[Fwd: Re: HD16 - Evaluation rule 8]

From: Assaf Kfoury (kfoury@cs.bu.edu)
Date: Wed Nov 08 2006 - 23:45:57 EST


Return-Path: <kfoury@cs.bu.edu>
X-Spam-HitLevel: 
X-Spam-DCC: INFN-TO: cs3.bu.edu 1233; Body=1 Fuz1=1 Fuz2=1
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on cs3.bu.edu
X-Spam-Level: 
X-Spam-Status: No, score=-4.4 required=10.0 tests=ALL_TRUSTED,AWL,BAYES_00  autolearn=ham version=3.1.0
X-Spam-Pyzor: 
Received: from [76.19.13.95] ([76.19.13.95]) (authenticated bits=0) by cs3.bu.edu (8.13.6/8.13.6) with ESMTP id kA94jkov013428 for <cs520@cs.bu.edu>; Wed, 8 Nov 2006 23:46:16 -0500
Message-ID: <4552B285.2080101@cs.bu.edu>
Date: Wed, 08 Nov 2006 23:45:57 -0500
From: Assaf Kfoury <kfoury@cs.bu.edu>
User-Agent: Mozilla Thunderbird 1.0.7 (X11/20051013)
X-Accept-Language: en-us, en
To: cs520@cs.bu.edu
Subject: [Fwd: Re: HD16 - Evaluation rule 8]
Content-Type: multipart/mixed; boundary="------------080406050102020203010601"
X-Clamav-Status: No
Status: RO
Content-Length: 2338
X-UID: 48
X-Keywords:                                                                                                    

Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit

I resend a question from Michel and my response to it, for everyone's
benefit.

Assaf

Content-Type: message/rfc822; name="Re: HD16 - Evaluation rule 8"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="Re: HD16 - Evaluation rule 8"


attached mail follows:


Return-Path: <kfoury@bu.edu>
X-Spam-HitLevel: 
X-Spam-DCC: sonic.net: cs3.bu.edu 1156; Body=1 Fuz1=1 Fuz2=1
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on cs3.bu.edu
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=10.0 tests=ALL_TRUSTED,AWL,BAYES_00, DATE_IN_PAST_03_06 autolearn=ham version=3.1.0
X-Spam-Pyzor: 
Received: from [128.197.14.233] (cs4-dhcp233.bu.edu [128.197.14.233]) (authenticated bits=0) by cs3.bu.edu (8.13.6/8.13.6) with ESMTP id kA8Ie6uC020332; Wed, 8 Nov 2006 13:40:12 -0500
Message-ID: <4551DDB1.1010707@bu.edu>
Date: Wed, 08 Nov 2006 13:37:53 +0000
From: Assaf Kfoury <kfoury@bu.edu>
User-Agent: Mozilla Thunderbird 1.0.7 (X11/20051013)
X-Accept-Language: en-us, en
To: Michel Machado <michel@digirati.com.br>
Subject: Re: HD16 - Evaluation rule 8
References: <00b601c70351$cf317df0$d9b6a8c0@dark>
In-Reply-To: <00b601c70351$cf317df0$d9b6a8c0@dark>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Clamav-Status: No
X-UID: 49271
X-Keywords:                                                                                                   

Yes, you can apply rule 8. As follows:

Let E = handle e (lam x.2) [ ] . According to the BNF definition on page
2 of HD 16, E is a legal evaluation context.

Next, in rule 8, let ex = e, v = (lam x.1) and t = (raise e 0). You can
apply rule 8 because t is in the required form, i.e. t = E'[raise ex v']
where E' = [ ], ex = e and v' = 0.

Assaf

Michel Machado wrote:

> Hi Assaf,
>
> Let me check if I truly understood the evaluation rule 8 in the
> handout 16, what's the result of the following term (if there's one)?
>
> "handle e (lam x.2) (handle e (lam x.1) (raise e 0))"
>
> I think I can not apply the rule 8 to this term.
>
> [ ]'s
> Michel Machado



This archive was generated by hypermail 2b29 : Thu Dec 14 2006 - 16:31:59 EST