Transforming Context - Sensitive RewriteSystemsJ
نویسنده
چکیده
We present two new transformation techniques for proving termination of context-sensitive rewriting. Our rst method is simple, sound, and more powerful than previously suggested transformations. However, it is not complete, i.e., there are terminating context-sensitive rewrite systems that are transformed into non-terminating term rewrite systems. The second method that we present in this paper is both sound and complete. This latter result can be interpreted as stating that from a termination perspective there is no reason to study context-sensitive rewriting.
منابع مشابه
Context-Sensitive Term-Rewriting
At first an introduction to context-sensitive rewrite-systems is given. The main part of this paper deals with the topic how one can prove termination of contextsensitive rewrite-systems. This can be done either by either transforming them into non context-sensitive ones or by extending the existing techniques which are used to prove termination of classic rewrite systems. This is described in ...
متن کاملTransforming Context-Sensitive Rewrite Systems
We present two new transformation techniques for proving termination of context-sensitive rewriting. Our rst method is simple, sound, and more powerful than previously suggested transformations. However, it is not complete, i.e., there are terminating context-sensitive rewrite systems that are transformed into non-terminating term rewrite systems. The second method that we present in this paper...
متن کاملTXL: a rapid prototyping system for programming language dialects
This paper describes a rapid prototyping system for extensions to an existing programming language. Such extensions might include new language features or might introduce notation specific to a particular problem domain. The system consists of a dialect description language used to specify the syntax and semantics of extensions, and a context sensitive syntactic transducer that automatically im...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملAugmented Regular Expressions : a Formalism to Describe , Recognize and Learna Class of Context - Sensitive Languages
In order to extend the potential of application of the syntactic approach to pattern recognition, the eecient use of models capable of describing context-sensitive structural relationships is needed. Moreover, the ability to learn such models from examples is interesting to automate as much as possible the development of applications. In this paper, a new formalism that permits to describe a no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999