Notes in Computer Science 7470
نویسندگان
چکیده
This paper surveys three distinct approaches to bidirectional programming. The first approach, syntactic bidirectionalization, takes a program describing the forward transformation as input and calculates a well-behaved reverse transformation. The second approach, semantic bidirectionalization, is similar, but takes the forward transformation itself as input rather than a program describing it. It requires the transformation to be a polymorphic function and uses parametricity and free theorems in the proof of well-behavedness. The third approach, based on bidirectional combinators, focuses on the use of types to ensure wellbehavedness and special constructs for dealing with alignment problems. In presenting these approaches, we pay particular attention to use of complements, which are structures that represent the information discarded by the transformation in the forward direction.
منابع مشابه
Flexible Composite Galois Field GF((2^m)^2) Multiplier Designs
Composite Galois Field GF ((2)) multiplications denote the multiplication with extension field over the ground field GF (2), that are used in cryptography and error correcting codes. In this paper, composite versatile and vector GF ((2)) multipliers are proposed. The proposed versatile GF ((2)) multiplier design is used to perform the GF ((2)) multiplication, where 2 ≤ x ≤ m. The proposed vecto...
متن کاملTv and or Fm Transmitting Antennas Desien Using Computer Graphic System (RESEARCH NOTES)
The purpose of this paper is three fold. First, the major theoretical pattern relationships of TV and/or FM transmitting antennas are dealt with. Secend, the computer calculation method and designing of such patterns using the given relationships. And third, a method in which a computer graphic system can be used to design such antennas for a specific pattern is introduced and its results are p...
متن کاملSome notes concerning the convergence control parameter in homotopy analysis method
omotopy analysis method (HAM) is a promising method for handling func-tional equations. Recent publications proved the eectiveness of HAM in solvingwide variety of problems in dierent elds. HAM has a unique property whichmakes it superior to other analytic methods, this property is its ability to con-trol the convergence region of the solution series. In this work, we claried theadvantages and ...
متن کاملTransient numerical simulation of a thermoelectrical problem in cylindrical induction heating furnaces
This paper concerns the mathematical modelling and numerical solution of thermoelectrical phenomena taking place in an axisymmetric induction heating furnace. We formulate the problem in a two-dimensional domain and propose a finite element method and an iterative algorithm for its numerical solution. We also provide a family of one-dimensional analytical solutions which are used to test the tw...
متن کاملA High Speed KECCAK Coprocessor for Partitioned NSP Architecture on FPGA Platform
The messages in the latest security protocols such as IPSec, TLS and SSL must be handled by highspeed crypto systems. Current computationally extensive cryptographic implementations on di erent platforms such as software, Application Speci c Integrated Circuit (ASIC) and Field Programmable Gate Array (FPGA) without adequate optimization achieve lesser throughput than should be possible. In the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012