SlideShare a Scribd company logo
Mendler-style
Recursion Schemes for
Mixed-Variant Datatypes
Ki Yung Ahn Tim Sheard Marcelo P. Fiore
kya@cs.pdx.edu sheard@cs.pdx.edu Marcelo.Fiore@cl.cam.ac.uk
TYPES 2013
Outline
Mendler-style Recursion Schemes
mit (iteration)
msfit (iteration with syntactic Inverse)
Untyped HOAS (Regular Mixed-Variant Datatype)
Formatting Untyped HOAS (using msfit at kind *)
Simply-Typed HOAS (Indexed Mixed-Variant Datatype)
Formatting Untyped HOAS (using msfit at kind * → *)
The Nax language
Need for yet another Mendler-style Recursion Scheme
already inconsistent as a logic (via Curry--Howard correspondence)
without even having to introduce any term-level recursion
since we can already define general recursion using this
(iso-) Recursive Types
in Functional Languages
Having both unrestricted formation
and unrestricted elimination
of μ leads to inconsistency
data T a r = C (r → a)
w : μ (T a) → a -- encoding of (λx. x x) in the untyped λ-calc
w = λv. case (unIn v) of (C x) → f (C x)
-- w (C w) amounts to a well-known diverging term in λ-calculus
fix : (a → a) → a -- the Y combinator (λf.(λx.f(xx))(λx.f(xx))))
fix = λf. (λx. f (w x)) (In (C (λx. f (w x))))
To recover consistency, one could
either restrict formation (conventional approach)
or restrict elimination (Mendler-style approach)
Conventional Iteration over
Recursive Types
allow formation of only
positive recursive types
(i.e., when F has a map)
freely eliminate (i.e. use unIn) recursive values
Mendler-style Iteration over
Recursive Types
elimination is possible
only through mit
freely form ANY recursive type!!
note, no (μ-elim) rule
Mendler-style Iteration
-- Mu at different kinds (there are many more, one at each kind)
data Mu0 (f :: * → *) = In0 (f (Mu0 f ))
data Mu1 (f :: (*→*)→(*→*)) i= In1 (f (Mu1 f ) i)
-- Mendler-style iterators at different kinds
mit0 :: Phi0 f a → Mu f → a
mit0 phi (In0 x) = phi (mit0 phi) x
mit1 :: Phi1 f a i → Mu f i → a i
mit1 phi (In1 x) = phi (mit1 phi) x
type Phi0 f = ∀r. (r → a ) → (f r → a )
type Phi1 f = ∀r. (∀i. r i → a i) → (∀i. f r i → a i)
✔ Uniformly defined at different
kinds (can handle non-regular
datatypes quite the same way
as handling regular datatypes)
✔ Terminates for ANY datatype
(can embed Mu and mit into Fw.
see Abel, Matthes and Uustalu TCS'04)
✔ However, not very useful for
mixed-variant datatypes
eliminating In0 or In1 by pattern matching
is only allowed in Mendler-style iterators
recursive call
Mendler-style Iteration
with a syntactic inverse
-- Mu' at different kinds (we only use two of them in this talk)
data Mu'0 (f :: * → *) a = In'0 (f (Mu'0 f a)) | Inverse0 a
data Mu'1 (f :: (*→*)→(*→*)) a i = In'1 (f (Mu'1 f a) i)| Inverse1 (a i)
-- msfit at different kinds
msfit0 :: Phi'0 f a → (∀a. Mu'0 f a) → a
msfit0 phi (In'0 x) = phi Inverse0 (msfit0 phi) x
msfit1 :: Phi'1 f a i → (∀a. Mu'1 f a i) → a i
msfit1 phi (In'1 x) = phi Inverse1 (msfit1 phi) x
type Phi'0 f a = ∀r. (a → r a ) → (r a → a ) → (f r a → a )
type Phi'1 f a = ∀r. (∀i. a i → r a i) → (∀i. r a i → a i) → (∀i. f (r a) i → a i)
✔ Terminates for ANY datatype
(can embed Mu and msfit into
Fw. see Ahn and Sheard ICFP'11)
✔ msfit is quite useful for
mixed-variant datatypes,
due to "inverse" operation in
addition to "recursive call"
eliminating In'0 or In'1 by pattern matching
is only allowed in Mendler-style iterators
recursive callinverse
-- using general recursion at type level
data Exp = Lam (Exp → Exp) | App Exp Exp
-- using fixpoint (Mu'0) over non-recursive base structure (ExpF)
data ExpF r = Lam (r → r) | App r r
type Exp' a = Mu'0 ExpF a -- (Exp' a) may contain Inverse
type Exp = ∀a . Exp' a -- Exp does not contain Inverse
lam :: (∀a. Exp' a → Exp' a) -> Exp -- it's not (Exp → Exp) → Exp
lam f = In'0 (Lam f ) -- f can handle Inverse containing values
-- but can never examine its content
app :: Exp → Exp → Exp
app e1 e2 = In'0 (App e1 e2)
Untyped HOAS
(a regular mixed-variant datatype)
Formatting Untyped HOAS
using msfit0 at kind *
showExp :: Exp → String
showExp e = msfit0 phi e vars where
phi :: Phi'0 ExpF ([String] → String)
phi inv showE (Lam z) =
λ(v:vs) → "(λ"++v++"→"++ showE (z (inv (const v))) vs ++")"
phi inv showE (App x y) =
λvs → "("++ showE x vs ++" "++ showE y vs ++")"
type Phi'0 f a = ∀ r. (a → r a) → (r a → a) → (f r a → a)
vars = [ "x"++show n | n<-[0..] ] :: [String]
recursive callinverse
Simply-Typed HOAS
-- using general recursion at type level
data Exp t where -- Exp :: * → *
Lam :: (Exp t1 → Exp t2) → Exp (t1 → t2)
App :: Exp (t1 → t2) → Exp t1 → Exp t2
-- using fixpoint (Mu'1) over non-recursive base structure (ExpF)
data ExpF r t where -- ExpF :: (* → *) → (* → *)
Lam :: (r t1 → r t2) → ExpF r (t1 → t2)
App :: r (t1 → t2) → r t1 → ExpF r t2
type Exp' a t = Mu'1 ExpF a t -- (Exp' a t) might contain Inverse
type Exp t = ∀a . Exp' a t -- (Exp t) does not contain Inverse
lam :: (∀a . Exp' a t1 → Exp' a t2) → Exp (t1 → t2)
lam f = In'1 (Lam f ) -- f can handle Inverse containing values
-- but can never examine its content
app :: Exp (t1 → t2) → Exp t1 → Exp t2
app e1 e2 = In'1 (App e1 e2)
(a non-regular mixed-variant datatype)
newtype Id a = MkId { unId :: a }
evalHOAS :: Exp t → Id t
evalHOAS e = msfit1 phi e where
phi :: Phi'1 ExpF Id {- v :: t1 -} {- f :: r Id t1 -> r Id t2 -}
phi inv ev (Lam f ) = MkId(λv → unId(ev (f (inv (MkId v)))))
phi inv ev (App e1 e2) = MkId(unId(ev e1) (unId(ev e2)))
type Phi'1 f a = ∀r. (∀i. a i → r a i) → (∀i. r a i → a i) → (∀i. f (r a) i → a i)
This is example is a super awesome cooooool discovery that
System Fw can express Simply-Typed HOAS evaluation!!!
Evaluating Simply-Typed HOAS
using msfit1 at kind *→*
recursive callinverse
The Nax language
✔Built upon the idea of Mendler-style recursion schemes
✔Supports an extension of Hindley--Milner type inference to make it
easier to use Mendler-style recursion schemes and indexed datatypes
✔Handling different notions of recursive type operators (Mu, Mu') still
needs more rigorous clarification in the theory, but intuitively,
Mu0 f = ∀a. Mu'0 f a
Mu1 f = ∀a. Mu'1 f a i
...
So, we hide Mu' from users as if there is one kind of Mu
and Mu' is only used during the computation of msfit
✔Supports term-indexed types as well as type-indexed types.
Our term indexed calculus, System Fi (to appear in TLCA 2013),
extends System Fw with erasable term indices.
Need for yet another
Mendler-style recursion scheme
There are more recursion schemes other than mit and msfit
E.g., Mendler-style primitive recursion (mpr) can cast from abstract
recursive type (r) to concrete recursive type (Mu f ).
Phi0 f a = ∀r. (r → Mu f ) → (r → a ) → (f r → a )
Phi1 f a = ∀r. (∀i. r i → Mu f i) → (∀i. r i → a i) → (∀i. f r i → a i)
With mpr, one can write constant time predecessor for natural
numbers and tail function for lists by using the cast operation.
Next example motivates an extension to mpr that can uncast from
concrete recursive type (Mu f i) to abstract recursive type (r i)
Phi1 f a = ∀r. (∀i. Mu f i → r i) →
(∀i. r i → Mu f i) → (∀i. r i → a i) → (∀i. f r i → a i)
Recursion scheme with above Phi1 type does not terminate for mixed-
variant datatypes -- needs some additional restriction on uncast.
data V r t where V :: (r t1 → r t2) → V r (t1 → t2)
type Val t = Mu V t
val f = In1 (V f )
evalHOAS :: Exp t → Val t
evalHOAS e = msfit1 phi e where
phi :: Phi'1 ExpF (Mu1 V) -- f :: r Val t1 -> r Val t2 , v :: Val t1
phi inv ev (Lam f ) = val(λv → ev (f (inv v)))
phi inv ev (App e1 e2) = unVal (ev e1) (ev e2)
Only if we had unVal :: Val (t1 → t2) → (Val t1 → Val t2) it would be
possible to write this, but unVal does not seem to be definable
using any known Mendler-style recursion scheme.
Evaluating Simply-Typed HOAS
into a user defined value domain
New recursion scheme to write unVal
data V r t where V :: (r t1 → r t2) → V r (t1 → t2)
type Val t = Mu V t
val f = In1 (V f )
unVal v = unId(mprsi phi v) where
phi :: Phi1 V Id
phi uncast cast (V f) = Id(λv. cast (f (uncast v)))
mprsi :: Phi1 f a → Mu f i → a i
mprsi phi (In1 x) = phi id id (mrpsi phi) x
-- size restriction over indices in both uncast and cast
type Phi1 f a = ∀ r j. (∀i. (i < j) ⇒ Mu f i → r i) → -- uncast
(∀i. (i < j) ⇒ r i → Mu f i) → -- cast
(∀i. r i → a i) → (r j → a j)
-- or, maybe without the size restriction over indices in cast
type Phi1 f a = ∀ r j. (∀i. (i < j) ⇒ Mu f i → r i) → -- uncast
(∀i. r i → Mu f i) → -- cast
(∀i. r i → a i) → (f r j → a j)
Preliminary idea that still need further
studies for the termination proof
How are Mu and Mu' related?
data Mu0 (f :: * → *) = In0 (f (Mu0 f ))
data Mu'0 (f :: * → *) a = In'0 (f (Mu'0 f a)) | Inverse0 a
type Phi0 f = ∀r. (r → a ) → (f r → a )
mit0 :: Phi0 f a → Mu f → a
mit0 phi (In0 x) = phi (mit0 phi) x
type Phi'0 f a = ∀ r. (a → r a) → (r a → a) → (f (r a) → a)
msfit0 :: Phi'0 f a → (∀a. Mu'0 f a) → a
msfit0 phi (In'0 x) = phi Inverse0 (msfit0 phi) x
Can we coerece from (∀a. Mu'0 f a) to Mu f ? Yes!!!
Can we coerece from Mu f to (∀a. Mu'0 f a) ? Not exactly...
Corecion from Mu' to Mu
data E r = Lam (r -> r) | App r r
type Expr = Mu0 E
type Exp' a = Mu'0 E a
type Exp = (forall a. Exp' a) -- .i.e (forall a. Rec0 E a)
exp2expr :: Exp -> Expr -- i.e., (forall a. Rec0 E a) -> Mu0 E
exp2expr = msfit0 phi where
phi inv p2r (Lam f) = In0(Lam((x -> p2r (f (inv x)))))
phi inv p2r (App e1 e2) = In0(App (p2r e1) (p2r e2))
Attempt from Mu to Mu'
msfit' :: (forall r. (a -> r a) -> (r a -> a) -> f (r a) -> a) -> Mu'0 f a -> a
msfit' phi (In'0 x) = phi Inverse0 (msfit' phi) x
msfit' phi (Inverse0 z) = z
exp'2expr :: Exp' Expr -> Expr -- i.e., Mu'0 E (Mu0 E) -> Mu0 E
exp'2expr = msfcata' phi where
phi inv p2r (Lam f) = In0(Lam((x -> p2r (f (inv x)))))
phi inv p2r (App e1 e2) = In0(App (p2r e1) (p2r e2))
-- using general recursion and pattern matching against In0
expr2exp' :: Expr -> Exp' Expr -- i.e., Mu0 E -> Mu'0 E (Mu0 E)
expr2exp' (In0(Lam f)) = In'0(Lam (x -> expr2exp' (f (exp'2expr x))))
expr2exp' (In0(App e1 e2)) = In'0(App (expr2exp' e1) (expr2exp' e2))
Why from Mu' to Mu possible
but not the other way?
data E r = Lam (r → r) | App r r
type Exp' a = Mu'0 ExpF a -- (Exp' a) may contain Inverse
type Exp = ∀a . Exp' a -- Exp does not contain Inverse
lam :: (∀a. Exp' a → Exp' a) -> Exp -- it's not (Exp → Exp) → Exp
lam f = In'0 (Lam f ) -- f can handle Inverse containing values
-- but can never examine its content
type Expr = Mu0 E
lam :: Expr → Expr
lam f = In0 (Lam f)
Assume that Expr = Exp = (∀a . Exp' a)
There are less functions with type
(∀a. Exp' a) → (∀a. Exp' a) than
functions with type (∀a. Exp' a → Exp' a)
Thanks for listening.
Questions or Suggestions?
===============

