Flylib.com
List of Figures
Previous page
Table of content
< Free Open Study >
Preface
Figure P-1: Chapter Dependencies
Figure P-2: Sample Syllabus for an Advanced Graduate Course
Chapter 1: Introduction
Figure 1-1: Capsule History of Types in Computer Science and Logic
Chapter 3: Untyped Arithmetic Expressions
Figure 3-1: Booleans (B)
Figure 3-2: Arithmetic Expressions (NB)
Chapter 5: The Untyped Lambda-Calculus
Figure 5-1: The Predecessor Function's "Inner Loop"
Figure 5-2: Evaluation of
factorial c
3
Figure 5-3: Untyped Lambda-Calculus (λ)
Chapter 8: Typed Arithmetic Expressions
Figure 8-1: Typing Rules for Booleans (B)
Figure 8-2: Typing Rules for Numbers (NB)
Chapter 9: Simply Typed Lambda-Calculus
Figure 9-1: Pure Simply Typed Lambda-Calculus (λ
→
)
Chapter 11: Simple Extensions
Figure 11-1: Uninterpreted Base Types
Figure 11-2: Unit Type
Figure 11-3: Ascription
Figure 11-4: Let Binding
Figure 11-5: Pairs
Figure 11-6: Tuples
Figure 11-7: Records
Figure 11-8: (Untyped) Record Patterns
Figure 11-9: Sums
Figure 11-10: Sums (With Unique Typing)
Figure 11-11: Variants
Figure 11-12: General Recursion
Figure 11-13: Lists
Chapter 13: References
Figure 13-1: References
Chapter 14: Exceptions
Figure 14-1: Errors
Figure 14-2: Error Handling
Figure 14-3: Exceptions Carrying Values
Chapter 15: Subtyping
Figure 15-1: Simply Typed Lambda-Calculus with Subtyping (
λ
<:
)
Figure 15-2: Records (Same as Figure 11-7)
Figure 15-3: Records and Subtyping
Figure 15-4: Bottom Type
Figure 15-5: Variants and Subtyping
Chapter 16: Metatheory of Subtyping
Figure 16-1: Subtype Relation with Records (Compact Version)
Figure 16-2: Algorithmic Subtyping
Figure 16-3: Algorithmic Typing
Chapter 19: Case Study: Featherweight Java
Figure 19-1: Featherweight Java (Syntax and Subtyping)
Figure 19-2: Featherweight Java (Auxiliary Definitions)
Figure 19-3: Featherweight Java (Evaluation)
Figure 19-4: Featherweight Java (Typing)
Chapter 20: Recursive Types
Figure 20-1: Iso-Recursive Types (
λ
μ
)
Chapter 21: Metatheory of Recursive Types
Figure 21-1: Sample Tree Types.
Figure 21-2: A Sample
Support
Function
Figure 21-3: Sample
treeof
Application
Figure 21-4: Concrete Subtyping Algorithm for
μ
-Types
21-5: Amadio and Cardelli's Subtyping Algorithm
Chapter 22: Type Reconstruction
Figure 22-1: Constraint Typing Rules
Figure 22-2: Unification Algorithm
Chapter 23: Universal Types
Figure 23-1: Polymorphic Lambda-Calculus (System F)
Chapter 24: Existential Types
Figure 24-1: Existential Types
Chapter 26: Bounded Quantification
Figure 26-1: Bounded Quantification (Kernel F
<:
)
Figure 26-2: "Full" Bounded Quantification
Figure 26-3: Bounded Existential Quantification (Kernel Variant)
Chapter 28: Metatheory of Bounded Quantification
Figure 28-1: Exposure Algorithm for F
<:
Figure 28-2: Algorithmic Typing for F
<:
Figure 28-3: Algorithmic Subtyping for Kernel F
<:
Figure 28-4: Algorithmic Subtyping for Full F
<:
Figure 28-5: Join and Meet Algorithms for Kernel F
<:
Chapter 29: Type Operators and Kinding
Figure 29-1: Type Operators and Kinding (λ
ω
)
Chapter 30: Higher-Order Polymorphism
Figure 30-1: Higher-Order Polymorphic Lambda-Calculus (F
ω
)
Figure 30-2: Higher-Order Existential Types
Figure 30-3: Parallel reduction on types
Chapter 31: Higher-Order Subtyping
Figure 31-1: Higher-Order Bounded Quantification (
)
Chapter 32: Case Study: Purely Functional Objects
Figure 32-1: Polymorphic Update
Appendix A: Solutions to Selected Exercises
Figure A-1: Typed Record Patterns
Figure A-2: Minimal
X
-Free Supertype and Maximal
X
-Free Subtype of a Given Type
< Free Open Study >
Previous page
Table of content
Types and Programming Languages
ISBN: 0262162091
EAN: 2147483647
Year: 2002
Pages: 262
Authors:
Benjamin C. Pierce
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
Snort Cookbook
Uninstalling Snort from Linux
Installing and Configuring MySQL
Detecting Stateless Attacks and Stream Reassembly
Securing ACID
Newbies Playing with Snort Using EagleX
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 5. The Road Less Traveled by in MapQuest
Hack 10. Georeference Digital Photos
Hack 32. Hack on Base Maps in Your Favorite Image Editor
Hack 42. Map Your Tracklogs on the Web
Hack 52. Show Your Waypoints on Aerial Photos with Terrabrowser
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Executing a Script
Following a Methodology
Table Constraints
Table Security
Section B.3. Formatting Dates
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Value Stream Mapping and Process Flow Tools
Voice of the Customer (VOC)
Descriptive Statistics and Data Displays
Variation Analysis
Reducing Lead Time and Non-Value-Add Cost
Java Concurrency in Practice
Synchronized Collections
Synchronizers
Why are GUIs Single-threaded?
Testing for Performance
Explicit Locks
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies