Coercion Approach to the Shimming Problem in Scientific Workflows

Total Page:16

File Type:pdf, Size:1020Kb

Coercion Approach to the Shimming Problem in Scientific Workflows Coercion Approach to the Shimming Problem in Scientific Workflows Andrey Kashlev, Shiyong Lu Artem Chebotko Department of Computer Science Department of Computer Science Wayne State University University of Texas – Pan American Abstract—When designing scientific workflows, users often write shimming code [10-11, 18]. We believe these face the so-called shimming problem when connecting two requirements are difficult and make workflow design related but incompatible components. The problem is counterproductive for non-technical users. addressed by inserting a special kind of adaptors, called shims, Second, current approaches produce cluttered workflows that perform appropriate data transformations to resolve data with many visible shims that distract users from main type inconsistencies. However, existing shimming techniques workflow components that perform useful work. provide limited automation and burden users with having to Furthermore, recent workflow studies [3, 20] show that the define ontological mappings, generate data transformations, percentage of shim components in workflows registered in and even manually write shimming code. In addition, these myExperiment portal (www.myexperiment.org) has grown approaches insert many visible shims that clutter workflow from 30% in 2009 [20] to 38% in 2012 [3]. These numbers design and distract user’s attention from functional components of the workflow. To address these issues, we 1) indicate that such explicit shimming tends to make reduce the shimming problem to a runtime coercion problem workflows even messier overtime, which further diminishes in the theory of type systems, 2) propose a scientific workflow the usefulness of these techniques. model and define the notion of well-typed workflows, 3) Third, many shimming techniques only apply under a develop three algorithms to typecheck workflows by first particular set of circumstances that are hard to guarantee or translating them into equivalent lambda expressions, 4) design even predict. Some approaches (e.g., [9-12]) apply only two functions that together insert “invisible shims”, or runtime when all the right shims are supplied by web service coercions into workflows, thereby solving the shimming providers and are properly annotated beforehand, and/or problem for any well-typed workflow, 5) implement our when required shims can be generated by automated agents automated shimming technique, including all the proposed (e.g., XQuery–based shims [12]), which cannot be algorithms, lambda calculus, type system, and translation guaranteed for any practical class of workflows. Such functions in our VIEW system and present a case study to uncertainty makes these techniques unreliable in the eyes of validate the proposed approach. end users (domain scientists) who need assurance that their workflows will run. Keywords-shim; shimming problem; scientific workflows; Finally, these efforts focus on shims for scientific data of a particular type, such as XML [10-12] or relational schemas I. INTRODUCTION [13], and cannot be generalized to handle all structured data Scientific workflows are becoming increasingly types, let alone primitive types such as String or Double. important to integrate, structure, and orchestrate a variety of To address these issues, we heterogeneous services and applications into complex 1. reduce the shimming problem to a runtime coercion computational processes to enable and facilitate scientific problem in the theory of type systems, discovery. Oftentimes, composing autonomous third-party 2. propose a scientific workflow model and define the services and applications into workflows requires using notion of well-typed workflows, intermediate components, called shims, to mediate syntactic 3. develop three algorithms to typecheck workflows by and semantic incompatibilities between different translating them into equivalent lambda expressions, heterogeneous components. 4. design two functions that together insert “invisible shims” (coercions) into workflows, thereby solving the Consider, a workflow Wa in Fig. 1 comprised of two web services – Not and Increment. Because the output of Not is a shimming problem for any well-typed workflow, boolean value (true or false) while Increment is designed to 5. implement our automated shimming technique and process integer arguments, to execute the workflow we need present a case study to validate the proposed approach. to find and insert a shim that will resolve this To our best knowledge, this work is the first one to incompatibility. Determining where the shim is needed, reduce the shimming problem to the coercion problem and to finding appropriate shim and inserting it is known as the propose a fully automated solution with no human shimming problem, whose significance has been widely involvement. Moreover, our technique does not insert shims recognized by the scientific workflow community [3-8]. in the workflow design, but instead performs implicit Existing approaches to the shimming problem have the shimming by dynamically injecting coercions during following limitations. workflow execution. While this paper focuses on primitive First, existing techniques are not automated and burden types, such as Int and Float, our general approach equally users by requiring them to generate transformation scripts, applies to structured data types as we explain in Section 6. define mappings to and from domain ontologies, and even Fig 1. Examples of scientific workflows (Wa, Wb, …, Wg). DCin {(ipi, (Wj, ipk)) | ipi IP, Wj W*, ipk Wj.IP} II. SCIENTIFIC WORKFLOW MODEL That is, each pair in DCin represents a data channel Scientific workflows consist of one or more connecting input port ipi IP to an input port ipk of some computational components connected to each other and component Wj W*. possibly to some input data products. Each of these 7. DCout : W* W*.OP → OP is an inverse-functional components can be viewed as a black box with well defined one-to-many mapping. DCout is a set of ordered pairs: input and output ports. Every component is itself another DCout {((Wi, opj), opk) | Wi W*, opj Wi.OP, opk workflow, either primitive or composite. Primitive workflows OP}. That is, each pair in DCout represents a data channel are bound to executable components, such as web services, connecting output port opj of some component Wi W* to scripts, or high performance computing (HPC) services and an output port op OP. can be viewed as atomic entities. Composite workflows k 8. DCmid : W* W*.OP → W* W*.IP is an inverse- consist of multiple building blocks connected to one another functional one-to-many mapping. DC is a set of ordered via data channels. Each of these building blocks can be mid pairs: DC {((W , op ), (W , ip )) | W , W W*, op either a workflow or a data product. In the following we mid i j k n i k j formalize the scientific workflow model used in this paper. Wi.OP, ipn Wk.IP}. That is, each pair in DCmid represents a Definition 2.1 (Port). A port is a pair (id, type) data channel connecting an output port opj of some consisting of a unique identifier and a data type associated component Wi W* with an input port ipn of some other component Wk W*. with this port. We denote input and output ports as ipi:Ti and 9. DC : DP → W* W*.IP is an inverse-functional opj:Tj, respectively, where ipi and opj are identifiers, and Ti idp one-to-many mapping. DC is a set of ordered pairs: and Tj are port types. idp Definition 2.2 (Data Product). A data product is a triple DCidp {(dpi, (Wj, ipk)) | dpi DP, Wj W*, ipk Wj (id, value, type) consisting of a unique identifier, a value and .IP}. That is, each pair in DCidp represents a data channel that a type associated with this data product. We denote each data connects a data product dpi DP to the input port ipk of product as dpi:Ti, where dpi is the identifier, and Ti is the type some component Wj W*. of the data product. Fig. 1 shows seven workflows that we will reference in Given a workflow W, and the set of its constituent this paper as Wa, Wb, Wc, Wd, We, Wf, and Wg respectively. workflows W*, we use W.pj to denote port pj of W (be it These seven workflows use other workflows as their input or output port) and W.W*.IP (W.W*.OP) to represent building blocks. Such constituent workflows are shown as the union of sets of input (output) ports of all constituent blue boxes with their ids written inside each box. Ports workflows of W. Whenever it is clear from the context we appear as red pins pointing right (input port) or left (output omit the leading “W.”. Formally, port). Finally, data products are visualized as yellow boxes W*.IP = {ip | ip W .IP, W W*} with their values placed inside (e.g., “true” in Wa in Fig. 1). i i j j Because the order of input arguments of a workflow W*.OP = {opk | opk Wl.OP, Wl W*} matters (e.g., Divide workflow in Wf in Fig. 1), we use Definition 2.3 (Scientific workflow). A scientific ordered set IP to store a list of input ports. We use the term workflow W is a 9-tuple (id, IP, OP, W*, DP, DCin, DCout, data channel to refer to any entity from the set {DCin DCmid, DCidp), where DCmid DCout DCidp}. 1. id is a unique identifier, As we show in later sections, a workflow is represented 2. IP = {ip0, ip1, …, ipn} is an ordered set of input ports, as a lambda expression. To simplify lambda expressions, we 3. OP = {op0, op1,…, opm} is ordered set of output ports, focus on workflows with a single output port. We are 4. W* = {W0, W1, …, Wp} is a set of constituent currently extending our approach to allow set OP with a workflows used in W. Each Wi W* is another 9-tuple, cardinality greater than one. Our definition requires that 5.
Recommended publications
  • Hegemony, Coercion, and Their Teeth-Gritting Harmony: a Commentary on Power, Culture, and Sexuality in Franco's Spain
    University of Michigan Journal of Law Reform Volume 33 2000 Hegemony, Coercion, and their Teeth-Gritting Harmony: A Commentary on Power, Culture, and Sexuality in Franco's Spain Ratna Kapur Centre for Feminist Legal Research Tayyab Mahmud Cleveland-Marshall College of Law Follow this and additional works at: https://repository.law.umich.edu/mjlr Part of the Civil Rights and Discrimination Commons, Comparative and Foreign Law Commons, Legal History Commons, and the Sexuality and the Law Commons Recommended Citation Ratna Kapur & Tayyab Mahmud, Hegemony, Coercion, and their Teeth-Gritting Harmony: A Commentary on Power, Culture, and Sexuality in Franco's Spain, 33 U. MICH. J. L. REFORM 411 (2000). Available at: https://repository.law.umich.edu/mjlr/vol33/iss3/9 This Response or Comment is brought to you for free and open access by the University of Michigan Journal of Law Reform at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in University of Michigan Journal of Law Reform by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. SUMMER 2000] Hegemony, Coercion SPRING 2000] Hegemony, Coercion 411 HEGEMONY, COERCION, AND THEIR TEETH-GRITTING HARMONY: A COMMENTARY ON POWER, CULTURE, AND SEXUALITY IN FRANCO'S SPAIN Ratna Kapur* Tayyab Mahmud** Professor Gema P~rez-Sdinchez's article, Franco's Spain, Queer Na- tion?' focuses on the last years of Francisco Franco's fascist dictatorship and the early years of the young Spanish democracy, roughly from the late 1960's to the early 1980's.' The centerpiece of her article looks at how, through law, Franco's regime sought to define and contain what it considered dangerous social behavior, particularly homosexuality.
    [Show full text]
  • Coercion and Choice Under the Establishment Clause
    Coercion and Choice Under the Establishment Clause Cynthia V. Ward* In recent Establishment Clause cases the Supreme Court has found nondenominational, state-sponsored prayers unconstitutionally “coercive” — although attendance at the events featuring the prayer was not required by the state; religious dissenters were free to choose not to say the challenged prayers; and dissenters who so chose, or who chose not to attend the events, suffered no state-enforced sanction. Part I of this Article lays out the historical background that gave rise to the coercion test, traces the development of that test in the Court’s case law, and isolates the core elements in the vision of coercion that animates the test. Part II proposes a new reading of coercion under the Establishment Clause that keeps faith with the conceptual boundaries of coercion while also responding to the particular constitutional concerns that gave rise to the coercion test and to the particular holdings in the Supreme Court cases that have deployed it. Finally, Part III suggests that the coercion test, as reconstructed, could be the basis for restoring internal coherence and external predictability to constitutional analysis under the Establishment Clause. TABLE OF CONTENTS INTRODUCTION.............................................................................................. 1623 I. COERCION IN ESTABLISHMENT CLAUSE JURISPRUDENCE................ 1627 A. The Lemon and Endorsement Tests.......................................... 1627 B. The Arrival of the Coercion Test ................................................ 1630 1. Allegheny, Lee, and Santa Fe.............................................. 1630 2. Coercion and the Pledge of Allegiance .......................... 1635 C. The Supreme Court’s Conception of Coercion: Four Burning Questions..................................................................... 1637 * Professor of Law, College of William and Mary. Many thanks to the William and Mary Law School for research support.
    [Show full text]
  • Cognitive Linguistics 2021; 32(2): 287–318
    Cognitive Linguistics 2021; 32(2): 287–318 Lucia Busso*, Florent Perek and Alessandro Lenci Constructional associations trump lexical associations in processing valency coercion https://doi.org/10.1515/cog-2020-0050 Received May 14, 2020; accepted February 6, 2021; published online March 12, 2021 Abstract: The paper investigates the interaction of lexical and constructional meaning in valency coercion processing, and the effect of (in)compatibility be- tween verb and construction for its successful resolution (Perek, Florent & Martin Hilpert. 2014. Constructional tolerance: Cross-linguistic differences in the acceptability of non-conventional uses of constructions. Constructions and Frames 6(2). 266–304; Yoon, Soyeon. 2019. Coercion and language change: A usage-based approach. Linguistic Research 36(1). 111–139). We present an online experiment on valency coercion (the first one on Italian), by means of a semantic priming protocol inspired by Johnson, Matt A. & Adele E. Goldberg. 2013. Evidence for automatic accessing of constructional meaning: Jabberwocky sentences prime associated verbs. Language & Cognitive Processes 28(10). 1439–1452. We test priming effects with a lexical decision task which presents different target verbs preceded by coercion instances of four Italian argument structure constructions, which serve as primes. Three types of verbs serve as target: lexical associate (LA), construction associate (CA), and unrelated (U) verbs. LAs are semantically similar to the main verb of the prime sentence, whereas CAs are prototypical verbs associated to the prime construction. U verbs serve as a mean of comparison for the two categories of interest. Results confirm that processing of valency coercion requires an integra- tion of both lexical and constructional semantics.
    [Show full text]
  • Entity and Event Coercion in a Symbolic Theory of Syntax Laura A
    Entity and Event Coercion in a Symbolic Theory of Syntax Laura A. Michaelis University of Colorado at Boulder 1. Introduction Where does sentence meaning come from? Leaving aside the inference strategies targeted by the Gricean paradigm, formal models of the syntax-semantics interface have supplied a single answer to this question: the words of the sentence and the frames which those words project. Since word combination in formal theory is inextricably tied to phrase building, the drivers of sentence semantics are not simply words but, more particularly, the heads of syntactic projections. The assumption that the licensing of sisterhood relations is the unique privilege of lexical heads is woven into the formal conventions of formal theory, e.g., phrase-structure rules like those in (1), in which the ‘optionality’ of complements, specifiers and adjuncts is defined over a set of lexical classes distinguished by their projection behaviors: (1) a. VP → V (NP) (PP) b. NP → (determiner) N Models of sentence meaning based on lexical projection provide a straightforward picture of the syntax-semantics interface: while words determine WHAT a sentence means, rules of morphosyntactic combination determine HOW a sentence means. While rules of syntactic combination assemble heads and their dependent elements into phrases, they play no role in either the licensing or construal of arguments. It is apparent, however, that the syntax-semantics mapping is less tidy than the foregoing statement would imply. In particular, the identification of licensors with syntactic heads cannot always be maintained. This is shown by the following examples, in which the projection properties of the boldfaced items are distorted in various ways.
    [Show full text]
  • Pre-Emption and Coercion – a Case Study of Syrian Disarmament Discourse
    97 PRE-EMPTION AND COERCION – A CASE STUDY OF SYRIAN DISARMAMENT DISCOURSE Waseem Iftikhar Janjua, Ahmed Saeed Minhas and Farhat Konain Shujahi* Abstract The notions of pre-emption and coercions have been part of the offensive security policies around the world. These tools have been continuously applied in international relations by the relatively powerful against the weak during and after the Cold War, more specifically in the domain of Weapons of Mass Destruction. The manifestation of these concepts played a more constructive role in preventing an all-out war among the belligerents. However, the application of these tools against the same country has been comparatively an infrequent phenomenon which makes the Syrian case unique and a valid area of inquiry. Examining the Syrian aspirations of achieving nuclear weapons and the use of chemical weapons against civilians, this paper finds an interesting concord between the applicability of both tools. The research further concludes that pre-emption could only achieve partial disarmament leaving chemical weapons and facilities intact which had to be subsequently removed through coercion. Finally, the paper emphasizes the need for diplomacy and persuasion before pre-emption or coercion be employed. Keywords: Syria, Disarmament, Pre-emption, Coercion, Weapons of Mass Destruction. Introduction or a long time, the greatest hurdle in declaring the Middle East as a Weapons of F Mass Destruction Free Zone (WMDFZ) has been the selective implementation of disarmament regimes and regional realpolitik. While Israeli nuclear program is a taboo and remains completely defiant to any inspection or admission or denial, the US and the West are pushing other states to abandon their nuclear as well as conventional military aspirations especially if these programs are for military purposes.
    [Show full text]
  • When and Why Can 1St and 2Nd Person Pronouns Be Bound Variables? the Problem with 1St and 2Nd Person Pronouns
    When and why can 1st and 2nd person pronouns be bound variables? The problem with 1st and 2nd person pronouns. In some contexts (call them context A), English 1st and 2nd person pronouns can be used as bound variables (Heim 1991, Kratzer 1998) as in (1). (1) Context A: 1st person (data based on Rullmann 2004) a. Only I got a question that I understood. = (i) !x [x got a question that x understood] = (ii) !x [x got a question that I understood] b. Every guy that I’ve ever dated has wanted us to get married. = (i) "x, guy(x) & dated(I, x) [x wants x & I to get married] = (ii) "x, guy(x) & dated(I, x) [x wants us to get married] Rullmann (2004) argues that such data are problematic for Déchaine & Wiltschko’s (2002) analysis (henceforth DW), where it is claimed that English 1st/2nd person pronouns are DPs. According to the DW analysis, 1st/2nd person pronouns have the status of definite DPs (i.e., definite descriptions) and consequently are predicted not to be construable as bound variables. DW support their claim with the observation that in some contexts of VP-ellipsis (call them context B), 1st/2nd person pronouns cannot be used as bound variables, as in (2). (2) Context B: 1st person (data based on Déchaine & Wiltschko 2002) I know that John saw me, and Mary does too. # (i) ‘I know that John saw me, and Mary knows that John saw her. !x [x knows that John saw x] & !y [y knows that John saw y] = (ii) ‘I know that John saw me, and Mary knows that John saw me.’ !x [x knows that John saw me] & !y [y knows that John saw me] As we will show, the (im)possibility of a bound variable reading with 1st and 2nd person is conditioned by a number of factors.
    [Show full text]
  • RICE UNIVERSITY Constructions, Semantic Compatibility, and Coercion
    RICE UNIVERSITY Constructions, Semantic Compatibility, and Coercion: An Empirical Usage-based Approach by Soyeon Yoon A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE Doctor of Philosophy APPROVED, THESIS COMMITTEE __________________________________ Suzanne Kemmer, Associate Professor Linguistics Director, Cognitive Sciences __________________________________ Michel Achard, Associate Professor Linguistics __________________________________ Nicoletta Orlandi, Assistant Professor Philosophy __________________________________ Amy Franklin, Assistant Professor National Center for Cognitive Informatics and Decision Making, School of Biomedical Informatics, University of Texas Health Science Center Houston HOUSTON, TEXAS ABSTRACT Constructions, Semantic Compatibility, and Coercion: An Empirical Usage-based Approach by Soyeon Yoon This study investigates the nature of semantic compatibility between constructions and lexical items that occur in them in relation with language use, and the related concept, coercion, based on a usage-based approach to language, in which linguistic knowledge (grammar) is grounded in language use. This study shows that semantic compatibility between linguistic elements is a gradient phenomenon, and that speakers’ knowledge about the degree of semantic compatibility is intimately correlated with language use. To show this, I investigate two constructions of English: the sentential complement construction and the ditransitive construction. I observe speakers’ knowledge of the semantic compatibility
    [Show full text]
  • Coercion on the Edge: a Purely Linguistic Phenomenon Or an Integrated Cognitive Process?
    UNIVERSIDAD DE CHILE FACULTAD DE FILOSOFÍA Y HUMANIDADES ESCUELA DE POSTGRADO DEPARTAMENTO DE LINGÜÍSTICA Coercion on the edge: A purely linguistic phenomenon or an integrated cognitive process? Tesis para optar al grado de Magíster en Estudios Cognitivos Por: Catalina Reyes Ramírez Profesor Patrocinante: Guillermo Soto Vergara Santiago, Chile 2012 Proyecto FONDECYT: 1110525 ACKNOWLEDGMENTS To all the people who supported me during the development of the present work. Thanks to my family who encouraged me all along the way: to my mother whose caring and understanding was much appreciated, my late grandmother who would have liked to see this finished and, especially to my grandfather who helped me with the elaboration of the graphics presented here. Equally important was the help of my friends Erika Abarca, Javiera Adaros and Carmen Nabalón and Fran Morales, who did not only support me but also helped me revising the wording and redaction of the present work, thus having an irreplaceable value to this thesis. Finally, I want to thank Manuela Abud and Gonzalo Diaz who encouraged me and helped me to get my ideas more clearly explained in this work. ABSTRACT When discussing the lexical aspect of verbs, it is noticeable that anomalous sentences can be found in normal speech. These sentences are awkward in terms of their compatibility with the rest of that sentence‟s components. Given that speakers seem to use these awkward sentences fairly usually, there must be a process solving the incompatibility; that process has been called coercion. At first, academics seemed to agree on it being a semantic process; until alternative views began claiming that pragmatics may have an important role in such process as well.
    [Show full text]
  • Proceedings and Addresses of the American Philosophical Association
    January 2008 Volume 81, Issue 3 Proceedings and Addresses of The American Philosophical Association apa The AmericAn PhilosoPhicAl Association Pacific Division Program University of Delaware Newark, DE 19716 www.apaonline.org The American Philosophical Association Pacific Division Eighty-Second Annual Meeting Hilton Pasadena Pasadena, CA March 18 - 23, 2008 Proceedings and Addresses of The American Philosophical Association Proceedings and Addresses of the American Philosophical Association (ISSN 0065-972X) is published five times each year and is distributed to members of the APA as a benefit of membership and to libraries, departments, and institutions for $75 per year. It is published by The American Philosophical Association, 31 Amstel Ave., University of Delaware, Newark, DE 19716. Periodicals Postage Paid at Newark, DE and additional mailing offices. POSTMASTER: Send address changes to Proceedings and Addresses, The American Philosophical Association, University of Delaware, Newark, DE 19716. Editor: David E. Schrader Phone: (302) 831-1112 Publications Coordinator: Erin Shepherd Fax: (302) 831-8690 Associate Editor: Anita Silvers Web: www.apaonline.org Meeting Coordinator: Linda Smallbrook Proceedings and Addresses of The American Philosophical Association, the major publication of The American Philosophical Association, is published five times each academic year in the months of September, November, January, February, and May. Each annual volume contains the programs for the meetings of the three Divisions; the membership list; Presidential Addresses; news of the Association, its Divisions and Committees, and announcements of interest to philosophers. Other items of interest to the community of philosophers may be included by decision of the Editor or the APA Board of Officers. Microfilm copies are available through National Archive Publishing Company, Periodicals/Acquisitions Dept., P.O.
    [Show full text]
  • The Power to Coerce: Countering Adversaries Without Going to War
    ARROYO CENTER The Power to Coerce Countering Adversaries Without Going to War David C. Gompert, Hans Binnendijk Prepared for the United States Army Approved for public release; distribution unlimited For more information on this publication, visit www.rand.org/t/rr1000 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface The United States may find it increasingly hard, costly, and risky to use military force to counter the many and sundry threats to international security that will appear in the years to come. While there may be no alternative to military force in some circumstances, U.S.
    [Show full text]
  • Handout on Lexical Approaches to Argument Structure
    7. The lexical-constructional debate In lexical (or lexicalist) approaches: • Words are phonological forms paired with valence structures (also called predicate argument structures). • Lexical rules grammatically encode the systematic relations between cognate forms and diathesis alternations. • The syntactic combinatorial rules are usually assumed to be very general and few in number. • Predicate argument structure is an autonomous, reified grammatical representation. In phrasal (or constructional) approaches: • Lexical rules are avoided. • different morphological cognates and diathesis alternants are captured by plugging a single word (or root) into different phrasal constructions. • The construction carries a meaning that combines with the word’s meaning. • In some versions the constructions are phrasal structures, while in others, they are non- phrasal grammatical constructs called argument structure constructions that resemble the lexicalist’s predicate argument structure, minus the specific verb or other predicator • A phrasal construction or argument structure construction is ‘grounded’ in actual sentences. • Some of the phrasal approaches would replace standard phrase structure rules or syntactic valence frames with meaningful constructions. • Sometimes affiliated with usage-based theories of human language that deny the existence, or downplay the importance, of ‘meaningless’ algebraic syntactic rules such as phrase structure rules defined purely on syntactic categories like V and NP. SLIDES: Day1-Part1-LFG-intro-slides.pdf 7.1. The pendulum of lexical and phrasal approaches 7.1.1. GPSG as construction grammar See Day5-Part1-HPSG-intro-slides.pdf. 7.1.2. Coercion Coercion is claimed to show the usefulness of phrasal constructions. (1) und ihr … träumt ihnen ein Tor. and you.PL dream them.DAT a.ACC gate ‘and you dream a gate for them’ (from Anatol Stefanowitsch) The word träumen ‘dream’ is normally intransitive, but in the fantasy context of this quote it is forced into the ditransitive construction and therefore gets a certain meaning.
    [Show full text]
  • Trust in the Λ-Calculus
    J. Functional Programming, 3(2):75-85, 1997. c Cambridge University Press 1 Trust in the λ-calculus P. ØRBÆK AND J. PALSBERG BRICS, Centre of the Danish National Research Foundation, Dept. of Computer Science, University of Aarhus, Ny Munkegade bld 540, 8000 Aarhus C, Denmark Abstract This paper introduces trust analysis for higher-order languages. Trust analysis encourages the programmer to make explicit the trustworthiness of data, and in return it can guarantee that no mistakes with respect to trust will be made at run-time. We present a confluent λ-calculus with explicit trust operations, and we equip it with a trust-type system which has the subject reduction property. Trust information is presented as annotations of the underlying Curry types, and type inference is computable in O(n3) time. 1 Introduction As computers are increasingly being used to handle important transactions (such as interchange of legal documents) in an open environment where also information that does not pertain directly to business is transferred between the same machines (for example e-mail), the issue of separating these two kinds of information flow has become more and more important. The issue is usually attacked using encryption and digital signatures for the important information flows between machines, but what good does this do if somewhere inside a program, there is a data path between reading a message and some dangerous operation such that the dangerous operation depends on the contents of a message whose signature is not checked? An example where it is important to perform validity checks on all data paths from input to output, is in an HTTP (HyperText Transfer Protocol, the protocol used on the world-wide web) server that allows a web-browser to start a separate program (a so-called CGI script, for Common Gateway Interface) on the server machine by requesting a specific URL.
    [Show full text]