More Related Content

What's hot

Core csharp and net quick reference
Core csharp and net quick referenceCore csharp and net quick reference
Core csharp and net quick reference
ilesh raval
 
Chapter 1 (functions).
Chapter 1 (functions).Chapter 1 (functions).
Chapter 1 (functions).
Eko Wijayanto
 
Monoids - Part 2 - with examples using Scalaz and Cats
Monoids - Part 2 - with examples using Scalaz and CatsMonoids - Part 2 - with examples using Scalaz and Cats
Monoids - Part 2 - with examples using Scalaz and Cats
Philip Schwarz
 
Lesson 6: The derivative as a function
Lesson 6: The derivative as a functionLesson 6: The derivative as a function
Lesson 6: The derivative as a function
Matthew Leingang
 
Functions (1)
Functions (1)Functions (1)
Functions (1)
Ghulam Mehdi Sahito
 
Contravariant functors in scala
Contravariant functors in scalaContravariant functors in scala
Contravariant functors in scala
Piotr Paradziński
 
Top down and botttom up 2 LATEST.
Top down     and botttom up 2 LATEST.Top down     and botttom up 2 LATEST.
Top down and botttom up 2 LATEST.
Gerwin Ocsena
 
Category Theory in 10 Minutes
Category Theory in 10 MinutesCategory Theory in 10 Minutes
Category Theory in 10 Minutes
Jordan Parmer
 
It's All About Morphisms
It's All About MorphismsIt's All About Morphisms
It's All About Morphisms
Uberto Barbini
 
Top down parsing(sid) (1)
Top down parsing(sid) (1)Top down parsing(sid) (1)
Top down parsing(sid) (1)
Siddhesh Pange
 
Cyclcone a safe dialect of C
Cyclcone a safe dialect of CCyclcone a safe dialect of C
Cyclcone a safe dialect of C
Ahmed Magdy Ezzeldin, MSc.
 
Python data handling
Python data handlingPython data handling
Python data handling
Prof. Dr. K. Adisesha
 
Functor Composition
Functor CompositionFunctor Composition
Functor Composition
Philip Schwarz
 
Ch06
Ch06Ch06
Ch06
Hankyo
 
Why functional programming and category theory strongly matters
Why functional programming and category theory strongly mattersWhy functional programming and category theory strongly matters
Why functional programming and category theory strongly matters
Piotr Paradziński
 
Quality Python Homework Help
Quality Python Homework HelpQuality Python Homework Help
Quality Python Homework Help
Python Homework Help
 
Introduction to Iteratees (Scala)
Introduction to Iteratees (Scala)Introduction to Iteratees (Scala)
Introduction to Iteratees (Scala)
Alexander Lehmann
 
Lesson 5: Continuity
Lesson 5: ContinuityLesson 5: Continuity
Lesson 5: Continuity
Matthew Leingang
 
The Functional Programming Triad of Folding, Scanning and Iteration - a first...
The Functional Programming Triad of Folding, Scanning and Iteration - a first...The Functional Programming Triad of Folding, Scanning and Iteration - a first...
The Functional Programming Triad of Folding, Scanning and Iteration - a first...
Philip Schwarz
 
Quality Python Homework Help
Quality Python Homework HelpQuality Python Homework Help
Quality Python Homework Help
Python Homework Help
 

What's hot (20)

Core csharp and net quick reference
Core csharp and net quick referenceCore csharp and net quick reference
Core csharp and net quick reference
 
Chapter 1 (functions).
Chapter 1 (functions).Chapter 1 (functions).
Chapter 1 (functions).
 
Monoids - Part 2 - with examples using Scalaz and Cats
Monoids - Part 2 - with examples using Scalaz and CatsMonoids - Part 2 - with examples using Scalaz and Cats
Monoids - Part 2 - with examples using Scalaz and Cats
 
Lesson 6: The derivative as a function
Lesson 6: The derivative as a functionLesson 6: The derivative as a function
Lesson 6: The derivative as a function
 
Functions (1)
Functions (1)Functions (1)
Functions (1)
 
Contravariant functors in scala
Contravariant functors in scalaContravariant functors in scala
Contravariant functors in scala
 
Top down and botttom up 2 LATEST.
Top down     and botttom up 2 LATEST.Top down     and botttom up 2 LATEST.
Top down and botttom up 2 LATEST.
 
Category Theory in 10 Minutes
Category Theory in 10 MinutesCategory Theory in 10 Minutes
Category Theory in 10 Minutes
 
It's All About Morphisms
It's All About MorphismsIt's All About Morphisms
It's All About Morphisms
 
Top down parsing(sid) (1)
Top down parsing(sid) (1)Top down parsing(sid) (1)
Top down parsing(sid) (1)
 
Cyclcone a safe dialect of C
Cyclcone a safe dialect of CCyclcone a safe dialect of C
Cyclcone a safe dialect of C
 
Python data handling
Python data handlingPython data handling
Python data handling
 
Functor Composition
Functor CompositionFunctor Composition
Functor Composition
 
Ch06
Ch06Ch06
Ch06
 
Why functional programming and category theory strongly matters
Why functional programming and category theory strongly mattersWhy functional programming and category theory strongly matters
Why functional programming and category theory strongly matters
 
Quality Python Homework Help
Quality Python Homework HelpQuality Python Homework Help
Quality Python Homework Help
 
Introduction to Iteratees (Scala)
Introduction to Iteratees (Scala)Introduction to Iteratees (Scala)
Introduction to Iteratees (Scala)
 
Lesson 5: Continuity
Lesson 5: ContinuityLesson 5: Continuity
Lesson 5: Continuity
 
The Functional Programming Triad of Folding, Scanning and Iteration - a first...
The Functional Programming Triad of Folding, Scanning and Iteration - a first...The Functional Programming Triad of Folding, Scanning and Iteration - a first...
The Functional Programming Triad of Folding, Scanning and Iteration - a first...
 
Quality Python Homework Help
Quality Python Homework HelpQuality Python Homework Help
Quality Python Homework Help
 

Similar to Can two fixpoint types in Mendler style unite?

Optics Fourier Transform I
Optics Fourier Transform IOptics Fourier Transform I
Optics Fourier Transform I
diarmseven
 
Domain Transformations
Domain TransformationsDomain Transformations
Domain Transformations
Dmitri Nesteruk
 
Numerical Fourier transform based on hyperfunction theory
Numerical Fourier transform based on hyperfunction theoryNumerical Fourier transform based on hyperfunction theory
Numerical Fourier transform based on hyperfunction theory
HidenoriOgata
 
Programmable PN Sequence Generators
Programmable PN Sequence GeneratorsProgrammable PN Sequence Generators
Programmable PN Sequence Generators
Rajesh Singh
 
senior seminar
senior seminarsenior seminar
senior seminar
Jose Stewart
 
the fourier series
the fourier seriesthe fourier series
the fourier series
safi al amu
 
09. haskell Context
09. haskell Context09. haskell Context
09. haskell Context
Sebastian Rettig
 
Bound
BoundBound
Functional Programming by Examples using Haskell
Functional Programming by Examples using HaskellFunctional Programming by Examples using Haskell
Functional Programming by Examples using Haskell
goncharenko
 
Some properties of m sequences over finite field fp
Some properties of m sequences over finite field fpSome properties of m sequences over finite field fp
Some properties of m sequences over finite field fp
IAEME Publication
 
Humble introduction to category theory in haskell
Humble introduction to category theory in haskellHumble introduction to category theory in haskell
Humble introduction to category theory in haskell
Jongsoo Lee
 
Application of derivatives
Application of derivativesApplication of derivatives
Application of derivatives
indu thakur
 
A Language Designer’s Workbench. A one-stop shop for implementation and verif...
A Language Designer’s Workbench. A one-stop shop for implementation and verif...A Language Designer’s Workbench. A one-stop shop for implementation and verif...
A Language Designer’s Workbench. A one-stop shop for implementation and verif...
Eelco Visser
 
5.5 Injective and surjective functions. A handout.
5.5 Injective and surjective functions. A handout.5.5 Injective and surjective functions. A handout.
5.5 Injective and surjective functions. A handout.
Jan Plaza
 
Signal Processing Homework Help
Signal Processing Homework HelpSignal Processing Homework Help
Signal Processing Homework Help
Matlab Assignment Experts
 
Iteration Techniques
Iteration TechniquesIteration Techniques
Iteration Techniques
Andrada Astefanoaie
 
160280102001 c1 aem
160280102001 c1 aem160280102001 c1 aem
160280102001 c1 aem
L.D. COLLEGE OF ENGINEERING
 
3.1 derivative of a function
3.1 derivative of a function3.1 derivative of a function
3.1 derivative of a function
btmathematics
 
Module of algelbra analyses 2
Module of algelbra analyses 2Module of algelbra analyses 2
Module of algelbra analyses 2
Bui Loi
 
Notes on exact and approximate bayesian implementation
Notes on exact and approximate bayesian implementationNotes on exact and approximate bayesian implementation
Notes on exact and approximate bayesian implementation
Leo Vivas
 

Similar to Can two fixpoint types in Mendler style unite? (20)

Optics Fourier Transform I
Optics Fourier Transform IOptics Fourier Transform I
Optics Fourier Transform I
 
Domain Transformations
Domain TransformationsDomain Transformations
Domain Transformations
 
Numerical Fourier transform based on hyperfunction theory
Numerical Fourier transform based on hyperfunction theoryNumerical Fourier transform based on hyperfunction theory
Numerical Fourier transform based on hyperfunction theory
 
Programmable PN Sequence Generators
Programmable PN Sequence GeneratorsProgrammable PN Sequence Generators
Programmable PN Sequence Generators
 
senior seminar
senior seminarsenior seminar
senior seminar
 
the fourier series
the fourier seriesthe fourier series
the fourier series
 
09. haskell Context
09. haskell Context09. haskell Context
09. haskell Context
 
Bound
BoundBound
Bound
 
Functional Programming by Examples using Haskell
Functional Programming by Examples using HaskellFunctional Programming by Examples using Haskell
Functional Programming by Examples using Haskell
 
Some properties of m sequences over finite field fp
Some properties of m sequences over finite field fpSome properties of m sequences over finite field fp
Some properties of m sequences over finite field fp
 
Humble introduction to category theory in haskell
Humble introduction to category theory in haskellHumble introduction to category theory in haskell
Humble introduction to category theory in haskell
 
Application of derivatives
Application of derivativesApplication of derivatives
Application of derivatives
 
A Language Designer’s Workbench. A one-stop shop for implementation and verif...
A Language Designer’s Workbench. A one-stop shop for implementation and verif...A Language Designer’s Workbench. A one-stop shop for implementation and verif...
A Language Designer’s Workbench. A one-stop shop for implementation and verif...
 
5.5 Injective and surjective functions. A handout.
5.5 Injective and surjective functions. A handout.5.5 Injective and surjective functions. A handout.
5.5 Injective and surjective functions. A handout.
 
Signal Processing Homework Help
Signal Processing Homework HelpSignal Processing Homework Help
Signal Processing Homework Help
 
Iteration Techniques
Iteration TechniquesIteration Techniques
Iteration Techniques
 
160280102001 c1 aem
160280102001 c1 aem160280102001 c1 aem
160280102001 c1 aem
 
3.1 derivative of a function
3.1 derivative of a function3.1 derivative of a function
3.1 derivative of a function
 
Module of algelbra analyses 2
Module of algelbra analyses 2Module of algelbra analyses 2
Module of algelbra analyses 2
 
Notes on exact and approximate bayesian implementation
Notes on exact and approximate bayesian implementationNotes on exact and approximate bayesian implementation
Notes on exact and approximate bayesian implementation
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Can two fixpoint types in Mendler style unite?

  • 1. Mendler-style Recursion Schemes for Mixed-Variant Datatypes Ki Yung Ahn Tim Sheard Marcelo P. Fiore kya@cs.pdx.edu sheard@cs.pdx.edu Marcelo.Fiore@cl.cam.ac.uk TYPES 2013
  • 2. Outline Mendler-style Recursion Schemes mit (iteration) msfit (iteration with syntactic Inverse) Untyped HOAS (Regular Mixed-Variant Datatype) Formatting Untyped HOAS (using msfit at kind *) Simply-Typed HOAS (Indexed Mixed-Variant Datatype) Formatting Untyped HOAS (using msfit at kind * → *) The Nax language Need for yet another Mendler-style Recursion Scheme
  • 3. already inconsistent as a logic (via Curry--Howard correspondence) without even having to introduce any term-level recursion since we can already define general recursion using this (iso-) Recursive Types in Functional Languages
  • 4. Having both unrestricted formation and unrestricted elimination of μ leads to inconsistency data T a r = C (r → a) w : μ (T a) → a -- encoding of (λx. x x) in the untyped λ-calc w = λv. case (unIn v) of (C x) → f (C x) -- w (C w) amounts to a well-known diverging term in λ-calculus fix : (a → a) → a -- the Y combinator (λf.(λx.f(xx))(λx.f(xx)))) fix = λf. (λx. f (w x)) (In (C (λx. f (w x)))) To recover consistency, one could either restrict formation (conventional approach) or restrict elimination (Mendler-style approach)
  • 5. Conventional Iteration over Recursive Types allow formation of only positive recursive types (i.e., when F has a map) freely eliminate (i.e. use unIn) recursive values
  • 6. Mendler-style Iteration over Recursive Types elimination is possible only through mit freely form ANY recursive type!! note, no (μ-elim) rule
  • 7. Mendler-style Iteration -- Mu at different kinds (there are many more, one at each kind) data Mu0 (f :: * → *) = In0 (f (Mu0 f )) data Mu1 (f :: (*→*)→(*→*)) i= In1 (f (Mu1 f ) i) -- Mendler-style iterators at different kinds mit0 :: Phi0 f a → Mu f → a mit0 phi (In0 x) = phi (mit0 phi) x mit1 :: Phi1 f a i → Mu f i → a i mit1 phi (In1 x) = phi (mit1 phi) x type Phi0 f = ∀r. (r → a ) → (f r → a ) type Phi1 f = ∀r. (∀i. r i → a i) → (∀i. f r i → a i) ✔ Uniformly defined at different kinds (can handle non-regular datatypes quite the same way as handling regular datatypes) ✔ Terminates for ANY datatype (can embed Mu and mit into Fw. see Abel, Matthes and Uustalu TCS'04) ✔ However, not very useful for mixed-variant datatypes eliminating In0 or In1 by pattern matching is only allowed in Mendler-style iterators recursive call
  • 8. Mendler-style Iteration with a syntactic inverse -- Mu' at different kinds (we only use two of them in this talk) data Mu'0 (f :: * → *) a = In'0 (f (Mu'0 f a)) | Inverse0 a data Mu'1 (f :: (*→*)→(*→*)) a i = In'1 (f (Mu'1 f a) i)| Inverse1 (a i) -- msfit at different kinds msfit0 :: Phi'0 f a → (∀a. Mu'0 f a) → a msfit0 phi (In'0 x) = phi Inverse0 (msfit0 phi) x msfit1 :: Phi'1 f a i → (∀a. Mu'1 f a i) → a i msfit1 phi (In'1 x) = phi Inverse1 (msfit1 phi) x type Phi'0 f a = ∀r. (a → r a ) → (r a → a ) → (f r a → a ) type Phi'1 f a = ∀r. (∀i. a i → r a i) → (∀i. r a i → a i) → (∀i. f (r a) i → a i) ✔ Terminates for ANY datatype (can embed Mu and msfit into Fw. see Ahn and Sheard ICFP'11) ✔ msfit is quite useful for mixed-variant datatypes, due to "inverse" operation in addition to "recursive call" eliminating In'0 or In'1 by pattern matching is only allowed in Mendler-style iterators recursive callinverse
  • 9. -- using general recursion at type level data Exp = Lam (Exp → Exp) | App Exp Exp -- using fixpoint (Mu'0) over non-recursive base structure (ExpF) data ExpF r = Lam (r → r) | App r r type Exp' a = Mu'0 ExpF a -- (Exp' a) may contain Inverse type Exp = ∀a . Exp' a -- Exp does not contain Inverse lam :: (∀a. Exp' a → Exp' a) -> Exp -- it's not (Exp → Exp) → Exp lam f = In'0 (Lam f ) -- f can handle Inverse containing values -- but can never examine its content app :: Exp → Exp → Exp app e1 e2 = In'0 (App e1 e2) Untyped HOAS (a regular mixed-variant datatype)
  • 10. Formatting Untyped HOAS using msfit0 at kind * showExp :: Exp → String showExp e = msfit0 phi e vars where phi :: Phi'0 ExpF ([String] → String) phi inv showE (Lam z) = λ(v:vs) → "(λ"++v++"→"++ showE (z (inv (const v))) vs ++")" phi inv showE (App x y) = λvs → "("++ showE x vs ++" "++ showE y vs ++")" type Phi'0 f a = ∀ r. (a → r a) → (r a → a) → (f r a → a) vars = [ "x"++show n | n<-[0..] ] :: [String] recursive callinverse
  • 11. Simply-Typed HOAS -- using general recursion at type level data Exp t where -- Exp :: * → * Lam :: (Exp t1 → Exp t2) → Exp (t1 → t2) App :: Exp (t1 → t2) → Exp t1 → Exp t2 -- using fixpoint (Mu'1) over non-recursive base structure (ExpF) data ExpF r t where -- ExpF :: (* → *) → (* → *) Lam :: (r t1 → r t2) → ExpF r (t1 → t2) App :: r (t1 → t2) → r t1 → ExpF r t2 type Exp' a t = Mu'1 ExpF a t -- (Exp' a t) might contain Inverse type Exp t = ∀a . Exp' a t -- (Exp t) does not contain Inverse lam :: (∀a . Exp' a t1 → Exp' a t2) → Exp (t1 → t2) lam f = In'1 (Lam f ) -- f can handle Inverse containing values -- but can never examine its content app :: Exp (t1 → t2) → Exp t1 → Exp t2 app e1 e2 = In'1 (App e1 e2) (a non-regular mixed-variant datatype)
  • 12. newtype Id a = MkId { unId :: a } evalHOAS :: Exp t → Id t evalHOAS e = msfit1 phi e where phi :: Phi'1 ExpF Id {- v :: t1 -} {- f :: r Id t1 -> r Id t2 -} phi inv ev (Lam f ) = MkId(λv → unId(ev (f (inv (MkId v))))) phi inv ev (App e1 e2) = MkId(unId(ev e1) (unId(ev e2))) type Phi'1 f a = ∀r. (∀i. a i → r a i) → (∀i. r a i → a i) → (∀i. f (r a) i → a i) This is example is a super awesome cooooool discovery that System Fw can express Simply-Typed HOAS evaluation!!! Evaluating Simply-Typed HOAS using msfit1 at kind *→* recursive callinverse
  • 13. The Nax language ✔Built upon the idea of Mendler-style recursion schemes ✔Supports an extension of Hindley--Milner type inference to make it easier to use Mendler-style recursion schemes and indexed datatypes ✔Handling different notions of recursive type operators (Mu, Mu') still needs more rigorous clarification in the theory, but intuitively, Mu0 f = ∀a. Mu'0 f a Mu1 f = ∀a. Mu'1 f a i ... So, we hide Mu' from users as if there is one kind of Mu and Mu' is only used during the computation of msfit ✔Supports term-indexed types as well as type-indexed types. Our term indexed calculus, System Fi (to appear in TLCA 2013), extends System Fw with erasable term indices.
