Genericity, Extensibility and Type-Safety in the Visitor Pattern

Total Page:16

File Type:pdf, Size:1020Kb

Genericity, Extensibility and Type-Safety in the Visitor Pattern Genericity, extensibility and type-safety in the V pattern Bruno Cesar´ dos Santos Oliveira Wolfson College Oxford University Computing Laboratory Submitted for the degree of Doctor of Philosophy Abstract A software component is, in a general sense, a piece of software that can be safely reused and flexibly adapted by some other piece of software. The safety can be ensured by a type system that guarantees the right usage of the component; the flexibility stems from the fact that components are parametrizable over different aspects affecting their behaviours. Component-oriented program- ming (COP), a programming style where software would be built out of several independent com- ponents, has for a long time eluded the software industry. Several reasons have been raised over time, but one that is consistently pointed out is the inadequacy of existing programming languages for the development of software components. Generic Programming (GP) usually manifests itself as a kind of parametrization. By abstracting from the differences of what would otherwise be separate but otherwise similar specific programs, one can develop a single unified generic program. Instantiating the parameter in various ways retrieves the various specific programs (and ideally some new ones too). Instances of GP include the generics (parametrization by types) mechanism as found in recent versions Java and C# and Datatype-Generic Programming (DGP) (parametrization by shape). Both mechanisms allow novel ways to parametrize programs that can largely increase the flexibility of programs. Software components and GP, and in particular DGP, are clearly related: GP and DGP provide novel ways to parametrize software, while software components benefit from parametrization in order to be flexible. However, DGP and COP have mostly been studied in isolation, with the former being a research topic among some functional programming communities and the latter being mostly studied within the object-oriented communities. In this thesis we will argue for the importance of the parametrization mechanisms provided by GP, and in particular DGP, in COP. We will defend that many design patterns can be captured as software components when using such kinds of parametrization. As evidence for this we will, using DGP techniques, develop a component library for the V pattern that is generic (i.e. can be used on several concrete visitors); extensible (i.e. concrete visitors may be extended); and i Abstract ii type-safe (i.e. its usage is statically type checked). A second aspect of this thesis concerns the adaptation of functional DGP techniques to object-oriented languages. We argue that parametriza- tion by datatypes should be replaced by parametrization by visitors, since visitors can be viewed as encodings of datatypes and, through those encodings, the functional techniques naturally translate into an OO setting. ii Acknowledgements I would like to thank Jeremy Gibbons, my supervisor, for two different reasons. Firstly, for being an excellent supervisor, for giving me a very interesting project to work on, for helping me dur- ing my first stages of research (when I felt unconfident about my research and abilities), and for always being willing to help me with technical (and bureaucratic) problems. Secondly, for giving me the opportunity to study in Britain and in the beautiful and inspiring city of Oxford, which has greatly helped me on the development of both my personal and professional skills. I cannot forget Jos´eNuno Oliveira for introducing me to the beauty of functional programming with his always interesting lectures and for motivating me into coming to Oxford. Ralf Hinze provided great in- spiration for my work and taught me a lot about generic programming. He and Andres L¨oh were excellent hosts during my one month visit to Bonn, which proved very fruitful in terms of research. My two examiners, Martin Odersky and Ralf Hinze, provided very useful feedback that helped improving the presentation of this thesis substantially. Mike Spivey took me as his student during Jeremy’s sabbatical and provided important feedback during my confirmation of status. Richard Bird and Oege de Moor were very helpful in making me focus on a research direction during my transfer examination. The Friday meetings of the Problem Solving Club provided a relaxed envi- ronment to discuss research problems and to get feedback about my own research. The meetings of the Datatype-Generic Programming project gave me the opportunity to present progress on my research and to get feedback regularly, and also provided a constant flow of new ideas. The attic crowd (which included, among others, Daniel Goodman, Christopher Aycock, Rui Zhang, Jolie de Miranda, Edward Smith, and Zoltan Miklos) provided an entertaining working environment. Wolfson College and the many friends I made there did an excellent job in my social integration at Oxford. My girlfriend Warnchudee Chalitaporn, who I met at Wolfson, gave me a lot of support and was very patient during my DPhil. Finally, my family, and especially my mother, have always motivated me and gave me the conditions to pursue higher education. iii Table of Contents 1 Introduction 1 1.1 SoftwareComponentsandReuse. ..... 2 1.2 Component-OrientedProgramming . ...... 3 1.3 DesignPatterns:ASignofWeakness? . ....... 4 1.4 Datatype-GenericProgramming . ...... 5 1.5 AcasestudyontheV Pattern.......................... 6 1.5.1 TheV:AValuableAbstraction . 7 1.5.2 TheScalaOption............................... 8 1.6 OverviewoftheThesis ............................. ... 10 1.7 RelatedWork ..................................... 11 1.7.1 Encodings of Datatypes and the V Pattern............... 11 1.7.2 DesignPatternsandComponents . ... 12 1.7.3 DesignPatternsandFunctionalProgramming . ........ 14 1.7.4 FunctionalDGP ............................... 16 1.7.5 TheExpressionProblem . 19 2 Preliminaries 22 2.1 TheScalaProgrammingLanguage . ..... 22 2.1.1 ExpressionsandDefinitions . ... 23 2.1.2 ClassesandObjects. .. .. .. .. .. .. .. .. 25 2.1.3 TraitsandMixins............................... 27 2.1.4 GenericTypesandMethods . 28 2.1.5 AbstractTypes ................................ 29 2.1.6 ImplicitParameters. .. 32 2.1.7 Higher-kindedTypes . 33 2.2 ScalaasaDGPlanguage ............................. .. 34 2.2.1 EncodingType-ConstructorPolymorphism . ....... 34 2.2.2 ALittleDGPLibrary............................. 35 2.3 Vs and Cs ............................... 36 2.3.1 TheC Pattern ............................ 36 iv TABLE OF CONTENTS v 2.3.2 TheV Pattern.............................. 38 2.4 FunctionalNotation.............................. .... 42 3 Visitors as Encodings of Datatypes 44 3.1 Introduction.................................... .. 44 3.2 Internal or External Vs:ADesignChoice .. .. .. .. .. 47 3.3 InternalVisitorsandtheChurchEncoding . .......... 48 3.3.1 EncodingDataTypesintheLambdaCalculus . ...... 48 3.3.2 TheChurchEncodinginScala . .. 49 3.4 ExternalVisitorsandtheParigotEncoding . ........... 50 3.4.1 LimitationsofChurchEncodings . .... 50 3.4.2 ParigotEncodingsintheLambdaCalculus . ...... 51 3.4.3 TheParigotEncodinginScala . ... 51 3.5 Generic Visitors: Two Dimensions of Parametrization . .............. 52 3.5.1 Abstractingovertheshape . ... 52 3.5.2 Abstractingoverthedecompositionstrategy . .......... 54 3.6 TheV PatternasaLibrary ........................... 56 3.6.1 DefiningtheLibrary ............................. 56 3.6.2 UsingtheLibrary............................... 59 3.7 Syntactic Sugar for VsinScala......................... 61 3.7.1 ExtendingtheLibrary . 62 3.7.2 UsingtheExtendedLibrary . .. 63 3.7.3 ComparisonwithFunctionalProgramming . ...... 65 3.8 ExpressivenessoftheVisitorLibrary . .......... 66 3.8.1 ParametricDatatypes. .. 66 3.8.2 MutuallyRecursiveDatatypes . .... 67 3.8.3 ExistentiallyQuantifiedDatatypes . ....... 68 3.8.4 ParamorphicVisitors . .. 70 3.9 Discussion...................................... 72 4 Visitor-Generic Programming 74 4.1 Introduction.................................... .. 74 4.2 EncodingSumsandProductsinScala . ...... 76 4.3 Generic Programming with Vs......................... 78 4.3.1 GenericsfortheMassesinScala . .... 78 4.3.2 RepresentationsofVisitors . ..... 81 4.3.3 RepresentationsofScala’sCaseClasses . ........ 83 4.3.4 DefiningGenericFunctions . .. 84 4.3.5 ReuseviaInheritance. .. 85 4.3.6 LocalRedefinition .............................. 86 v TABLE OF CONTENTS vi 4.4 GMandIndexedVs............................... 87 4.4.1 IndexedVisitors ............................... 88 4.4.2 AVisitorLibraryforIndexedVisitors . ....... 89 4.4.3 GMasanInstanceoftheVisitorLibrary. ...... 90 4.5 AVisitorforaFamilyBasedonSumsofProducts . ......... 93 4.5.1 AV BasedonSumsofProducts . 93 4.5.2 CreatingNewDatatypes . 95 4.5.3 FunctorialRepresentations . ..... 97 4.5.4 Separating Recursion from Generic Programming . ......... 98 4.6 Example: Generic Serialization and Deserialization . ...............100 4.6.1 Serialization ................................. 100 4.6.2 Deserialization ............................... 102 4.7 Discussion...................................... 103 5 Extensible Visitors and Generic Functions 106 5.1 Introduction.................................... 106 5.2 GenericFunctionsandTheExpressionProblem . .......... 109 5.2.1 TheExtensibilityProblemofVisitors . ....... 110 5.3 ExtensibilityinInternalVisitors . .......... 111 5.3.1 SimpleExtensibleVisitors . 111 5.3.2 ExtendingGenericFunctionswithExtraCases . ........ 112 5.3.3 ExtensibleRepresentations. .. 114
Recommended publications
  • Confusion in the Church-Turing Thesis Has Obscured the Funda- Mental Limitations of Λ-Calculus As a Foundation for Programming Languages
    Confusion in the Church-Turing Thesis Barry Jay and Jose Vergara University of Technology, Sydney {Barry.Jay,Jose.Vergara}@uts.edu.au August 20, 2018 Abstract The Church-Turing Thesis confuses numerical computations with sym- bolic computations. In particular, any model of computability in which equality is not definable, such as the λ-models underpinning higher-order programming languages, is not equivalent to the Turing model. However, a modern combinatory calculus, the SF -calculus, can define equality of its closed normal forms, and so yields a model of computability that is equivalent to the Turing model. This has profound implications for pro- gramming language design. 1 Introduction The λ-calculus [17, 4] does not define the limit of expressive power for higher- order programming languages, even when they are implemented as Turing ma- chines [69]. That this seems to be incompatible with the Church-Turing Thesis is due to confusion over what the thesis is, and confusion within the thesis itself. According to Soare [63, page 11], the Church-Turing Thesis is first mentioned in Steven Kleene’s book Introduction to Metamathematics [42]. However, the thesis is never actually stated there, so that each later writer has had to find their own definition. The main confusions within the thesis can be exposed by using the book to supply the premises for the argument in Figure 1 overleaf. The conclusion asserts the λ-definability of equality of closed λ-terms in normal form, i.e. syntactic equality of their deBruijn representations [20]. Since the conclusion is false [4, page 519] there must be a fault in the argument.
    [Show full text]
  • Lambda Calculus Encodings
    CMSC 330: Organization of Programming Languages Lambda Calculus Encodings CMSC330 Fall 2017 1 The Power of Lambdas Despite its simplicity, the lambda calculus is quite expressive: it is Turing complete! Means we can encode any computation we want • If we’re sufficiently clever... Examples • Booleans • Pairs • Natural numbers & arithmetic • Looping 2 Booleans Church’s encoding of mathematical logic • true = λx.λy.x • false = λx.λy.y • if a then b else c Ø Defined to be the expression: a b c Examples • if true then b else c = (λx.λy.x) b c → (λy.b) c → b • if false then b else c = (λx.λy.y) b c → (λy.y) c → c 3 Booleans (cont.) Other Boolean operations • not = λx.x false true Ø not x = x false true = if x then false else true Ø not true → (λx.x false true) true → (true false true) → false • and = λx.λy.x y false Ø and x y = if x then y else false • or = λx.λy.x true y Ø or x y = if x then true else y Given these operations • Can build up a logical inference system 4 Quiz #1 What is the lambda calculus encoding of xor x y? - xor true true = xor false false = false - xor true false = xor false true = true A. x x y true = λx.λy.x B. x (y true false) y false = λx.λy.y C. x (y false true) y if a then b else c = a b c not = λx.x false true D. y x y 5 Quiz #1 What is the lambda calculus encoding of xor x y? - xor true true = xor false false = false - xor true false = xor false true = true A.
    [Show full text]
  • Modular Domain-Specific Language Components in Scala
    Submitted to GPCE ’10 Modular Domain-Specific Language Components in Scala Christian Hofer Klaus Ostermann Aarhus University, Denmark University of Marburg, Germany [email protected] [email protected] Abstract simply compose these languages, if the concrete representations of Programs in domain-specific embedded languages (DSELs) can be their types in the host language match. Assuming Scala as our host represented in the host language in different ways, for instance im- language, we can then write a term like: plicitly as libraries, or explicitly in the form of abstract syntax trees. app(lam((x: Region) )union(vr(x),univ)), Each of these representations has its own strengths and weaknesses. scale(circle(3), The implicit approach has good composability properties, whereas add(vec(1,2),vec(3,4)))) the explicit approach allows more freedom in making syntactic pro- This term applies a function which maps a region to its union with gram transformations. the universal region to a circle that is scaled by a vector. Traditional designs for DSELs fix the form of representation, However, the main advantage of this method is also its main which means that it is not possible to choose the best representation disadvantage. It restricts the implementation to a fixed interpreta- for a particular interpretation or transformation. We propose a new tion which has to be compositional, i. e., the meaning of an expres- design for implementing DSELs in Scala which makes it easy to sion may only depend only on the meaning of its sub-expressions, use different program representations at the same time.
    [Show full text]
  • Encoding Data in Lambda Calculus: an Introduction
    Encoding Data in Lambda Calculus: An Introduction Frank(Peng) Fu September 26, 2017 Abstract Lambda calculus is a formalism introduced by Alonzo Church in the 1930s for his research on the foundations of mathematics. It is now widely used as a theoretical foundation for the functional program- ming languages (e.g. Haskell, OCaml, Lisp). I will first give a short introduction to lambda calculus, then I will discuss how to encode natural numbers using the encoding schemes invented by Alonzo Church, Dana Scott and Michel Parigot. Although we will mostly focus on numbers, these encoding schemes also works for more general data structures such as lists and trees. If time permits, I will talk about the type theoretical aspects of these encodings. 1 Introduction to Lambda Calculus Lambda calculus was invented by Alonzo Church, a lot of early results are due to him and his students. Currently, the definitive reference for lambda calculus is the book by Henk Barendregt [1]. Definition 1 (Lambda Calculus) The set of lambda term Λ is defined inductively as following. • x 2 Λ for any variable x. • If e 2 Λ, then λx.e 2 Λ. • If e1; e2 2 Λ, then e1 e2 2 Λ. Some computer scientists express lambda terms as: e; n ::= x j e1 e2 j λx.e. Lambda terms are almost symbolic, except we only consider lambda terms modulo alpha-equivalence, i.e. we view λx.e as the same term as λy:[y=x]e, where y does not occurs in e. Definition 2 Beta-reduction: (λx.e1) e2 [e2=x]e1, where [e2=x]e1 means the result of replacing all the variable x in e1 by e2.
    [Show full text]
  • Typed -Calculi and Superclasses of Regular Transductions
    Typed λ-calculi and superclasses of regular transductions Lê Thành Dung˜ Nguy˜ên LIPN, UMR 7030 CNRS, Université Paris 13, France https://nguyentito.eu/ [email protected] Abstract We propose to use Church encodings in typed λ-calculi as the basis for an automata-theoretic counterpart of implicit computational complexity, in the same way that monadic second-order logic provides a counterpart to descriptive complexity. Specifically, we look at transductions i.e. string-to-string (or tree-to-tree) functions – in particular those with superlinear growth, such as polyregular functions, HDT0L transductions and Sénizergues’s “k-computable mappings”. Our first results towards this aim consist showing the inclusion of some transduction classes in some classes defined by λ-calculi. In particular, this sheds light on a basic open question on the expressivity of the simply typed λ-calculus. We also encode regular functions (and, by changing the type of programs considered, we get a larger subclass of polyregular functions) in the elementary affine λ-calculus, a variant of linear logic originally designed for implicit computational complexity. 2012 ACM Subject Classification Theory of computation → Lambda calculus; Theory of computa- tion → Transducers; Theory of computation → Linear logic Keywords and phrases streaming string transducers, simply typed λ-calculus, linear logic Acknowledgements Thanks to Pierre Pradic for bringing to my attention the question (asked by Mikołaj Bojańczyk) of relating transductions and linear logic and for the proof of Theorem 2.9. This work also benefited from discussions on automata theory with Célia Borlido, Marie Fortin and Jérémy Ledent, and on the simply typed λ-calculus with Damiano Mazza.
    [Show full text]
  • Ps2.Zip Contains the Following files
    CS 3110 Spring 2017 Problem Set 2 Version 1 (last modified February 23, 2017) Overview This assignment reinforces the use of recursion when approaching certain types of problems. We will emphasize the use of map, fold\_left, and fold\_right as well as work on many methods involving list manipulation. Furthermore, this problem set contains two sections that introduce the use of data structures in OCaml by defining new types. This assignment must be done individually. Objectives • Gain familiarity and practice with folding and mapping. • Practice writing programs in the functional style using immutable data, recursion, and higher-order functions. • Introduce data structures in OCaml and get familiar with using defined types for manipulating data. Recommended reading The following supplementary materials may be helpful in completing this assignment: • Lectures2345 • The CS 3110 style guide • The OCaml tutorial • Introduction to Objective Caml • Real World OCaml, Chapters 1-3 What to turn in Exercises marked [code] should be placed in corresponding .ml files and will be graded au- tomatically. Please do not change any .mli files. Exercises marked [written], if any, should be placed in written.txt or written.pdf and will be graded by hand. Karma questions are not required and will not affect your grade in any way. They are there as challenges that we think may be interesting. 1 Compiling and testing your code For this problem set we have provided a Makefile and testcases. • To compile your code, run make main • To test your code, run make test • To remove files from a previous build, run make clean Please note that any submissions that do not compile will get an immediate 10% deduction from their original grade.
    [Show full text]
  • St. 5.2 Programming in the Lambda-Calculus
    58 5 The Untyped Lambda-Calculus The choice of evaluation strategy actually makes little difference when dis- cussing type systems. The issues that motivate various typing features, and the techniques used to address them, are much the same for all the strate- gies. in this book, we use call h value, both because it is fo st. well- own languages and because it is the easiest to emich with features_ suCh-as exceptions (Cha teLlA) and.references (ChapLer...l3). 5.2 Programming in the Lambda-Calculus The lambda-calculus is much more powerful than its tiny definition might suggest. In this section, we develop a number of standard examples of pro- gramming in the lambda-calculus. These examples are not intended to sug- gest that the lambda-calculus should be taken as a full-blown programming language in its own right -all widely used high-level languages provide clearer and more efficient ways of accomplishing the same tasks-but rather are in- tended as warm-up exercises to get the feel of the system. Multiple Arguments To begin, observe that the lambda-calculus provides no built-in support for multi-argument functions, Of course, this would not be hard to add, but it is even easier to achieve the same effect using higher-order functions that yield functions as results. Suppose that s is a term involving two free variables x and y and that we want to write a function f that, for each pair Cv,w) of arguments, yields the result of substituting v for x and w for y in s.
    [Show full text]
  • Lambda Calculus Encodings and Recursion; Definitional Translations Section and Practice Problems Feb 25-26, 2016
    Harvard School of Engineering and Applied Sciences — CS 152: Programming Languages Lambda calculus encodings and Recursion; Definitional translations Section and Practice Problems Feb 25-26, 2016 1 Lambda calculus encodings (a) Evaluate AND FALSE TRUE under CBV semantics. Answer: Recall that: TRUE , λx. λy: x FALSE , λx. λy: y AND , λb1: λb2: b1 b2 FALSE We can substitute these definitions and evaluate: AND FALSE TRUE , (λb1: λb2: b1 b2 FALSE)(λx. λy: y)(λx. λy: x) −!(λb2: (λx. λy: y) b2 FALSE)(λx. λy: x) −!(λx. λy: y)(λx. λy: x) FALSE −!(λy: y) FALSE −!FALSE (b) Evaluate IF FALSE Ω λx. x under CBN semantics. What happens when you evaluated it under CBV semantics? Answer: Recall that: IF , λb. λt. λf: b t f Ω , (λx. x x)(λx. x x) We can substitute these definitions and evaluate under CBN semantics: IF FALSE Ω(λx. x) , (λb. λt. λf: b t f)(λx. λy: y) ((λx. x x)(λx. x x)) (λx. x) −!(λt. λf: (λx. λy: y) t f) ((λx. x x)(λx. x x)) (λx. x) −!(λf: (λx. λy: y) ((λx. x x)(λx. x x)) f)(λx. x) −!(λx. λy: y) ((λx. x x)(λx. x x)) (λx. x) −!(λy: y)(λx. x) −!(λx. x) If we evaluate this expression under CBV semantics, we need to evaluate the Omega expression before we can apply the lambda abstraction. Since the Omega expression evaluates indefinitely, the overall expression never terminates. Lambda calculus encodings and Recursion; Definitional translations Section and Practice Problems (c) Evaluate ADD 2 1 under CBV semantics.
    [Show full text]
  • Lambda Calculus 2
    Lambda Calculus 2 COS 441 Slides 14 read: 3.4, 5.1, 5.2, 3.5 Pierce Lambda Calculus • The lambda calculus is a language of pure functions – expressions: e ::= x | \x.e | e1 e2 – values: v ::= \x.e – call-by-value operational semantics: (beta) (\x.e) v --> e [v/x] e1 --> e1’ e2 --> e2’ (app1) (app2) e1 e2 --> e1’ e2 v e2 --> v e2’ – example execution: (\x.x x) (\y.y) --> (\y.y) (\y.y) --> \y.y ENCODING BOOLEANS booleans • the encoding: tru = \t.\f. t fls = \t.\f. f test = \x.\then.\else. x then else Challenge tru = \t.\f. t fls = \t.\f. f test = \x.\then.\else. x then else create a function "and" in the lambda calculus that mimics conjunction. It should have the following properties. and tru tru -->* tru and fls tru -->* fls and tru fls -->* fls and fls fls -->* fls booleans tru = \t.\f. t fls = \t.\f. f and = \b.\c. b c fls and tru tru -->* tru tru fls -->* tru booleans tru = \t.\f. t fls = \t.\f. f and = \b.\c. b c fls and fls tru -->* fls tru fls -->* fls booleans tru = \t.\f. t fls = \t.\f. f and = \b.\c. b c fls and fls tru -->* fls tru fls -->* fls challenge: try to figure out how to implement "or" and "xor" ENCODING PAIRS pairs • would like to encode the operations – create e1 e2 – fst p – sec p • pairs will be functions – when the function is used in the fst or sec operation it should reveal its first or second component respectively pairs create = \x.\y.\b.
    [Show full text]
  • 8 Equivalent Models of Computation
    Learning Objectives: • Learn about RAM machines and the λ calculus. • Equivalence between these and other models and Turing machines. • Cellular automata and configurations of Turing machines. • Understand the Church-Turing thesis. 8 Equivalent models of computation “All problems in computer science can be solved by another level of indirec- tion”, attributed to David Wheeler. “Because we shall later compute with expressions for functions, we need a distinction between functions and forms and a notation for expressing this distinction. This distinction and a notation for describing it, from which we deviate trivially, is given by Church.”, John McCarthy, 1960 (in paper describing the LISP programming language) So far we have defined the notion of computing a function using Turing machines, which are not a close match to the way computation is done in practice. In this chapter we justify this choice by showing that the definition of computable functions will remain the same under a wide variety of computational models. This notion is known as Turing completeness or Turing equivalence and is one of the most fundamental facts of computer science. In fact, a widely believed claim known as the Church-Turing Thesis holds that every “reasonable” definition of computable function is equivalent to being computable by a Turing machine. We discuss the Church-Turing Thesis and the potential definitions of “reasonable” in Section 8.8. Some of the main computational models we discuss in this chapter include: • RAM Machines: Turing machines do not correspond to standard computing architectures that have Random Access Memory (RAM). The mathematical model of RAM machines is much closer to actual computers, but we will see that it is equivalent in power to Turing machines.
    [Show full text]
  • The Church-Scott Representation of Inductive and Coinductive Data
    The Church-Scott representation of inductive and coinductive data Herman Geuvers1 1 ICIS, Radboud University Heyendaalseweg 135 6525 AJ Nijmegen The Netherlands and Faculty of Mathematics and Computer Science Eindhoven University of Technology The Netherlands [email protected] Abstract Data in the lambda calculus is usually represented using the "Church encoding", which gives closed terms for the constructors and which naturally allows to define functions by iteration. An additional nice feature is that in system F (polymorphically typed lambda calculus) one can define types for this data and the iteration scheme is well-typed. A problem is that primitive recursion is not directly available: it can be coded in terms of iteration at the cost of inefficiency (e.g. a predecessor with linear run-time). The much less well-known Scott encoding has case distinction as a primitive. The terms are not typable in system F and there is no iteration scheme, but there is a constant time destructor (e.g. predecessor). We present a unification of the Church and Scott definition of data types, the Church-Scott encoding, which has primitive recursion as basic. For the numerals, these are also known as ‘Parigot numerals’. We show how these can be typed in the polymorphic lambda calculus extended with recursive types. We show that this also works for the dual case, co-inductive data types with primitive co-recursion. We single out the major schemes for defining functions over data-types: the iteration scheme, the case scheme and the primitive recursion scheme, and we show how they are tightly connected to the Church, the Scott and the Church-Scott representation.
    [Show full text]
  • Haskell Programming with Nested Types: a Principled Approach
    Archived version from NCDOCKS Institutional Repository http://libres.uncg.edu/ir/asu/ Haskell Programming with Nested Types: A Principled Approach By: Johann, Patricia & Ghani, Neil Abstract Initial algebra semantics is one of the cornerstones of the theory of modern functional programming languages. For each inductive data type, it provides a Church encoding for that type, a build combinator which constructs data of that type, a fold combinator which encapsulates structured recursion over data of that type, and a fold/build rule which optimises modular programs by eliminating from them data constructed using the build combinator, and immediately consumed using the fold combinator, for that type. It has long been thought that initial algebra semantics is not expressive enough to provide a similar foundation for programming with nested types in Haskell. Specifically, the standard folds derived from initial algebra semantics have been considered too weak to capture commonly occurring patterns of recursion over data of nested types in Haskell, and no build combinators or fold/build rules have until now been defined for nested types. This paper shows that standard folds are, in fact, sufficiently expressive for programming with nested types in Haskell. It also defines build combinators and fold/build fusion rules for nested types. It thus shows how initial algebra semantics provides a principled, expressive, and elegant foundation for programming with nested types in Haskell. Johann, Patricia & Ghani, Neil (2009) "Haskell Programming with Nested Types: A Principled Approach" . Higher-Order and Symbolic Computation, vol. 22, no. 2 (June 2009), pp. 155 - 189. ISSN: 1573-0557 Version of Record Available From www.semanticscholar.org Haskell Programming with Nested Types: A Principled Approach Patricia Johann and Neil Ghani 1.
    [Show full text]