Call-by-Value Lam
27 Bisimilarity (deterministic case) Probabilistic in the abstact A Labelled Markov Chain for Λ Example Let (S, Act, ) be a LTS (Labelled Transition System). A Simulation is a relation R on S such that : If p R q, and p a s, there exists t such that q a t and s R t. p R q a s R a t Bisimilarity : p and q are bisimilar if : p R q, and R is a bisimulation. Probabilistic Applicative and Call-by-Value Lam
28 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Probabilistic Applicative and Call-by-Value Lam
29 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Values Probabilistic Applicative and Call-by-Value Lam
30 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Values M N L. Probabilistic Applicative and Call-by-Value Lam
31 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Values M V N W L Z.. Probabilistic Applicative and Call-by-Value Lam
32 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms Values M Probabilistic Applicative and Call-by-Value Lam
33 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms M eval Values V Probabilistic Applicative and Call-by-Value Lam
34 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms M eval Values V λx.n Probabilistic Applicative and Call-by-Value Lam
35 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Terms M N{L/x} eval L Values V λx.n Probabilistic Applicative and Call-by-Value Lam
36 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Simulation eval λx.l R M N L{R/x} P{R/x} eval λx.p R Probabilistic Applicative and Call-by-Value Lam
37 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Simulation eval λx.l R M R N L{R/x} P{R/x} eval λx.p R Probabilistic Applicative and Call-by-Value Lam
38 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Simulation eval λx.l R M R N L{R/x} R P{R/x} eval λx.p R Probabilistic Applicative and Call-by-Value Lam
39 Applicative [Abramsky93] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Simulation eval λx.l R M R N L{R/x} R P{R/x} eval λx.p R Similarity: union of all simulations, denoted ; Bisimilarity: union of all bisimulations, denoted. Theorem M N iff M N. Probabilistic Applicative and Call-by-Value Lam
40 Probabilistic in the Abstract [LS1992] Probabilistic in the abstact A Labelled Markov Chain for Λ Example Labelled Markov Chain (LMC): a triple M = (S, L, P), where S is a countable set of states; L is a set of labels; P is a transition probability matrix, i.e., a function P : S L S R such that for every state s and for every label l, P(S, l, t) = t S P(s, l, t) 1; Probabilistic Applicative and Call-by-Value Lam
41 Bisimilarity (probabilistic case) Probabilistic in the abstact A Labelled Markov Chain for Λ Example Let (S, L, P) be a LMC (Labelled Markov Chain). p q a a s 1 s 2 s 3 s 4 s 5 E 1 E 2 : R such that R equivalence relation on S. (p, q) R for every equivalence class E, a L, P(q, a, s) P(p, a, s) = s E s E. Probabilistic Applicative and Call-by-Value Lam
42 Probabilistic in the abstact A Labelled Markov Chain for Λ Example A Labelled Markov Chain for Λ Terms Values M Probabilistic Applicative and Call-by-Value Lam
43 Probabilistic in the abstact A Labelled Markov Chain for Λ Example A Labelled Markov Chain for Λ Terms Values M eval, M (V ) eval, M (W ) V eval, M (Z) W Z. Probabilistic Applicative and Call-by-Value Lam
44 Probabilistic in the abstact A Labelled Markov Chain for Λ Example A Labelled Markov Chain for Λ Terms Values λx.n Probabilistic Applicative and Call-by-Value Lam
45 Probabilistic in the abstact A Labelled Markov Chain for Λ Example A Labelled Markov Chain for Λ Terms Values N{W /x} W, 1 λx.n Probabilistic Applicative and Call-by-Value Lam
46 Back to Our Example Probabilistic in the abstact A Labelled Markov Chain for Λ Example EXP FST = λx.λy.enc x GEN : bool bool bool; EXP SND = λx.λy.enc y GEN : bool bool bool. Probabilistic Applicative and Call-by-Value Lam
47 Back to Our Example Probabilistic in the abstact A Labelled Markov Chain for Λ Example EXP FST EXP SND true false true false λy.enc true GEN λy.enc false GEN λy.enc y GEN eval eval eval λy.enc true GEN λy.enc false GEN λy.enc y GEN false true ENC true GEN eval false true false ENC false GEN true eval 1 2 true false Probabilistic Applicative and Call-by-Value Lam
48 Back to Our Example Probabilistic in the abstact A Labelled Markov Chain for Λ Example R σ = X σ ID σ ; X bool = {(ENC true GEN), (ENC false GEN)}; X bool bool = {(λy.enc y GEN), (λy.enc true GEN), (λy.enc false GEN)}; X bool bool bool = {EXP FST, EXP SND }; Probabilistic Applicative and Call-by-Value Lam
49 Full Abstraction 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam
50 Full Abstraction Contexts: C ::= [ ] λx.c CM MC M C C M. Context Equivalence: M N iff for every context C it holds that C[M] = C[N]. Theorem is included in. Lemma is a congruence. M N = C[M] C[N] Howe s technique. Probabilistic Applicative and Call-by-Value Lam
51 Full Abstraction? Full Abstraction is a sound methodology for program equivalence. Is it also complete? CBN : No [DLSA2014] Counterexample: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). Probabilistic Applicative and Call-by-Value Lam
52 Full Abstraction? Full Abstraction is a sound methodology for program equivalence. Is it also complete? CBN : No [DLSA2014] Counterexample: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). Of course, I Ω and as a consequence λy.ω λy.i λy.(ω I ) = M N. Probabilistic Applicative and Call-by-Value Lam
53 Full Abstraction? Full Abstraction is a sound methodology for program equivalence. Is it also complete? CBN : No [DLSA2014] Counterexample: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). Of course, I Ω and as a consequence λy.ω λy.i λy.(ω I ) = M N. On the other hand, M N. We need a CIU-Theorem for that. Probabilistic Applicative and Call-by-Value Lam
54 Full Abstraction? Full Abstraction is a sound methodology for program equivalence. Is it also complete? CBN : No [DLSA2014] Counterexample: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). Of course, I Ω and as a consequence λy.ω λy.i λy.(ω I ) = M N. On the other hand, M N. We need a CIU-Theorem for that. CBV The counterexample above cannot be easily adapted. Contexts seem to be more powerful. Probabilistic Applicative and Call-by-Value Lam
55 Full Abstraction in CBV Full Abstraction Tests: t ::= ω a t t, t. Semantics of Tests P M (x, ω) = 1; P M (x, a t) = s S P(x, a, s) P M (s, t) P M (x, t, s ) = P M (x, t) P M (x, s). Theorem (vbmmw2004) x y iff for every test t it holds that P M (x, t) = P M (y, t). Probabilistic Applicative and Call-by-Value Lam
56 Full Abstraction in CBV Full Abstraction Tests: t ::= ω a t t, t. Semantics of Tests P M (x, ω) = 1; P M (x, a t) = s S P(x, a, s) P M (s, t) P M (x, t, s ) = P M (x, t) P M (x, s). Theorem (vbmmw2004) x y iff for every test t it holds that P M (x, t) = P M (y, t). But the question now is: are contexts powerful enough to implement every possible test? Probabilistic Applicative and Call-by-Value Lam
57 Full Abstraction in CBV Full Abstraction Contexts do not have the necessary discriminating power in CBN. Conjecture: only tests in the form t 1,..., t n where each t i is a trace can be captured. In CBV evaluation, terms can be copied after being evaluated! Probabilistic Applicative and Call-by-Value Lam
58 Full Abstraction in CBV Full Abstraction Contexts do not have the necessary discriminating power in CBN. Conjecture: only tests in the form t 1,..., t n where each t i is a trace can be captured. In CBV evaluation, terms can be copied after being evaluated! Lemma. For every test t there is a context C t which is equivalent to t in CBV. Probabilistic Applicative and Call-by-Value Lam
59 Full Abstraction in CBV Full Abstraction Contexts do not have the necessary discriminating power in CBN. Conjecture: only tests in the form t 1,..., t n where each t i is a trace can be captured. In CBV evaluation, terms can be copied after being evaluated! Lemma. For every test t there is a context C t which is equivalent to t in CBV. Theorem. In CBV, and coincide. Probabilistic Applicative and Call-by-Value Lam
60 How About Simulation (in CBV)? Full Abstraction Similarity can itself be characterized by a notion of testing, but for a stronger notion of test. General boolean tests are allowed, including disjunctive tests. Probabilistic Applicative and Call-by-Value Lam
61 How About Simulation (in CBV)? Full Abstraction Similarity can itself be characterized by a notion of testing, but for a stronger notion of test. General boolean tests are allowed, including disjunctive tests. The grammar of test needs to be enriched: t ::= ω a t t, t t t.... Probabilistic Applicative and Call-by-Value Lam
62 How About Simulation (in CBV)? Full Abstraction Similarity can itself be characterized by a notion of testing, but for a stronger notion of test. General boolean tests are allowed, including disjunctive tests. The grammar of test needs to be enriched: t ::= ω a t t, t t t.... Let us look at the counterexample for CBN: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). The two terms are incomparable by. But how about context equivalence? Probabilistic Applicative and Call-by-Value Lam
63 How About Simulation (in CBV)? Full Abstraction Similarity can itself be characterized by a notion of testing, but for a stronger notion of test. General boolean tests are allowed, including disjunctive tests. The grammar of test needs to be enriched: t ::= ω a t t, t t t.... Let us look at the counterexample for CBN: M = λx.λy.(ω I ); N = λx.(λy.ω) (λy.i ). The two terms are incomparable by. But how about context equivalence? Lemma. M N. Proof. Purely operational. Probabilistic Applicative and Call-by-Value Lam
64 Our Neighborhood Full Abstraction Λ, where we observe convergence CBN CBV [Abramsky1990,Howe1993] Λ with nondeterministic semantics, where we observe convergence, in its may or must flavors. CBN CBV [Ong1993,Lassen1998] Probabilistic Applicative and Call-by-Value Lam
65 1 Λ Syntax and Operational Semantics Motivating Example : Perfect Security 2 Probabilistic in the abstact A Labelled Markov Chain for Λ Example 3 Full Abstraction 4 Probabilistic Applicative and Call-by-Value Lam
66 Summing up: CBN CBV Further work: What if we add sequencing to CBN? What if we add parallel or to CBN? How about approximate notions of bisimulation? How about λ-calculi for probabilistic polynomial time? Probabilistic Applicative and Call-by-Value Lam
67 Questions? Probabilistic Applicative and Call-by-Value Lam
68 Probabilistic Applicative and Call-by-Value Lam
69 Howe s Technique R R H Probabilistic Applicative and Call-by-Value Lam
70 Howe s Technique R R H Probabilistic Applicative and Call-by-Value Lam
71 Howe s Technique R H is a Congruence whenever R is an equivalence R R H Probabilistic Applicative and Call-by-Value Lam
72 Howe s Technique H is a Congruence H Probabilistic Applicative and Call-by-Value Lam
73 Howe s Technique H is a Congruence H? Probabilistic Applicative and Call-by-Value Lam
74 Howe s Technique x x R M x x R H M x {x} M R H L x λx.l R N x / x x λx.m R H N x M R H P x N R H T x (PT ) R L x MN R H L x M R H P x N R H T x (P T ) R L x M N R H L Probabilistic Applicative and Call-by-Value Lam
75 The Key Lemma Proving that H is indeed a precongruence is a convenient way to proceed. Statement: If M H N, then for every X Λ (x) it holds that M (λx.x ) N (λx.( H (X ))). Proof. We prove that D(λx.X ) N (λx.( H (X ))) for every D such that M D. By induction on the structure of any derivation of M D (which is finite). Everything goes through smoothly, except... the application case. We need to prove that probability assignments can always be disentangled. This is the case, though. Probabilistic Applicative and Call-by-Value Lam
76 So we have : H = H = = is a precongruence = is a congruence =. Theorem Probabilistic Applicative and Call-by-Value Lam
Bisimulation and coinduction in higher-order languages
Bisimulation and coinduction in higher-order languages Davide Sangiorgi Focus Team, University of Bologna/INRIA ICE, Florence, June 2013 Bisimulation Behavioural equality One of the most important contributions
More informationA probabilistic lambda calculus - Some preliminary investigations
A probabilistic lambda calculus - Some preliminary investigations Ugo Dal Lago, Margherita Zorzi Università di Bologna, Università di Verona June, 9-11, 2010, Torino Introduction: Λ P We present some results
More informationA Lambda Calculus Foundation for Universal Probabilistic Programming
A Lambda Calculus Foundation for Universal Probabilistic Programming Johannes Borgström (Uppsala University) Ugo Dal Lago (University of Bologna, INRIA) Andrew D. Gordon (Microsoft Research, University
More informationOn Coinductive Equivalences for Higher-Order Probabilistic Functional Programs
On Coinductive Equivalences for Higher-Order Probabilistic Functional Programs Ugo Dal Lago, Davide Sangiorgi, Michele Alberti To cite this version: Ugo Dal Lago, Davide Sangiorgi, Michele Alberti. On
More informationOn Coinduction and Quantum Lambda Calculi
On Coinduction and Quantum Lambda Calculi Yuxin Deng East China Normal University (Joint work with Yuan Feng and Ugo Dal Lago) To appear at CONCUR 15 1 Outline Motivation A quantum λ-calculus Coinductive
More information3.2 Equivalence, Evaluation and Reduction Strategies
3.2 Equivalence, Evaluation and Reduction Strategies The λ-calculus can be seen as an equational theory. More precisely, we have rules i.e., α and reductions, for proving that two terms are intensionally
More informationOrigin in Mathematical Logic
Lambda Calculus Origin in Mathematical Logic Foundation of mathematics was very much an issue in the early decades of 20th century. Cantor, Frege, Russel s Paradox, Principia Mathematica, NBG/ZF Origin
More informationCall-by-value non-determinism in a linear logic type discipline
Call-by-value non-determinism in a linear logic type discipline Alejandro Díaz-Caro? Giulio Manzonetto Université Paris-Ouest & INRIA LIPN, Université Paris 13 Michele Pagani LIPN, Université Paris 13
More informationarxiv: v1 [cs.lo] 22 Jun 2015
pplicative Bisimulation and Quantum λ-calculi (Long Version) Ugo Dal Lago lessandro Rioli arxiv:1506.06661v1 [cs.lo] 22 Jun 2015 February 24, 2018 bstract pplicative bisimulation is a coinductive technique
More informationCongruence of Bisimulation in a Non-Deterministic Call-By-Need Lambda Calculus
Congruence of Bisimulation in a Non-Deterministic Call-By-Need Lambda Calculus Matthias Mann Johann Wolfgang Goethe-Universität, Frankfurt, Germany Congruence of Bisimulation p. 1/21 Lambda Calculi and
More informationLecture 13: Private Key Encryption
COM S 687 Introduction to Cryptography October 05, 2006 Instructor: Rafael Pass Lecture 13: Private Key Encryption Scribe: Ashwin Machanavajjhala Till this point in the course we have learnt how to define
More informationIntroduction to Cryptology. Lecture 3
Introduction to Cryptology Lecture 3 Announcements No Friday Office Hours. Instead will hold Office Hours on Monday, 2/6 from 3-4pm. HW1 due on Tuesday, 2/7 For problem 1, can assume key is of length at
More informationEnvironmental Bisimulations for Probabilistic Higher-Order Languages
Environmental Bisimulations for Probabilistic Higher-Order Languages Davide Sangiorgi, Valeria Vignudelli To cite this version: Davide Sangiorgi, Valeria Vignudelli. Environmental Bisimulations for Probabilistic
More informationCTR mode of operation
CSA E0 235: Cryptography 13 March, 2015 Dr Arpita Patra CTR mode of operation Divya and Sabareesh 1 Overview In this lecture, we formally prove that the counter mode of operation is secure against chosen-plaintext
More informationCS 4110 Programming Languages & Logics. Lecture 16 Programming in the λ-calculus
CS 4110 Programming Languages & Logics Lecture 16 Programming in the λ-calculus 30 September 2016 Review: Church Booleans 2 We can encode TRUE, FALSE, and IF, as: TRUE λx. λy. x FALSE λx. λy. y IF λb.