  • 14. Need for yet another Mendler-style recursion scheme There are more recursion schemes other than mit and msfit E.g., Mendler-style primitive recursion (mpr) can cast from abstract recursive type (r) to concrete recursive type (Mu f ). Phi0 f a = ∀r. (r → Mu f ) → (r → a ) → (f r → a ) Phi1 f a = ∀r. (∀i. r i → Mu f i) → (∀i. r i → a i) → (∀i. f r i → a i) With mpr, one can write constant time predecessor for natural numbers and tail function for lists by using the cast operation. Next example motivates an extension to mpr that can uncast from concrete recursive type (Mu f i) to abstract recursive type (r i) Phi1 f a = ∀r. (∀i. Mu f i → r i) → (∀i. r i → Mu f i) → (∀i. r i → a i) → (∀i. f r i → a i) Recursion scheme with above Phi1 type does not terminate for mixed- variant datatypes -- needs some additional restriction on uncast.
  • 15. data V r t where V :: (r t1 → r t2) → V r (t1 → t2) type Val t = Mu V t val f = In1 (V f ) evalHOAS :: Exp t → Val t evalHOAS e = msfit1 phi e where phi :: Phi'1 ExpF (Mu1 V) -- f :: r Val t1 -> r Val t2 , v :: Val t1 phi inv ev (Lam f ) = val(λv → ev (f (inv v))) phi inv ev (App e1 e2) = unVal (ev e1) (ev e2) Only if we had unVal :: Val (t1 → t2) → (Val t1 → Val t2) it would be possible to write this, but unVal does not seem to be definable using any known Mendler-style recursion scheme. Evaluating Simply-Typed HOAS into a user defined value domain
  • 16. New recursion scheme to write unVal data V r t where V :: (r t1 → r t2) → V r (t1 → t2) type Val t = Mu V t val f = In1 (V f ) unVal v = unId(mprsi phi v) where phi :: Phi1 V Id phi uncast cast (V f) = Id(λv. cast (f (uncast v))) mprsi :: Phi1 f a → Mu f i → a i mprsi phi (In1 x) = phi id id (mrpsi phi) x -- size restriction over indices in both uncast and cast type Phi1 f a = ∀ r j. (∀i. (i < j) ⇒ Mu f i → r i) → -- uncast (∀i. (i < j) ⇒ r i → Mu f i) → -- cast (∀i. r i → a i) → (r j → a j) -- or, maybe without the size restriction over indices in cast type Phi1 f a = ∀ r j. (∀i. (i < j) ⇒ Mu f i → r i) → -- uncast (∀i. r i → Mu f i) → -- cast (∀i. r i → a i) → (f r j → a j) Preliminary idea that still need further studies for the termination proof
  • 17. How are Mu and Mu' related? data Mu0 (f :: * → *) = In0 (f (Mu0 f )) data Mu'0 (f :: * → *) a = In'0 (f (Mu'0 f a)) | Inverse0 a type Phi0 f = ∀r. (r → a ) → (f r → a ) mit0 :: Phi0 f a → Mu f → a mit0 phi (In0 x) = phi (mit0 phi) x type Phi'0 f a = ∀ r. (a → r a) → (r a → a) → (f (r a) → a) msfit0 :: Phi'0 f a → (∀a. Mu'0 f a) → a msfit0 phi (In'0 x) = phi Inverse0 (msfit0 phi) x Can we coerece from (∀a. Mu'0 f a) to Mu f ? Yes!!! Can we coerece from Mu f to (∀a. Mu'0 f a) ? Not exactly...
  • 18. Corecion from Mu' to Mu data E r = Lam (r -> r) | App r r type Expr = Mu0 E type Exp' a = Mu'0 E a type Exp = (forall a. Exp' a) -- .i.e (forall a. Rec0 E a) exp2expr :: Exp -> Expr -- i.e., (forall a. Rec0 E a) -> Mu0 E exp2expr = msfit0 phi where phi inv p2r (Lam f) = In0(Lam((x -> p2r (f (inv x))))) phi inv p2r (App e1 e2) = In0(App (p2r e1) (p2r e2))
  • 19. Attempt from Mu to Mu' msfit' :: (forall r. (a -> r a) -> (r a -> a) -> f (r a) -> a) -> Mu'0 f a -> a msfit' phi (In'0 x) = phi Inverse0 (msfit' phi) x msfit' phi (Inverse0 z) = z exp'2expr :: Exp' Expr -> Expr -- i.e., Mu'0 E (Mu0 E) -> Mu0 E exp'2expr = msfcata' phi where phi inv p2r (Lam f) = In0(Lam((x -> p2r (f (inv x))))) phi inv p2r (App e1 e2) = In0(App (p2r e1) (p2r e2)) -- using general recursion and pattern matching against In0 expr2exp' :: Expr -> Exp' Expr -- i.e., Mu0 E -> Mu'0 E (Mu0 E) expr2exp' (In0(Lam f)) = In'0(Lam (x -> expr2exp' (f (exp'2expr x)))) expr2exp' (In0(App e1 e2)) = In'0(App (expr2exp' e1) (expr2exp' e2))
  • 20. Why from Mu' to Mu possible but not the other way? data E r = Lam (r → r) | App r r type Exp' a = Mu'0 ExpF a -- (Exp' a) may contain Inverse type Exp = ∀a . Exp' a -- Exp does not contain Inverse lam :: (∀a. Exp' a → Exp' a) -> Exp -- it's not (Exp → Exp) → Exp lam f = In'0 (Lam f ) -- f can handle Inverse containing values -- but can never examine its content type Expr = Mu0 E lam :: Expr → Expr lam f = In0 (Lam f) Assume that Expr = Exp = (∀a . Exp' a) There are less functions with type (∀a. Exp' a) → (∀a. Exp' a) than functions with type (∀a. Exp' a → Exp' a)
  • 21. Thanks for listening. Questions or Suggestions? ===============