Flylib.com
List of Figures
Previous page
Table of content
< Free Open Study >
Preface
Figure P-1: Chapter Dependencies
Figure P-2: Sample Syllabus for an Advanced Graduate Course
Chapter 1: Introduction
Figure 1-1: Capsule History of Types in Computer Science and Logic
Chapter 3: Untyped Arithmetic Expressions
Figure 3-1: Booleans (B)
Figure 3-2: Arithmetic Expressions (NB)
Chapter 5: The Untyped Lambda-Calculus
Figure 5-1: The Predecessor Function's "Inner Loop"
Figure 5-2: Evaluation of
factorial c
3
Figure 5-3: Untyped Lambda-Calculus (λ)
Chapter 8: Typed Arithmetic Expressions
Figure 8-1: Typing Rules for Booleans (B)
Figure 8-2: Typing Rules for Numbers (NB)
Chapter 9: Simply Typed Lambda-Calculus
Figure 9-1: Pure Simply Typed Lambda-Calculus (λ
→
)
Chapter 11: Simple Extensions
Figure 11-1: Uninterpreted Base Types
Figure 11-2: Unit Type
Figure 11-3: Ascription
Figure 11-4: Let Binding
Figure 11-5: Pairs
Figure 11-6: Tuples
Figure 11-7: Records
Figure 11-8: (Untyped) Record Patterns
Figure 11-9: Sums
Figure 11-10: Sums (With Unique Typing)
Figure 11-11: Variants
Figure 11-12: General Recursion
Figure 11-13: Lists
Chapter 13: References
Figure 13-1: References
Chapter 14: Exceptions
Figure 14-1: Errors
Figure 14-2: Error Handling
Figure 14-3: Exceptions Carrying Values
Chapter 15: Subtyping
Figure 15-1: Simply Typed Lambda-Calculus with Subtyping (
λ
<:
)
Figure 15-2: Records (Same as Figure 11-7)
Figure 15-3: Records and Subtyping
Figure 15-4: Bottom Type
Figure 15-5: Variants and Subtyping
Chapter 16: Metatheory of Subtyping
Figure 16-1: Subtype Relation with Records (Compact Version)
Figure 16-2: Algorithmic Subtyping
Figure 16-3: Algorithmic Typing
Chapter 19: Case Study: Featherweight Java
Figure 19-1: Featherweight Java (Syntax and Subtyping)
Figure 19-2: Featherweight Java (Auxiliary Definitions)
Figure 19-3: Featherweight Java (Evaluation)
Figure 19-4: Featherweight Java (Typing)
Chapter 20: Recursive Types
Figure 20-1: Iso-Recursive Types (
λ
μ
)
Chapter 21: Metatheory of Recursive Types
Figure 21-1: Sample Tree Types.
Figure 21-2: A Sample
Support
Function
Figure 21-3: Sample
treeof
Application
Figure 21-4: Concrete Subtyping Algorithm for
μ
-Types
21-5: Amadio and Cardelli's Subtyping Algorithm
Chapter 22: Type Reconstruction
Figure 22-1: Constraint Typing Rules
Figure 22-2: Unification Algorithm
Chapter 23: Universal Types
Figure 23-1: Polymorphic Lambda-Calculus (System F)
Chapter 24: Existential Types
Figure 24-1: Existential Types
Chapter 26: Bounded Quantification
Figure 26-1: Bounded Quantification (Kernel F
<:
)
Figure 26-2: "Full" Bounded Quantification
Figure 26-3: Bounded Existential Quantification (Kernel Variant)
Chapter 28: Metatheory of Bounded Quantification
Figure 28-1: Exposure Algorithm for F
<:
Figure 28-2: Algorithmic Typing for F
<:
Figure 28-3: Algorithmic Subtyping for Kernel F
<:
Figure 28-4: Algorithmic Subtyping for Full F
<:
Figure 28-5: Join and Meet Algorithms for Kernel F
<:
Chapter 29: Type Operators and Kinding
Figure 29-1: Type Operators and Kinding (λ
ω
)
Chapter 30: Higher-Order Polymorphism
Figure 30-1: Higher-Order Polymorphic Lambda-Calculus (F
ω
)
Figure 30-2: Higher-Order Existential Types
Figure 30-3: Parallel reduction on types
Chapter 31: Higher-Order Subtyping
Figure 31-1: Higher-Order Bounded Quantification (
)
Chapter 32: Case Study: Purely Functional Objects
Figure 32-1: Polymorphic Update
Appendix A: Solutions to Selected Exercises
Figure A-1: Typed Record Patterns
Figure A-2: Minimal
X
-Free Supertype and Maximal
X
-Free Subtype of a Given Type
< Free Open Study >
Previous page
Table of content
Types and Programming Languages
ISBN: 0262162091
EAN: 2147483647
Year: 2002
Pages: 262
Authors:
Benjamin C. Pierce
BUY ON AMAZON
MySQL Stored Procedure Programming
Block Structure of Stored Programs
Named Conditions
Other Functions
Using MySQL with PHP Data Objects
Execution Mode Options for Stored Programs
Project Management JumpStart
Building the Foundation
Developing Project Management Skills
Controlling the Project Outcome
Appendix A Answers to Review Questions
Appendix B Sample Project Management Forms
Software Configuration Management
Project Management in a CM Environment
Configuration Verification and Audit
Appendix G Sample Inspection Plan
Appendix I System Service Request
Appendix Q Problem Trouble Report (PTR)
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Captology Looking Forward
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Summary
Configuration of Security Contexts
Configuration Steps
Manual (Cut-and-Paste) Enrollment
Functional Screens
Special Edition Using FileMaker 8
FileMaker Overview
Many-to-Many Relationships: Solving the Puzzle
Learning About the Environment
Troubleshooting
Putting the Finishing Touches on Your Documentation
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies