A Syntactic Approach to Structure GenerativityFranz -
نویسنده
چکیده
Advanced module systems like Standard ML's 13, 17] support structure generativity. Structure generativity denotes the mechanism that parameterized modules (functors) generate a "new" module instance (structure) for every application to a suitable argument. This operational behaviour is essentially a side eeect. Since interfaces in general depend on module instances, module instances are computationally characterised as "stamps" for the purpose of interface-checking. This paper presents a typed module calculus that makes instances of modules syntactically apparent in expressions and interfaces. The module calculus has a simple rewriting semantics without side eeects. Interface-checking is based on a type system with dependent functions, strong sums and additionally a non-standard variant of weak sums. A module system derived from the module calculus forms a separate layer above some typed core language. As a demonstrating example, we sketch M/SML, a module language on top of core SML.
منابع مشابه
A Syntactic Approach to Structure GenerativityFranz - Josef Grosch Abteilung SoftwaretechnologieTechnische
Advanced module systems like Standard ML's 13, 17] support structure generativity. Structure generativity denotes the mechanism that parameterized modules (functors) generate a "new" module instance (structure) for every application to a suitable argument. This operational behaviour is essentially a side eeect. Since interfaces in general depend on module instances, module instances are computa...
متن کاملA syntactic-semantic analysis of \"منصوب به نزع خافض\"based on the Holy Quran
One of important issues in the field of implication and aggression is "منصوب به نزع خافض". It is an idiom related to مفعول به "”. By referring to its definition, a syntactic-semantic analysis will be done in this paper. It tries to indicate what is the relationship between word and meaning and to what extent Arabic syntax focu...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملThe Impact of Summary Writing with Structure Guidelines on EFL College Students’ Rhetorical Organization: Integrating Genre-Based and Process Approaches
This study aimed at investigating the impact of writing on Iranian EFL college students’ rhetorical organization. Thirty Iranian female undergraduate students majoring in English at Al-zahra University participated in the current study. The writing instructions included two stages, each lasting for four weeks. The participants were assigned to a control group and an experimental group according...
متن کاملComparison of the Speech Syntactic Features between Hearing-Impaired and Normal Hearing Children
Introduction: The present study seeks to describe and analyze the syntactic features of children with severely hearing loss who had access to the hearing aids compared with children with normal hearing, assigning them to the same separate gender classes. Materials and Methods: In the present study, eight children with severe hearing impairment who used a hearing aid and eight hearing children...
متن کامل