skip to main content
10.1145/512950.512972acmconferencesArticle/Chapter ViewAbstractPublication PagespoplConference Proceedingsconference-collections
Article
Free Access

Threshold evaluation and the semantics of call by value, assignment and generic procedures

Published:01 January 1977Publication History

ABSTRACT

We use the concept of evaluation up to a given threshold of information to generalize the semantics of call by value and assignment to non-discrete domains, and to define a formal semantics for generic procedures. We then prove the correctness of McCarthy's transformation of iterative programs into recursive ones provided the same threshold is used for assignment and parameter passing.

References

  1. J. McCarthy. A basis for a mathematical theory of computation. In Computer Programming and Formal Systems, Braffort and Hirschberg Ed., North Holland, Amsterdam, (1963).Google ScholarGoogle Scholar
  2. R. Strong. Translating recursion equations into flow charts. Journal of Computer and System Sciences, Vol.5.No3. (June 1971).Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. B. Courcelle. Personal communication. To appear in book form.Google ScholarGoogle Scholar
  4. D. Scott. Outline of a mathematical theory of computation. Programming Research Group Monograph No.2, Oxford University (1970).Google ScholarGoogle Scholar
  5. Z. Manna and J. Vuillemin. Fix point approach to the theory of computation. Communications of the ACM, 15, 528-536, (1972). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Vuillemin. Syntax, semantique et axiomatique d'un language de programmation simple. These de Doctorat es-sciences Mathematiques, Université de Paris VII, Paris, (1974). see also Implementation of recursion in a simple programming language. Proc. 5th Annual ACM Symposium on Computing, (1973). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Nivat. On the interpretation of recursive program schemes. Symposia Mathematica, Vol, XV, Instituto Nationale di Alta Matematica, Italy, pp. 255-281, (1975).Google ScholarGoogle Scholar
  8. D. Park. Fixpoint induction and proofs of program properties. Machine Intelligence 5 (eds. B. Meltzer and D. Michie), Edinburgh: Edinburgh University Press, pp.59-77 (1969).Google ScholarGoogle Scholar
  9. W. P. de Roever. Recursion and parameter-machanisms : an axiomatic approach. In Automata, Languages and Programming (ed. J. Loeckz), pp.34-65, Lecture Notes in Computer Science Vol. 14, Springer-Verlag, Berlin, etc., (1974). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. W. de Bakker, Least fixed points revisited. Proc. of Symposium on λ-Calculus and Computer Science Theory, Roma, pp.1-35, (1975). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Boudol, Langages poluadiques algebriques. Theorie des schemas de programmes : semantique de l'appel par valeur. Thèse 3e cycle, Université Paris VII, (1975).Google ScholarGoogle Scholar
  12. J. McCarthy et al. LISP 1.5 Programmer's Manual, MIT Press, Cambridge, Mass., (1962). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. van Wijngaarden et al. Revised report on the algorithmic language ALGOL 68. Acta Informatica, Vol.5, Fasc. 1-3, (1975).Google ScholarGoogle Scholar
  14. B. Wegbreit et al. The ECL Programmer's Manual. Harvard University, Center for Research in Computing Technology, 21-72, (1972).Google ScholarGoogle Scholar
  15. R. M. Burstall, J. S. Collins and R. J. Popplestone. Programming in POP-2. Edinburgh : Edinburgh University Press, (1971).Google ScholarGoogle Scholar
  16. P. J. Landin. The mechanical evaluation of expressions. Computer Journal, Vol.6 No4.Google ScholarGoogle Scholar
  17. G. D. Plotkin. Call-by-name, call-by-value and the λ-calculus. J. Theoret. Comp. Sci., 1, 125-159, (1975).Google ScholarGoogle ScholarCross RefCross Ref
  18. C. P. Wadsworth. Semantics and pragmatics of the lambda-calculus. Ph.D.thesis. University of Oxford, (1971).Google ScholarGoogle Scholar
  19. P. Henderson and J. Morris, Jr. A lazy evaluator. 3rd ACM Symp.on Prin. of Prog. Lang., pp. 95-103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. P. Friedman and D. S. Wise. CONS should not evaluate its arguments. Proc. of 3rd Coll. on Automata, Languages and Programming. Edinburgh, (1976).Google ScholarGoogle Scholar
  21. G. Kahn and D. MacQueen. Coroutines and networks of parallel processes. Submitted for publication.Google ScholarGoogle Scholar
  22. E. Wiedmer. Fxaktes Rechnen mit reellen Zchlen. Eidgenössiche Technische Hochschule, Zürich. Bericht nr.20, (1976).Google ScholarGoogle Scholar
  23. E. A. Ashcroft and W. Wadge. Proving programs without tears. Proc. Symp. on Proving and improving Progams, IRIA, Rocquencourt, Huet and Kahn Ed., (1975).Google ScholarGoogle Scholar
  24. Ph. Jorrands. Contributions au developpement des langages extensible. Thèse d'Etat, Université Scientifique et Médicale de Grenoble, (1975).Google ScholarGoogle Scholar
  25. S. A. Schuman. On generic functions. In New Directions in Algorithmic Languages 75 (ed.S.A. Schuman) IRIA, (1976).Google ScholarGoogle Scholar
  26. R. Burstall and J. Darlington. Some transformations for developping recursive programs. Proc. of Internat. Conf. on Reliable Software, Los Angeles, Cal., (1975). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. H. P. Barendregt. Some extensional term models for combinatory logics and λ-calculi. Ph.D. thesis, University of Utrecht, (1971).Google ScholarGoogle Scholar
  28. J. M. Cadiou. Recursive definitions of partial functions and their computations. Ph.D. thesis, Stanford Un., (1972). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. R. Bird. On transformations of programs. J. Comput. System Sci., 8, 22-35, (1974).Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. B. Lang. Transformations Schematiques. Thèse 3e cycle, Université Paris VII, Paris, (to appear).Google ScholarGoogle Scholar
  1. Threshold evaluation and the semantics of call by value, assignment and generic procedures

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      POPL '77: Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
      January 1977
      280 pages
      ISBN:9781450373500
      DOI:10.1145/512950

      Copyright © 1977 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 January 1977

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      POPL '77 Paper Acceptance Rate25of105submissions,24%Overall Acceptance Rate824of4,130submissions,20%

      Upcoming Conference

      POPL '25

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader