Graphical Presentations of Symmetric Monoidal
نویسنده
چکیده
We define a notion of symmetric monoidal closed (smc) theory, consisting of a smc signature augmented with equations, and describe the classifying categories of such theories in terms of proof nets.
منابع مشابه
Graphical Presentations of Symmetric Monoidal Closed Theories
We define a notion of symmetric monoidal closed (smc) theory, consisting of a smc signature augmented with equations, and describe the classifying categories of such theories in terms of proof nets.
متن کاملThe symmetric monoidal closed category of cpo $M$-sets
In this paper, we show that the category of directed complete posets with bottom elements (cpos) endowed with an action of a monoid $M$ on them forms a monoidal category. It is also proved that this category is symmetric closed.
متن کاملCoherence for braided and symmetric pseudomonoids
Presentations for unbraided, braided and symmetric pseudomonoids are defined. Biequivalences characterising the semistrict bicategories generated by these presentations are proven. It is shown that these biequivalences categorify results in the theory of monoids and commutative monoids, and are generalisations of standard coherence theorems for braided and symmetric monoidal categories.
متن کاملThe graphical calculus for ribbon categories: Algebras, modules, Nakayama automorphisms
Abstract The graphical description of morphisms in rigid monoidal categories, in particular in ribbon categories, is summarized. It is illustrated with various examples of algebraic structures in such categories, like algebras, (weak) bi-algebras, Frobenius algebras, and modules and bimodules. Nakayama automorphisms of Frobenius algebras are introduced; they are inner iff the algebra is symmetric.
متن کاملGraphical Calculus for Quantum Key Distribution (Extended Abstract)
Controlled complementary measurements are key to quantum key distribution protocols, among many other things. We axiomatize controlled complementary measurements within symmetric monoidal categories, which provides them with a corresponding graphical calculus. We study the BB84 and Ekert91 protocols within this calculus, including the case where there is an interceptresend attack.
متن کامل