More information1. Propositional Calculus
1. Propositional Calculus Some notes for Math 601, Fall 2010 based on Elliott Mendelson, Introduction to Mathematical Logic, Fifth edition, 2010, Chapman & Hall. 2. Syntax ( grammar ). 1.1, p. 1. Given:
More informationLecture 2: Perfect Secrecy and its Limitations
CS 4501-6501 Topics in Cryptography 26 Jan 2018 Lecture 2: Perfect Secrecy and its Limitations Lecturer: Mohammad Mahmoody Scribe: Mohammad Mahmoody 1 Introduction Last time, we informally defined encryption
More informationTyping λ-terms. Types. Typed λ-terms. Base Types. The Typing Relation. Advanced Formal Methods. Lecture 3: Simply Typed Lambda calculus
Course 2D1453, 200607 Advanced Formal Methods Lecture 3: Simply Typed Lambda calculus Mads Dam KTH/CSC Some material from B. Pierce: TAPL + some from G. Klein, NICTA Typing λterms The uptyped λcalculus
More informationApplicative May- and Should-Simulation in the Call-by-Value Lambda Calculus with AMB
Applicative May- and Should-Simulation in the Call-by-Value Lambda Calculus with AMB Manfred Schmidt-Schauß and David Sabel Goethe University, Frankfurt, Germany {schauss,sabel}@ki.informatik.uni-frankfurt.de
More informationComputational security & Private key encryption
Computational security & Private key encryption Emma Arfelt Stud. BSc. Software Development Frederik Madsen Stud. MSc. Software Development March 2017 Recap Perfect Secrecy Perfect indistinguishability
More informationCBV and CBN. Eduardo Bonelli. TP para LP 2012C1 1/55
CBV and CBN Eduardo Bonelli TP para LP 2012C1 1/55 Reduction Strategies Call-By-Value Call-by-Name Relating CBN and CBV λ-calculus Continuation Passing Style Bibliography 2/55 Reduction Strategies Reduction
More informationA Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice
A Behavioral Congruence for Concurrent Constraint Programming with Nondeterministic Choice Luis Pino*, Filippo Bonchi** and Frank Valencia* (Presented by: Jorge A. Pe rez) *E quipe Come te, LIX, Laboratoire
More informationDynamic Noninterference Analysis Using Context Sensitive Static Analyses. Gurvan Le Guernic July 14, 2007
Dynamic Noninterference Analysis Using Context Sensitive Static Analyses Gurvan Le Guernic July 14, 2007 1 Abstract This report proposes a dynamic noninterference analysis for sequential programs. This
More informationThe Lambda-Calculus Reduction System
2 The Lambda-Calculus Reduction System 2.1 Reduction Systems In this section we present basic notions on reduction systems. For a more detailed study see [Klop, 1992, Dershowitz and Jouannaud, 1990]. Definition
More informationAn introduction to process calculi: Calculus of Communicating Systems (CCS)
An introduction to process calculi: Calculus of Communicating Systems (CCS) Lecture 2 of Modelli Matematici dei Processi Concorrenti Paweł Sobociński University of Southampton, UK Intro to process calculi:
More informationComputational Soundness of a Call by Name Calculus of Recursively-scoped Records. UMM Working Papers Series, Volume 2, Num. 3.
Computational Soundness of a Call by Name Calculus of Recursively-scoped Records. UMM Working Papers Series, Volume 2, Num. 3. Elena Machkasova Contents 1 Introduction and Related Work 1 1.1 Introduction..............................
More informationLazy Strong Normalization
Lazy Strong Normalization Luca Paolini 1,2 Dipartimento di Informatica Università di Torino (ITALIA) Elaine Pimentel 1,2 Departamento de Matemática Universidade Federal de Minas Gerais (BRASIL) Dipartimento
More informationGraph lambda theories
Under consideration for publication in Math. Struct. in Comp. Science Graph lambda theories A N T O N I O B U C C I A R E L L I 1 and A N T O N I N O S A L I B R A 2 1 Equipe PPS (case 7014), Université
More informationType Systems. Lecture 2 Oct. 27th, 2004 Sebastian Maneth.
Type Systems Lecture 2 Oct. 27th, 2004 Sebastian Maneth http://lampwww.epfl.ch/teaching/typesystems/2004 Today 1. What is the Lambda Calculus? 2. Its Syntax and Semantics 3. Church Booleans and Church
More informationReview. Principles of Programming Languages. Equality. The Diamond Property. The Church-Rosser Theorem. Corollaries. CSE 230: Winter 2007
CSE 230: Winter 2007 Principles of Programming Languages Lecture 12: The λ-calculus Ranjit Jhala UC San Diego Review The lambda calculus is a calculus of functions: e := x λx. e e 1 e 2 Several evaluation
More informationAlonzo Church ( ) Lambda Calculus. λ-calculus : syntax. Grammar for terms : Inductive denition for λ-terms
Alonzo Church (1903-1995) Lambda Calculus 2 λ-calculus : syntax Grammar for terms : t, u ::= x (variable) t u (application) λx.t (abstraction) Notation : Application is left-associative so that t 1 t 2...
More informationOn the Complexity of the Reflected Logic of Proofs
On the Complexity of the Reflected Logic of Proofs Nikolai V. Krupski Department of Math. Logic and the Theory of Algorithms, Faculty of Mechanics and Mathematics, Moscow State University, Moscow 119899,
More information1 Introduction. 2 Recap The Typed λ-calculus λ. 3 Simple Data Structures
CS 6110 S18 Lecture 21 Products, Sums, and Other Datatypes 1 Introduction In this lecture, we add constructs to the typed λ-calculus that allow working with more complicated data structures, such as pairs,
More informationEquations, contractions, and unique solutions
Equations, contractions, and unique solutions Davide Sangiorgi To cite this version: Davide Sangiorgi. Equations, contractions, and unique solutions. POPL 2015 - Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT
More informationAdvanced Lambda Calculus Lecture 5
Advanced Lambda Calculus Lecture 5 The fathers Alonzo Church (1903-1995) as mathematics student at Princeton University (1922 or 1924) Haskell B. Curry (1900-1982) as BA in mathematics at Harvard (1920)
More informationOrigin in Mathematical Logic
Lambda Calculus Origin in Mathematical Logic Foundation of mathematics was very much an issue in the early decades of 20th century. Cantor, Frege, Russel s Paradox, Principia Mathematica, NBG/ZF The Combinatory
More informationMAKING THE UNOBSERVABLE, UNOBSERVABLE.
MAKING THE UNOBSERVABLE, UNOBSERVABLE. 3 PAPERS FROM THE LAST 365 DAYS AVAILABLE TO READ NOW ON YOUR COMPUTER PAWEL SOBOCINSKI AND JULIAN RATHKE GO TO www.ecs.soton.ac.uk/~ps/publications.php Plan of the
More informationMechanizing a Decision Procedure for Coproduct Equality in Twelf
Mechanizing a Decision Procedure for Coproduct Equality in Twelf Arbob Ahmad (applying to PhD programs this fall!) Dan Licata Robert Harper Carnegie Mellon University Dan Licata WMM 2007...1 Equality Equality
More informationCall-by-Value Non-determinism in a Linear Logic Type Discipline
Call-by-Value Non-determinism in a Linear Logic Type Discipline Alejandro Díaz-Caro 1,, Giulio Manzonetto 1,2, and Michele Pagani 1,2 1 Université Paris 13, Sorbonne Paris Cité, LIPN, F-93430, Villetaneuse,
More informationA fully abstract semantics for a nondeterministic functional language with monadic types
A fully abstract semantics for a nondeterministic functional language with monadic types Alan Jeffrey 1 School of Cognitive and Computing Sciences University of Sussex, Brighton BN1 9QH, UK alanje@cogs.susx.ac.uk
More informationCOS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017
COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 2017 Previously on COS 433 Takeaway: Crypto is Hard Designing crypto is hard, even experts get it wrong Just because I don t know
More informationA product of γ-sets which is not Menger.
A product of γ-sets which is not Menger. A. Miller Dec 2009 Theorem. Assume CH. Then there exists γ-sets A 0, A 1 2 ω such that A 0 A 1 is not Menger. We use perfect sets determined by Silver forcing (see
More informationIII. Pseudorandom functions & encryption
III. Pseudorandom functions & encryption Eavesdropping attacks not satisfactory security model - no security for multiple encryptions - does not cover practical attacks new and stronger security notion:
More informationPr[C = c M = m] = Pr[C = c] Pr[M = m] Pr[M = m C = c] = Pr[M = m]
Midterm Review Sheet The definition of a private-key encryption scheme. It s a tuple Π = ((K n,m n,c n ) n=1,gen,enc,dec) where - for each n N, K n,m n,c n are sets of bitstrings; [for a given value of
More informationOperationally-Based Theories of Program Equivalence
Operationally-Based Theories of Program Equivalence Andrew Pitts Contents 1 Introduction : : : : : : : : : : : : : : : : : : : : : : : : : : : : 241 2 Contextual Equivalence : : : : : : : : : : : : : :
More information1 Sequences of events and their limits
O.H. Probability II (MATH 2647 M15 1 Sequences of events and their limits 1.1 Monotone sequences of events Sequences of events arise naturally when a probabilistic experiment is repeated many times. For
More informationNeighborhood Semantics for Modal Logic Lecture 5
Neighborhood Semantics for Modal Logic Lecture 5 Eric Pacuit ILLC, Universiteit van Amsterdam staff.science.uva.nl/ epacuit August 17, 2007 Eric Pacuit: Neighborhood Semantics, Lecture 5 1 Plan for the
More informationReasoning About Bounds In Weighted Transition Systems
Reasoning About Bounds In Weighted Transition Systems QuantLA 2017 September 18, 2017 Mikkel Hansen, Kim Guldstrand Larsen, Radu Mardare, Mathias Ruggaard Pedersen and Bingtian Xue {mhan, kgl, mardare,
More informationDecidability Results for Probabilistic Hybrid Automata
Decidability Results for Probabilistic Hybrid Automata Prof. Dr. Erika Ábrahám Informatik 2 - Theory of Hybrid Systems RWTH Aachen SS09 - Probabilistic hybrid automata 1 / 17 Literatur Jeremy Sproston:
More informationarxiv:math/ v1 [math.lo] 5 Mar 2007
Topological Semantics and Decidability Dmitry Sustretov arxiv:math/0703106v1 [math.lo] 5 Mar 2007 March 6, 2008 Abstract It is well-known that the basic modal logic of all topological spaces is S4. However,
More informationDipartimento di Informatica Università degli Studi di Verona
Dipartimento di Informatica Università degli Studi di Verona Rapporto di ricerca Research report 40/2006 On the observational theory of the CPS-calculus Massimo Merro Corrado Biasi Dipartimento di Informatica
More informationOperational Semantics
Operational Semantics Semantics and applications to verification Xavier Rival École Normale Supérieure Xavier Rival Operational Semantics 1 / 50 Program of this first lecture Operational semantics Mathematical
More information3.2 Reduction 29. Truth. The constructor just forms the unit element,. Since there is no destructor, there is no reduction rule.
32 Reduction 29 32 Reduction In the preceding section, we have introduced the assignment of proof terms to natural deductions If proofs are programs then we need to explain how proofs are to be executed,
More informationSimulation in the Call-by-Need Lambda-Calculus with Letrec, Case, Constructors, and Seq
Simulation in the Call-by-Need Lambda-Calculus with Letrec, Case, Constructors, and Seq Manfred Schmidt-Schauss 1 and David Sabel 1 and Elena Machkasova 2 1 Dept. Informatik und Mathematik, Inst. Informatik,
More informationFormal Methods Lecture 6. (B. Pierce's slides for the book Types and Programming Languages )
Formal Methods Lecture 6 (B. Pierce's slides for the book Types and Programming Languages ) Programming in the Lambda-Calculus, Continued Testing booleans Recall: tru = λt. λf. t fls = λt. λf. f We showed
More informationProgramming Languages
CSE 230: Winter 2010 Principles of Programming Languages Lecture 10: Programming in λ-calculusc l l Ranjit Jhala UC San Diego Review The lambda calculus is a calculus of functions: e := x λx. e e 1 e 2
More informationFormal Methods Lecture 6. (B. Pierce's slides for the book Types and Programming Languages )
Formal Methods Lecture 6 (B. Pierce's slides for the book Types and Programming Languages ) This Saturday, 10 November 2018, room 335 (FSEGA), we will recover the following activities: 1 Formal Methods
More informationIntroduction to λ-calculus
p.1/65 Introduction to λ-calculus Ken-etsu FUJITA fujita@cs.gunma-u.ac.jp http://www.comp.cs.gunma-u.ac.jp/ fujita/ Department of Computer Science Gunma University :Church 32, 36, 40; Curry 34 1. Universal
More informationType Systems. Today. 1. What is the Lambda Calculus. 1. What is the Lambda Calculus. Lecture 2 Oct. 27th, 2004 Sebastian Maneth
Today 1. What is the Lambda Calculus? Type Systems 2. Its Syntax and Semantics 3. Church Booleans and Church Numerals 4. Lazy vs. Eager Evaluation (call-by-name vs. call-by-value) Lecture 2 Oct. 27th,
More information1. Propositional Calculus
1. Propositional Calculus Some notes for Math 601, Fall 2010 based on Elliott Mendelson, Introduction to Mathematical Logic, Fifth edition, 2010, Chapman & Hall. 2. Syntax ( grammar ). 1.1, p. 1. Given:
More informationDomain theory and denotational semantics of functional programming
Domain theory and denotational semantics of functional programming Martín Escardó School of Computer Science, Birmingham University MGS 2007, Nottingham, version of April 20, 2007 17:26 What is denotational
