A syntactic theory of sequential control

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Relation between the λμ-Calculus and the Syntactic Theory of Sequential Control

We construct a translation of first order λμ-calculus [15] into a subtheory of Felleisen’s λc-calculus [5, 6]. This translation preserves typing and reduction. Then, by constructing the inverse translation, we show that the two calculi are actually isomorphic.

متن کامل

Gender-Based investigation of the Syntactic Development of Iranian EFL Learners: A Focus on Processabilty Theory

Pienemann (1998, 2015) put forward Processability Theory to enlighten why language learners follow definite developmental paths. The aim of the present study was to run a comparative investigation into the difficulty order of different grammatical structures for male and female Iranian EFL learners predicted by Processability Theory. 185 Iranian university students took part in this study. They...

متن کامل

A Syntactic Theory of Dynamic

Dynamic binding, which has always been associated with Lisp, is still semantically obscure to many. Although largely replaced by lexical scoping, not only does dynamic binding remain an interesting and expressive programming technique in specialised circumstances, but also it is a key notion in semantics. This paper presents a syntactic theory that enables the programmer to perform equational r...

متن کامل

Syntactic Theory A Formal Introduction

A. Sag and Thomas Wasow, published by CSLI Publications. ©2001 by CSLI Publications. All rights reserved. This text may be used and shared in accordance with the fair-use provisions of U.S. copyright law, and it may be archived and redistributed in electronic form, provided that this entire notice, including copyright information, is carried and provided that CSLI Publications is notified and n...

متن کامل

Syntactic Sequential Composition of Security Protocols

Determining if two protocols can be securely composed requires analyzing not only their additive properties but also their destructive properties. In this paper we construct an enriched protocol model for analyzing instancerelated properties and a canonical model for analyzing message structurerelated properties. The protocol model provides for each participant the preconditions needed to run t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 1987

ISSN: 0304-3975

DOI: 10.1016/0304-3975(87)90109-5