Return-Path: <kfoury@cs.bu.edu> X-Spam-HitLevel: X-Spam-DCC: INFN-TO: cs3.bu.edu 1233; Body=1 Fuz1=1 Fuz2=1 X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on cs3.bu.edu X-Spam-Level: X-Spam-Status: No, score=-4.4 required=10.0 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham version=3.1.0 X-Spam-Pyzor: Received: from [76.19.13.95] ([76.19.13.95]) (authenticated bits=0) by cs3.bu.edu (8.13.6/8.13.6) with ESMTP id kA94jkov013428 for <cs520@cs.bu.edu>; Wed, 8 Nov 2006 23:46:16 -0500 Message-ID: <4552B285.2080101@cs.bu.edu> Date: Wed, 08 Nov 2006 23:45:57 -0500 From: Assaf Kfoury <kfoury@cs.bu.edu> User-Agent: Mozilla Thunderbird 1.0.7 (X11/20051013) X-Accept-Language: en-us, en To: cs520@cs.bu.edu Subject: [Fwd: Re: HD16 - Evaluation rule 8] Content-Type: multipart/mixed; boundary="------------080406050102020203010601" X-Clamav-Status: No Status: RO Content-Length: 2338 X-UID: 48 X-Keywords:
Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit
I resend a question from Michel and my response to it, for everyone's
benefit.
Assaf
Content-Type: message/rfc822; name="Re: HD16 - Evaluation rule 8" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="Re: HD16 - Evaluation rule 8"
attached mail follows:
Return-Path: <kfoury@bu.edu> X-Spam-HitLevel: X-Spam-DCC: sonic.net: cs3.bu.edu 1156; Body=1 Fuz1=1 Fuz2=1 X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on cs3.bu.edu X-Spam-Level: X-Spam-Status: No, score=-4.7 required=10.0 tests=ALL_TRUSTED,AWL,BAYES_00, DATE_IN_PAST_03_06 autolearn=ham version=3.1.0 X-Spam-Pyzor: Received: from [128.197.14.233] (cs4-dhcp233.bu.edu [128.197.14.233]) (authenticated bits=0) by cs3.bu.edu (8.13.6/8.13.6) with ESMTP id kA8Ie6uC020332; Wed, 8 Nov 2006 13:40:12 -0500 Message-ID: <4551DDB1.1010707@bu.edu> Date: Wed, 08 Nov 2006 13:37:53 +0000 From: Assaf Kfoury <kfoury@bu.edu> User-Agent: Mozilla Thunderbird 1.0.7 (X11/20051013) X-Accept-Language: en-us, en To: Michel Machado <michel@digirati.com.br> Subject: Re: HD16 - Evaluation rule 8 References: <00b601c70351$cf317df0$d9b6a8c0@dark> In-Reply-To: <00b601c70351$cf317df0$d9b6a8c0@dark> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Clamav-Status: No X-UID: 49271 X-Keywords:
Yes, you can apply rule 8. As follows:
Let E = handle e (lam x.2) [ ] . According to the BNF definition on page
2 of HD 16, E is a legal evaluation context.
Next, in rule 8, let ex = e, v = (lam x.1) and t = (raise e 0). You can
apply rule 8 because t is in the required form, i.e. t = E'[raise ex v']
where E' = [ ], ex = e and v' = 0.
Assaf
Michel Machado wrote:
> Hi Assaf,
>
> Let me check if I truly understood the evaluation rule 8 in the
> handout 16, what's the result of the following term (if there's one)?
>
> "handle e (lam x.2) (handle e (lam x.1) (raise e 0))"
>
> I think I can not apply the rule 8 to this term.
>
> [ ]'s
> Michel Machado
This archive was generated by hypermail 2b29 : Thu Dec 14 2006 - 16:31:59 EST