Bespeak Dissertation Fast

Total Page:16

File Type:pdf, Size:1020Kb

Bespeak Dissertation Fast bespeak Dissertation fast The following is an academic genealogy of computer scientists and is constructed by following the pedigree of thesis advisors. == Europe == === Denmark === Peter Naur (Olivier Danvy) === Finland === Arto Salomaa === France === Many French computer scientists worked at the National Institute for Research in Computer Science and Control (INRIA). Marcel-Paul Schützenberger Maurice Nivat Philippe Flajolet Gérard Huet Francois Fages Thierry Coquand Hugo Herbelin Xavier Leroy Christine Paulin-Mohring Didier Rémy François Pottier Bruno Courcelle Louis Nolin Bernard Robinet Emmanuel Saint-James Olivier Danvy (Secondary advisor: Emmanuel Saint-James) Jean-François Perrot Jacques Sakarovitch Jean-Eric Pin Pascal Weil Gérard Berry Gilles Kahn Patrick Cousot Alain Colmerauer === Germany === Karl Steinbuch Franz Baader Carl Adam Petri Martin Odersky === Italy === Corrado Böhm Ugo Montanari Paolo Ciancarini Roberto Gorrieri Nadia Busi Davide Sangiorgi === Netherlands === ==== Van Wijngaarden / Dijkstra ==== Adriaan van Wijngaarden was director of the computer science department at the Centrum Wiskunde & Informatica. It was influential in the development of ALGOL 68. Cornelis Benjamin Biezeno (1933: honoris causa. Universiteit van Amsterdam) Adriaan van Wijngaarden (1945: Enige toepassingen van Fourierintegralen op elastische problemen. Technische Universiteit Delft) Willem van der Poel (1956: The Logical Principles of Some Simple Computers. Universiteit van Amsterdam) Gerard Holzmann (1979: Coordination Problems in Multiprocessing Systems. Technische Universiteit Delft) Edsger Dijkstra (1959: Communication with an Automatic Computer. Universiteit van Amsterdam) Nico Habermann (1967: On the Harmonious Co-operation of Abstract Machines. Technische Universiteit Eindhoven) Lawrence Snyder (1973: An Analysis of Parameter Evalutation Mechanisms for Recursive Procedures. Carnegie Mellon University) Tim Teitelbaum (1975: Minimal Distance Analysis of Syntax Errors in Computer Programs. Carnegie Mellon University) Sten Andler (1979: Predicate Path Expressions: A High-level Synchronization Mechanism. Carnegie Mellon University) John Ousterhout (1980: Partitioning and Cooperation in a Distributed Multiprocessor Operating System: MEDUSA. Carnegie Mellon University) Philip Wadler (1984: Listlessness Is Better than Laziness: An Algorithm that Transforms Applicative Programs to Eliminate Intermediate Lists. Carnegie Mellon University) (Secondary advisor: Guy L. Steele, Jr.) David Notkin (1984: Interactive Structure-Oriented Computing. Carnegie Mellon University) Martin Rem (1976: Associons and the Closure Statement. Technische Universiteit Eindhoven) (Secondary advisor: Frans Kruseman Aretz) Jan L. A. van de Snepscheut (1983: Trace Theory and VLSI Design. Technische Universiteit Eindhoven) (Secondary advisor: Edsger Dijkstra) Peter Hilbers (1989: Mappings of Algorithms on Processor Networks. Rijksuniversiteit Groningen) Jan Tijmen Udding (1984: Classification and Composition of Delay-Insensitive Circuits. Technische Universiteit Eindhoven) (Secondary advisor: Edsger Dijkstra) Anne Kaldewaij (1986: A Formalism for Concurrent Processes. Technische Universiteit Eindhoven) (Secondary advisor: Frans Kruseman Aretz) Guus Zoutendijk (1960: Methods of Feasible Directions : A Study in Lineair and Non- linear Programming. Universiteit van Amsterdam) Marc Nico Spijker (1968: Stability and Convergence of Finite-Difference Methods. Universiteit Leiden) Jaco de Bakker (1967: Formal Definition of Programming Languages: with an Application to the Definition of ALGOL 60. Universiteit van Amsterdam) Willem-Paul de Roever (1974: Recursive Program Schemes: Semantics and Proof Theory. Vrije Universiteit Amsterdam) Paul Vitanyi (1978: Lindenmayer Systems: Structure, Languages, and Growth Functions. Vrije Universiteit Amsterdam) (Secondary advisor: Arto K. Salomaa) Ronald Cramer (1997: Modular design of secure yet practical cryptographic protocols. Universiteit van Amsterdam) (Secondary advisor: Ivan Bjerre Damgård) Peter Grünwald (1998: The minimum description length principle and reasoning under uncertainty. Universiteit van Amsterdam) Anton Nijholt (1980: Context-Free Grammars : Covers, Normal Forms, and Parsing. Vrije Universiteit Amsterdam) Giuseppe Scollo (1993: The Engineering of Logics. Universiteit Twente) Ed Brinksma (1988: On the Design of Extended LOTOS; a Specification Language for Open Distributed Systems. Universiteit Twente) (Primary advisor: Christian Anton Vissers) John-Jules Meyer (1985: Programming Calculi Based on Fixed Point Transformations: Semantics and Applications. Vrije Universiteit Amsterdam) Wiebe van der Hoek (1992: Modalities for Reasoning about Knowledge and Quantities. Vrije Universiteit Amsterdam) (Secondary advisor: Johan van Benthem) Joost Kok (1989: Semantic Models for Parallel Computation in Data Flow, Logic- and Object-Oriented Programming. Vrije Universiteit Amsterdam) Jan Rutten (1989: A Parallel Object-Oriented Language: Design and Semantic Foundations. Vrije Universiteit Amsterdam) Frank S. de Boer (1991: Reasoning about Dynamically Evolving Process Structures: A Proof Theory for the Parallel Object-0riented Language POOL. Vrije Universiteit Amsterdam) Marcello Bonsangue (1996: Topological Dualities in Semantics. Vrije Universiteit Amsterdam) (Secondary advisor: Joost Kok) Reinder van de Riet (1968: Algol 60 as Formula Manipulation Language. Universiteit van Amsterdam) Peter Apers (1982: Query Processing and Data Allocation in Distributed Database Systems. Vrije Universiteit Amsterdam) Arno Siebes (1990: On Complex Objects. Universiteit Twente) (Secondary advisor: Martin L. Kersten) Martin L. Kersten (1985: A Model for a Secure Programming Environment. Vrije Universiteit Amsterdam) (Secondary advisor: Anthony Ira Wasserman) Stefan Manegold (2002: Understanding, Modeling, and Improving Main-Memory Database Performance. Universiteit van Amsterdam) Roel Wieringa (1990: Algebraic Foundations for Dynamic Conceptual Models. Vrije Universiteit Amsterdam) Frances Brazier (1991: Design and Evaluation of a User Interface for Information Retrieval. Vrije Universiteit Amsterdam) (Primary advisor: Sipke D. Fokkema) Hugo Brandt Corstius (1970: Exercises in Computational Linguistics. Universiteit van Amsterdam) (Secondary advisor: Frans Kruseman Aretz) Maarten van Emden (1971: An Analysis of Complexity. Universiteit van Amsterdam) Jonathan Schaeffer (1986: Experiments in Search and Knowledge. University of Waterloo) (Secondary advisor: Randy G. Goebel) Peter van Emde Boas (1974: Abstract Resource-Bound Classes. Universiteit van Amsterdam) (Secondary advisor: Pieter Cornelis Baayen) Arjen Lenstra (1984: Polynomial Time Algorithms for the Factorization of Polynomials. Universiteit van Amsterdam) Harry Buhrman (1993: Resource Bounded Reductions. Universiteit van Amsterdam) (Primary advisor: Steven Elliot Homer) Herman te Riele (1976: A Computational Study of Generalized Aliquot Sequences. Universiteit van Amsterdam) Dick Grune (1982: On the Design of ALEPH. Universiteit van Amsterdam) (Secondary advisor: Cornelis H. A. Koster) ==== Brouwer / Van Dalen ==== Several of the students of Dirk van Dalen, a descendant of Brouwer, became the first Dutch theoretical computer scientists, which still has a strong focus on lambda calculus, rewrite systems and functional programming. Luitzen Egbertus Jan Brouwer (1907: Over de grondslagen der wiskunde. Universiteit van Amsterdam) Arend Heyting (1925: Intuitionistische axiomatiek der projectieve meetkunde. Universiteit van Amsterdam) Dirk van Dalen (1963: Extension Problems in Intuitionistic Plane Projective Geometry. Universiteit van Amsterdam) Henk Barendregt (1971: Some Extensional Terms for Combinatory Logics and Lambda-Calculi. Universiteit Utrecht) Roel de Vrijer (1987: Surjective Pairing and Strong Normalization: Two Themes in Lambda Calculus. Universiteit van Amsterdam) Pieter Hartel (1988: Performance Analysis of Storage Management in Combinator Graph Reduction. Universiteit van Amsterdam) (Primary advisor: Bob Hertzberger) Mariangiola Dezani- Ciancaglini (1996: Logical Semantics for Concurrent Lambda-Calculus. Katholieke Universiteit Nijmegen) (Secondary advisor: Corrado Böhm) Jan van Leeuwen (1972: Rule-Labeled Programs: A Study of a Generalization of Context-Free Grammars and Some Classes of Formal Languages. Universiteit Utrecht) Mark Overmars (1983: The Design of Dynamic Data Structures. Universiteit Utrecht) Mark de Berg (1992: Efficient Algorithms for Ray Shooting and Hidden Surface Removal. Universiteit Utrecht) Marc van Kreveld (1992: New Results on Data Structures in Computational Geometry. Universiteit Utrecht) Hans Bodlaender (1986: Distributed Computing - Structure and Complexity. Universiteit Utrecht) Harry Wijshoff (1987: Data Organization in Parallel Computers. Universiteit Utrecht) Gerard Tel (1989: The Structure of Distributed Algorithms. Universiteit Utrecht) Jan Bergstra (1976: Computability and Continuity in Finite Types. Universiteit Utrecht) Frits Vaandrager (1990: Algebraic Techniques for Concurrency and Their Application. Universiteit van Amsterdam) Linda van der Gaag (1990: Probability-Based Models for Plausible Reasoning. Universiteit van Amsterdam) Chris Verhoef (1990: Linear unary operators in process algebra. Universiteit van Amsterdam) Jan Friso Groote (1991: Process Algebra and Structured Operational Semantics. Universiteit van Amsterdam) Wan Fokkink (1994: Clocks, Trees and Stars in Process Theory. Universiteit van Amsterdam) Jaco van de Pol
Recommended publications
  • Efficient Algorithms with Asymmetric Read and Write Costs
    Efficient Algorithms with Asymmetric Read and Write Costs Guy E. Blelloch1, Jeremy T. Fineman2, Phillip B. Gibbons1, Yan Gu1, and Julian Shun3 1 Carnegie Mellon University 2 Georgetown University 3 University of California, Berkeley Abstract In several emerging technologies for computer memory (main memory), the cost of reading is significantly cheaper than the cost of writing. Such asymmetry in memory costs poses a fun- damentally different model from the RAM for algorithm design. In this paper we study lower and upper bounds for various problems under such asymmetric read and write costs. We con- sider both the case in which all but O(1) memory has asymmetric cost, and the case of a small cache of symmetric memory. We model both cases using the (M, ω)-ARAM, in which there is a small (symmetric) memory of size M and a large unbounded (asymmetric) memory, both random access, and where reading from the large memory has unit cost, but writing has cost ω 1. For FFT and sorting networks we show a lower bound cost of Ω(ωn logωM n), which indicates that it is not possible to achieve asymptotic improvements with cheaper reads when ω is bounded by a polynomial in M. Moreover, there is an asymptotic gap (of min(ω, log n)/ log(ωM)) between the cost of sorting networks and comparison sorting in the model. This contrasts with the RAM, and most other models, in which the asymptotic costs are the same. We also show a lower bound for computations on an n × n diamond DAG of Ω(ωn2/M) cost, which indicates no asymptotic improvement is achievable with fast reads.
    [Show full text]
  • Deduction Systems Based on Resolution, We Limit the Following Considerations to Transition Systems Based on Analytic Calculi
    Author’s Address Norbert Eisinger European Computer–Industry Research Centre, ECRC Arabellastr. 17 D-8000 M¨unchen 81 F. R. Germany [email protected] and Hans J¨urgen Ohlbach Max–Planck–Institut f¨ur Informatik Im Stadtwald D-6600 Saarbr¨ucken 11 F. R. Germany [email protected] Publication Notes This report appears as chapter 4 in Dov Gabbay (ed.): ‘Handbook of Logic in Artificial Intelligence and Logic Programming, Volume I: Logical Foundations’. It will be published by Oxford University Press, 1992. Fragments of the material already appeared in chapter two of Bl¨asis & B¨urckert: Deduction Systems in Artificial Intelligence, Ellis Horwood Series in Artificial Intelligence, 1989. A draft version has been published as SEKI Report SR-90-12. The report is also published as an internal technical report of ECRC, Munich. Acknowledgements The writing of the chapters for the handbook has been a highly coordinated effort of all the people involved. We want to express our gratitude for their many helpful contributions, which unfortunately are impossible to list exhaustively. Special thanks for reading earlier drafts and giving us detailed feedback, go to our second reader, Bob Kowalski, and to Wolfgang Bibel, Elmar Eder, Melvin Fitting, Donald W. Loveland, David Plaisted, and J¨org Siekmann. Work on this chapter started when both of us were members of the Markgraf Karl group at the Universit¨at Kaiserslautern, Germany. With our former colleagues there we had countless fruitful discus- sions, which, again, cannot be credited in detail. During that time this research was supported by the “Sonderforschungsbereich 314, K¨unstliche Intelligenz” of the Deutsche Forschungsgemeinschaft (DFG).
    [Show full text]
  • A New Golden Age for Computer Architecture: Domain-Specific
    A New Golden Age for Computer Architecture: Domain-Specific Hardware/Software Co-Design, Enhanced Security, Open Instruction Sets, and Agile Chip Development John Hennessy and David Patterson Stanford and UC Berkeley 13 June 2018 https://www.youtube.com/watch?v=3LVeEjsn8Ts 1 Outline Part I: History of Part II: Current Architecture - Architecture Challenges - Mainframes, Ending of Dennard Scaling Minicomputers, and Moore’s Law, Security Microprocessors, RISC vs CISC, VLIW Part III: Future Architecture Opportunities - Domain Specific Languages and Architecture, Open Architectures, Agile Hardware Development 2 IBM Compatibility Problem in Early 1960s By early 1960’s, IBM had 4 incompatible lines of computers! 701 ➡ 7094 650 ➡ 7074 702 ➡ 7080 1401 ➡ 7010 Each system had its own: ▪ Instruction set architecture (ISA) ▪ I/O system and Secondary Storage: magnetic tapes, drums and disks ▪ Assemblers, compilers, libraries,... ▪ Market niche: business, scientific, real time, ... IBM System/360 – one ISA to rule them all 3 Control versus Datapath ▪ Processor designs split between datapath, where numbers are stored and arithmetic operations computed, and control, which sequences operations on datapath ▪ Biggest challenge for computer designers was getting control correct Control Instruction Control Lines Condition?▪ Maurice Wilkes invented the idea of microprogramming to design the control unit of a PC processor* Datapath Registers Inst. Reg. ▪ Logic expensive vs. ROM or RAM ALU Busy? Address Data ▪ ROM cheaper than RAM Main Memory ▪ ROM much faster
    [Show full text]
  • Benchmarks for IP Forwarding Tables
    Reviewers James Abello Richard Cleve Vassos Hadzilacos Dimitris Achilioptas James Clippinger Jim Hafner Micah Adler Anne Condon Torben Hagerup Oswin Aichholzer Stephen Cook Armin Haken William Aiello Tom Cormen Shai Halevi Donald Aingworth Dan Dooly Eric Hansen Susanne Albers Oliver Duschka Refael Hassin Eric Allender Martin Dyer Johan Hastad Rajeev Alur Ran El-Yaniv Lisa Hellerstein Andris Ambainis David Eppstein Monika Henzinger Amihood Amir Jeff Erickson Tom Henzinger Artur Andrzejak Kousha Etessami Jeremy Horwitz Boris Aronov Will Evans Russell Impagliazzo Sanjeev Arora Guy Even Piotr Indyk Amotz Barnoy Ron Fagin Sandra Irani Yair Bartal Michalis Faloutsos Ken Jackson Julien Basch Martin Farach-Colton David Johnson Saugata Basu Uri Feige John Jozwiak Bob Beals Joan Feigenbaum Bala Kalyandasundaram Paul Beame Stefan Felsner Ming-Yang Kao Steve Bellantoni Faith Fich Haim Kaplan Micahel Ben-Or Andy Fingerhut Bruce Kapron Josh Benaloh Paul Fischer Michael Kaufmann Charles Bennett Lance Fortnow Michael Kearns Marshall Bern Steve Fortune Sanjeev Khanna Nikolaj Bjorner Alan Frieze Samir Khuller Johannes Blomer Anna Gal Joe Kilian Avrim Blum Naveen Garg Valerie King Dan Boneh Bernd Gartner Philip Klein Andrei Broder Rosario Gennaro Spyros Kontogiannis Nader Bshouty Ashish Goel Gilad Koren Adam Buchsbaum Michel Goemans Dexter Kozen Lynn Burroughs Leslie Goldberg Dina Kravets Ran Canetti Paul Goldberg S. Ravi Kumar Pei Cao Oded Goldreich Eyal Kushilevitz Moses Charikar John Gray Stephen Kwek Chandra Chekuri Dan Greene Larry Larmore Yi-Jen Chiang
    [Show full text]
  • Computational Learning Theory: New Models and Algorithms
    Computational Learning Theory: New Models and Algorithms by Robert Hal Sloan S.M. EECS, Massachusetts Institute of Technology (1986) B.S. Mathematics, Yale University (1983) Submitted to the Department- of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 1989 @ Robert Hal Sloan, 1989. All rights reserved The author hereby grants to MIT permission to reproduce and to distribute copies of this thesis document in whole or in part. Signature of Author Department of Electrical Engineering and Computer Science May 23, 1989 Certified by Ronald L. Rivest Professor of Computer Science Thesis Supervisor Accepted by Arthur C. Smith Chairman, Departmental Committee on Graduate Students Abstract In the past several years, there has been a surge of interest in computational learning theory-the formal (as opposed to empirical) study of learning algorithms. One major cause for this interest was the model of probably approximately correct learning, or pac learning, introduced by Valiant in 1984. This thesis begins by presenting a new learning algorithm for a particular problem within that model: learning submodules of the free Z-module Zk. We prove that this algorithm achieves probable approximate correctness, and indeed, that it is within a log log factor of optimal in a related, but more stringent model of learning, on-line mistake bounded learning. We then proceed to examine the influence of noisy data on pac learning algorithms in general. Previously it has been shown that it is possible to tolerate large amounts of random classification noise, but only a very small amount of a very malicious sort of noise.
    [Show full text]
  • Arxiv:2011.02915V1 [Math.LO] 3 Nov 2020 the Otniy Ucin Pnst Tctr)Ue Nti Ae R T Are Paper (C 1.1
    REVERSE MATHEMATICS OF THE UNCOUNTABILITY OF R: BAIRE CLASSES, METRIC SPACES, AND UNORDERED SUMS SAM SANDERS Abstract. Dag Normann and the author have recently initiated the study of the logical and computational properties of the uncountability of R formalised as the statement NIN (resp. NBI) that there is no injection (resp. bijection) from [0, 1] to N. On one hand, these principles are hard to prove relative to the usual scale based on comprehension and discontinuous functionals. On the other hand, these principles are among the weakest principles on a new com- plimentary scale based on (classically valid) continuity axioms from Brouwer’s intuitionistic mathematics. We continue the study of NIN and NBI relative to the latter scale, connecting these principles with theorems about Baire classes, metric spaces, and unordered sums. The importance of the first two topics re- quires no explanation, while the final topic’s main theorem, i.e. that when they exist, unordered sums are (countable) series, has the rather unique property of implying NIN formulated with the Cauchy criterion, and (only) NBI when formulated with limits. This study is undertaken within Ulrich Kohlenbach’s framework of higher-order Reverse Mathematics. 1. Introduction The uncountability of R deals with arbitrary mappings with domain R, and is therefore best studied in a language that has such objects as first-class citizens. Obviousness, much more than beauty, is however in the eye of the beholder. Lest we be misunderstood, we formulate a blanket caveat: all notions (computation, continuity, function, open set, et cetera) used in this paper are to be interpreted via their higher-order definitions, also listed below, unless explicitly stated otherwise.
    [Show full text]
  • Variations on the Sensitivity Conjecture
    THEORY OF COMPUTING LIBRARY GRADUATE SURVEYS 4 (2011), pp. 1–27 www.theoryofcomputing.org Variations on the Sensitivity Conjecture Pooya Hatami Raghav Kulkarni Denis Pankratov Received: November 2, 2010; published: June 22, 2011. Abstract: The sensitivity of a Boolean function f of n Boolean variables is the maximum over all inputs x of the number of positions i such that flipping the i-th bit of x changes the value of f (x). Permitting to flip disjoint blocks of bits leads to the notion of block sensitivity, known to be polynomially related to a number of other complexity measures of f , including the decision-tree complexity, the polynomial degree, and the certificate complexity. A long-standing open question is whether sensitivity also belongs to this equivalence class. A positive answer to this question is known as the Sensitivity Conjecture. We present a selection of known as well as new variants of the Sensitivity Conjecture and point out some weaker versions that are also open. Among other things, we relate the problem to Communication Complexity via recent results by Sherstov (QIC 2010). We also indicate new connections to Fourier analysis. ACM Classification: F.0, F.1, F.2 AMS Classification: 68-02, 68Q05, 68Q25 Key words and phrases: sensitivity, block sensitivity, complexity measures of Boolean functions 1 The Sensitivity Conjecture For Boolean strings x;y 2 f0;1gn let x ⊕ y 2 f0;1gn denote the coordinate-wise exclusive or of x and y. n th Let ei 2 f0;1g denote an n-bit Boolean string whose i bit is 1 and the rest of the bits are 0: Let f : f0;1gn ! f0;1g be a Boolean function.
    [Show full text]
  • Fundamental Algebraic Geometry
    http://dx.doi.org/10.1090/surv/123 hematical Surveys and onographs olume 123 Fundamental Algebraic Geometry Grothendieck's FGA Explained Barbara Fantechi Lothar Gottsche Luc lllusie Steven L. Kleiman Nitin Nitsure AngeloVistoli American Mathematical Society U^VDED^ EDITORIAL COMMITTEE Jerry L. Bona Peter S. Landweber Michael G. Eastwood Michael P. Loss J. T. Stafford, Chair 2000 Mathematics Subject Classification. Primary 14-01, 14C20, 13D10, 14D15, 14K30, 18F10, 18D30. For additional information and updates on this book, visit www.ams.org/bookpages/surv-123 Library of Congress Cataloging-in-Publication Data Fundamental algebraic geometry : Grothendieck's FGA explained / Barbara Fantechi p. cm. — (Mathematical surveys and monographs, ISSN 0076-5376 ; v. 123) Includes bibliographical references and index. ISBN 0-8218-3541-6 (pbk. : acid-free paper) ISBN 0-8218-4245-5 (soft cover : acid-free paper) 1. Geometry, Algebraic. 2. Grothendieck groups. 3. Grothendieck categories. I Barbara, 1966- II. Mathematical surveys and monographs ; no. 123. QA564.F86 2005 516.3'5—dc22 2005053614 Copying and reprinting. Individual readers of this publication, and nonprofit libraries acting for them, are permitted to make fair use of the material, such as to copy a chapter for use in teaching or research. Permission is granted to quote brief passages from this publication in reviews, provided the customary acknowledgment of the source is given. Republication, systematic copying, or multiple reproduction of any material in this publication is permitted only under license from the American Mathematical Society. Requests for such permission should be addressed to the Acquisitions Department, American Mathematical Society, 201 Charles Street, Providence, Rhode Island 02904-2294, USA.
    [Show full text]
  • IEEE TCDP Editorial Notes, June 2020 1. IEEE TCDP Awards
    IEEE TCDP Editorial Notes, June 2020 TCDP Editor: Palden Lama, University of Texas at San Antonio TCDP Chair: Xiaobo Zhou, University of Colorado, Colorado Springs Welcome to the June 2020 edition of the IEEE Distributed Processing Technical Committee’s Newsletter. This volume includes awards, interesting articles, job advertisements, upcoming conferences. The IEEE Computer Society Technical Committee on Distributed Processing (TCDP) is the ideal and appropriate organization to: • Foster and provide a fertile ground of our conferences. • Provide a forum for discussing all activities related to distributed processing. • Accept and publish through newsletters short articles from TCDP members. • Announce job advertisements. • Distribute to this community call for papers. • Announce upcoming conferences. 1. IEEE TCDP Awards 2020 IEEE TCDP Outstanding Technical Achievement Awards https://tc.computer.org/tcdp/awardrecipients/ The IEEE Computer Society Technical Committee on Distributed Processing (TCDP) has named Professor John Ousterhout from Stanford University and Professor Miron Livny from University of Wisconsin as the recipients of the 2020 Outstanding Technical Achievement Award. John Ousterhout is the Bosack Lerner Professor of Computer Science at Stanford University. He received a BS in Physics from Yale University and a PhD in Computer Science from Carnegie Mellon University. He was a Professor of Computer Science at U.C. Berkeley for 14 years, followed by 14 years in industry, where he founded two companies (Scriptics and Electric Cloud), before returning to academia at Stanford. He is a member of the National Academy of Engineering, a Fellow of the ACM, and has received numerous awards, including the ACM Software System Award, the ACM Grace Murray Hopper Award, the National Science Foundation Presidential Young Investigator Award, and the U.C.
    [Show full text]
  • Mutation COS 326 Speaker: Andrew Appel Princeton University
    Mutation COS 326 Speaker: Andrew Appel Princeton University slides copyright 2020 David Walker and Andrew Appel permission granted to reuse these slides for non-commercial educational purposes C structures are mutable, ML structures are immutable C program OCaml program let fst(x:int,y:int) = x struct foo {int x; int y} *p; let p: int*int = ... in int a,b,u; let a = fst p in a = p->x; let u = f p in u = f(p); let b = fst p in b = p->x; xxx (* does a==b? Yes! *) /* does a==b? maybe */ 2 Reasoning about Mutable State is Hard mutable set immutable set insert i s1; let s1 = insert i s0 in f x; f x; member i s1 member i s1 Is member i s1 == true? … – When s1 is mutable, one must look at f to determine if it modifies s1. – Worse, one must often solve the aliasing problem. – Worse, in a concurrent setting, one must look at every other function that any other thread may be executing to see if it modifies s1. 3 Thus far… We have considered the (almost) purely functional subset of OCaml. – We’ve had a few side effects: printing & raising exceptions. Two reasons for this emphasis: – Reasoning about functional code is easier. • Both formal reasoning – equationally, using the substitution model – and informal reasoning • Data structures are persistent. – They don’t change – we build new ones and let the garbage collector reclaim the unused old ones. • Hence, any invariant you prove true stays true. – e.g., 3 is a member of set S.
    [Show full text]
  • Wake up with CPS 006 Program Design and Methodology I Computer Science and Programming What Is Computer Science? Computer Scienc
    Computer Science and Programming z Computer Science is more than programming ¾ The discipline is called informatics in many countries ¾ Elements of both science and engineering • Scientists build to learn, engineers learn to build Wake up with CPS 006 – Fred Brooks Program Design and Methodology I ¾ Elements of mathematics, physics, cognitive science, music, art, and many other fields z Computer Science is a young discipline Jeff Forbes ¾ Fiftieth anniversary in 1997, but closer to forty years of research and development ¾ First graduate program at CMU (then Carnegie Tech) in http://www.cs.duke.edu/courses/cps006/current 1965 http://www.cs.duke.edu/csed/tapestry z To some programming is an art, to others a science, to others an engineering discipline A Computer Science Tapestry 1.1 A Computer Science Tapestry 1.2 What is Computer Science? Computer Science What is it that distinguishes it from the z Artificial Intelligence thinking machines separate subjects with which it is related? z Scientific Computing weather, cars, heart, modelling What is the linking thread which gathers these z Theoretical CS analyze algorithms, models disparate branches into a single discipline? My answer to these questions is simple --- it is z Computational Geometry theory of animation, 3-D models the art of programming a computer. It is the art z Architecture hardware-software interface of designing efficient and elegant methods of z Software Engineering engineering, science getting a computer to solve problems, z Operating Systems the soul of the machine theoretical or practical, small or large, simple z Graphics from Windows to Hollywood or complex. z Many other subdisciplines C.A.R.
    [Show full text]
  • Category Theory and Lambda Calculus
    Category Theory and Lambda Calculus Mario Román García Trabajo Fin de Grado Doble Grado en Ingeniería Informática y Matemáticas Tutores Pedro A. García-Sánchez Manuel Bullejos Lorenzo Facultad de Ciencias E.T.S. Ingenierías Informática y de Telecomunicación Granada, a 18 de junio de 2018 Contents 1 Lambda calculus 13 1.1 Untyped λ-calculus . 13 1.1.1 Untyped λ-calculus . 14 1.1.2 Free and bound variables, substitution . 14 1.1.3 Alpha equivalence . 16 1.1.4 Beta reduction . 16 1.1.5 Eta reduction . 17 1.1.6 Confluence . 17 1.1.7 The Church-Rosser theorem . 18 1.1.8 Normalization . 20 1.1.9 Standardization and evaluation strategies . 21 1.1.10 SKI combinators . 22 1.1.11 Turing completeness . 24 1.2 Simply typed λ-calculus . 24 1.2.1 Simple types . 25 1.2.2 Typing rules for simply typed λ-calculus . 25 1.2.3 Curry-style types . 26 1.2.4 Unification and type inference . 27 1.2.5 Subject reduction and normalization . 29 1.3 The Curry-Howard correspondence . 31 1.3.1 Extending the simply typed λ-calculus . 31 1.3.2 Natural deduction . 32 1.3.3 Propositions as types . 34 1.4 Other type systems . 35 1.4.1 λ-cube..................................... 35 2 Mikrokosmos 38 2.1 Implementation of λ-expressions . 38 2.1.1 The Haskell programming language . 38 2.1.2 De Bruijn indexes . 40 2.1.3 Substitution . 41 2.1.4 De Bruijn-terms and λ-terms . 42 2.1.5 Evaluation .
    [Show full text]