More informationProgram Analysis Probably Counts
Probably Counts 1 c.hankin@imperial.ac.uk joint work with Alessandra Di Pierro 2 and Herbert Wiklicky 1 1 Department of Computing, 2 Dipartimento di Informatica, Università di Verona Computer Journal Lecture,
More informationExtending Abramsky s Lazy Lambda Calculus: (Non)-Conservativity of Embeddings
Extending Abramsky s Lazy Lambda Calculus: (Non)-Conservativity of Embeddings Manfred Schmidt-Schauß 1, Elena Machkasova 2, and David Sabel 1 1 Goethe-Universität, Frankfurt, Germany schauss,sabel@ki.informatik.uni-frankfurt.de
More informationOn simulations and bisimulations of general flow systems
On simulations and bisimulations of general flow systems Jen Davoren Department of Electrical & Electronic Engineering The University of Melbourne, AUSTRALIA and Paulo Tabuada Department of Electrical
More informationPřednáška 12. Důkazové kalkuly Kalkul Hilbertova typu. 11/29/2006 Hilbertův kalkul 1
Přednáška 12 Důkazové kalkuly Kalkul Hilbertova typu 11/29/2006 Hilbertův kalkul 1 Formal systems, Proof calculi A proof calculus (of a theory) is given by: A. a language B. a set of axioms C. a set of
More informationCompleteness for coalgebraic µ-calculus: part 2. Fatemeh Seifan (Joint work with Sebastian Enqvist and Yde Venema)
Completeness for coalgebraic µ-calculus: part 2 Fatemeh Seifan (Joint work with Sebastian Enqvist and Yde Venema) Overview Overview Completeness of Kozen s axiomatisation of the propositional µ-calculus
More informationDuality in Probabilistic Automata
Duality in Probabilistic Automata Chris Hundt Prakash Panangaden Joelle Pineau Doina Precup Gavin Seal McGill University MFPS May 2006 Genoa p.1/40 Overview We have discovered an - apparently - new kind
More informationSubtyping and Intersection Types Revisited
Subtyping and Intersection Types Revisited Frank Pfenning Carnegie Mellon University International Conference on Functional Programming (ICFP 07) Freiburg, Germany, October 1-3, 2007 Joint work with Rowan
More informationState-Dependent Representation Independence (Technical Appendix)
State-Dependent Representation Independence (Technical Appendix) Amal Ahmed Derek Dreyer Andreas Rossberg TTI-C MPI-SWS MPI-SWS amal@tti-c.org dreyer@mpi-sws.mpg.de rossberg@mpi-sws.mpg.de Contents August
More informationA should be R-closed: R(A) A. We would like this to hold because we would like every element that the rules say should be in A to actually be in A.
CS 6110 S18 Lecture 7 Inductive Definitions and Least Fixed Points 1 Set Operators Last time we considered a set of rule instances of the form X 1 X 2... X n, (1) X where X and the X i are members of some
More informationTruth-Functional Logic
Truth-Functional Logic Syntax Every atomic sentence (A, B, C, ) is a sentence and are sentences With ϕ a sentence, the negation ϕ is a sentence With ϕ and ψ sentences, the conjunction ϕ ψ is a sentence
More informationPSL Model Checking and Run-time Verification via Testers
PSL Model Checking and Run-time Verification via Testers Formal Methods 2006 Aleksandr Zaks and Amir Pnueli New York University Introduction Motivation (Why PSL?) A new property specification language,
More informationTowards Correctness of Program Transformations Through Unification and Critical Pair Computation
Towards Correctness of Program Transformations Through Unification and Critical Pair Computation Conrad Rau and Manfred Schmidt-Schauß Institut für Informatik Johann Wolfgang Goethe-Universität Postfach
More informationSimulation in the Call-by-Need Lambda-Calculus with letrec
Simulation in the Call-by-Need Lambda-Calculus with letrec Manfred Schmidt-Schauss 1 and David Sabel 1 and Elena Machkasova 2 1 Dept. Informatik und Mathematik, Inst. Informatik, J.W. Goethe-University,
More informationTyped Arithmetic Expressions
Typed Arithmetic Expressions CS 550 Programming Languages Jeremy Johnson TAPL Chapters 3 and 5 1 Types and Safety Evaluation rules provide operational semantics for programming languages. The rules provide
More informationType Systems. Lecture 9: Classical Logic. Neel Krishnaswami University of Cambridge
Type Systems Lecture 9: Classical Logic Neel Krishnaswami University of Cambridge Where We Are We have seen the Curry Howard correspondence: Intuitionistic propositional logic Simply-typed lambda calculus
More informationModel Checking for Modal Intuitionistic Dependence Logic
1/71 Model Checking for Modal Intuitionistic Dependence Logic Fan Yang Department of Mathematics and Statistics University of Helsinki Logical Approaches to Barriers in Complexity II Cambridge, 26-30 March,
More informationHow to Prove Similarity a Precongruence in Non-Deterministic Call-by-Need Lambda Calculi
How to Prove Similarity a Precongruence in Non-Deterministic Call-by-Need Lambda Calculi Matthias Mann and Manfred Schmidt-Schauß Institut für Informatik Johann Wolfgang Goethe-Universität Postfach 11
More informationRelating Reasoning Methodologies in Linear Logic and Process Algebra
Relating Reasoning Methodologies in Linear Logic and Process Algebra Yuxin Deng Robert J. Simmons Iliano Cervesato December 2011 CMU-CS-11-145 CMU-CS-QTR-111 School of Computer Science Carnegie Mellon
More informationSafety Analysis versus Type Inference
Information and Computation, 118(1):128 141, 1995. Safety Analysis versus Type Inference Jens Palsberg palsberg@daimi.aau.dk Michael I. Schwartzbach mis@daimi.aau.dk Computer Science Department, Aarhus
More informationCategories, Proofs and Programs
Categories, Proofs and Programs Samson Abramsky and Nikos Tzevelekos Lecture 4: Curry-Howard Correspondence and Cartesian Closed Categories In A Nutshell Logic Computation 555555555555555555 5 Categories
More informationCall-By-Push-Value: Decomposing Call-By-Value And Call-By-Name
Noname manuscript No. (will be inserted by the editor) Call-By-Push-Value: Decomposing Call-By-Value And Call-By-Name Paul Blain Levy Received: date / Accepted: date Abstract We present the call-by-push-value
More informationBlock ciphers And modes of operation. Table of contents
Block ciphers And modes of operation Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction Pseudorandom permutations Block Ciphers Modes of Operation
More informationLambda-Calculus (I) 2nd Asian-Pacific Summer School on Formal Methods Tsinghua University, August 23, 2010
Lambda-Calculus (I) jean-jacques.levy@inria.fr 2nd Asian-Pacific Summer School on Formal Methods Tsinghua University, August 23, 2010 Plan computation models lambda-notation bound variables conversion
More informationSmall families. (at INRIA with Gérard and in the historical λ-calculus) Jean-Jacques Lévy
Small families (at INRIA with Gérard and in the historical λ-calculus) Jean-Jacques Lévy INRIA Rocquencourt and Microsoft Research-INRIA Joint Centre June 22, 2007 caml years coq sixty years is 31,557,600
More informationNormal Form Simulation for McCarthy s Amb
Electronic Notes in Theoretical Computer Science 155 (2006) 445 465 www.elsevier.com/locate/entcs Normal Form Simulation for McCarthy s Amb Soren B. Lassen 1 Google, Inc. Mountain View, CA Abstract This
More informationEvaluation Driven Proof-Search in Natural Deduction Calculi for Intuitionistic Propositional Logic
Evaluation Driven Proof-Search in Natural Deduction Calculi for Intuitionistic Propositional Logic Mauro Ferrari 1, Camillo Fiorentini 2 1 DiSTA, Univ. degli Studi dell Insubria, Varese, Italy 2 DI, Univ.
More informationA Propositional Dynamic Logic for Instantial Neighborhood Semantics
A Propositional Dynamic Logic for Instantial Neighborhood Semantics Johan van Benthem, Nick Bezhanishvili, Sebastian Enqvist Abstract We propose a new perspective on logics of computation by combining
More informationESE601: Hybrid Systems. Introduction to verification
ESE601: Hybrid Systems Introduction to verification Spring 2006 Suggested reading material Papers (R14) - (R16) on the website. The book Model checking by Clarke, Grumberg and Peled. What is verification?
More informationPerfectly-Secret Encryption
Perfectly-Secret Encryption CSE 5351: Introduction to Cryptography Reading assignment: Read Chapter 2 You may sip proofs, but are encouraged to read some of them. 1 Outline Definition of encryption schemes
More informationDecidability: Church-Turing Thesis
Decidability: Church-Turing Thesis While there are a countably infinite number of languages that are described by TMs over some alphabet Σ, there are an uncountably infinite number that are not Are there
More informationOn-the-Fly Exact Computation of Bisimilarity Distances
On-the-Fly Exact Computation of Bisimilarity Distances Giorgio Bacci, Giovanni Bacci, Kim G. Larsen, Radu Mardare Dept. of Computer Science, Aalborg University Quantitative Models: Expressiveness, Analysis,
More informationPropositional Dynamic Logic
Propositional Dynamic Logic Contents 1 Introduction 1 2 Syntax and Semantics 2 2.1 Syntax................................. 2 2.2 Semantics............................... 2 3 Hilbert-style axiom system
More informationLambda Calculus, Linear Logic and Symbolic Computation
Lambda Calculus, Linear Logic and Symbolic Computation Habilitation à diriger des recherches Giulio Manzonetto giulio.manzonetto@lipn.univ-paris13.fr LIPN Université Paris Nord IRIF Université Paris Diderot
More informationCharacterizing Polynomial and Exponential Complexity Classes in Elementary Lambda-Calculus
Characterizing Polynomial and Exponential Complexity Classes in Elementary Lambda-Calculus Patric Baillot 1, Eria De Benedetti 1,2, and Simona Ronchi Della Rocca 2 1 CNRS, ENS de Lyon, INRIA, UCBL, Université
More informationProgramming Languages and Types
Programming Languages and Types Klaus Ostermann based on slides by Benjamin C. Pierce Where we re going Type Systems... Type systems are one of the most fascinating and powerful aspects of programming
More informationIntroduction to Kleene Algebras
Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)
More informationExpressing Security Properties Using Selective Interleaving Functions
Expressing Security Properties Using Selective Interleaving Functions Joseph Halpern and Sabina Petride August 8, 2008 Abstract McLean s notion of Selective Interleaving Functions (SIFs) is perhaps the
More informationLogical Characterizations of Simulation and Bisimulation for Fuzzy Transition Systems
Logical Characterizations of Simulation and Bisimulation for Fuzzy Transition Systems Hengyang Wu 1 Yuxin Deng 2 1 Information Engineer College, Hangzhou Dianzi University Hangzhou 310018, P.R. China 2
More informationApproximation Metrics for Discrete and Continuous Systems
University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science May 2007 Approximation Metrics for Discrete Continuous Systems Antoine Girard University
More information