User loginNavigation |
archivesY in haskell
From the Haskell mailing list.
People often wonder about Y in Haskell, so I think it is worth to have this link in the archive. Nothing new here for Haskell mavens, though. By Ehud Lamm at 2005-04-19 06:51 | Functional | login or register to post comments | other blogs | 4720 reads
Datatype Laws without Signatures
Datatype Laws without Signatures
Using the well-known categorical notion of `functor' one may define the concept of datatype (algebra) without being forced to introduce a signature, that is, names and typings for the individual sorts (types) and operations involved. This has proved to be advantageous for those theory developments where one is not interested in the syntactic appearance of an algebra. Does it sound like "a module without a signature"? If you like programming with bananas, lenses, and other weird things you might like this paper as well. PS: OTOH, if you are sceptic about bialgebraic programming, then dialgebraic is definitely not for you. By Andris Birkmanis at 2005-04-19 07:56 | Category Theory | Functional | login or register to post comments | other blogs | 5243 reads
Relating FFTW and Split-Radix
Relating FFTW and Split-Radix. Proc. of ICESS'04, the First International Conference on Embedded Software and System, December 9-10 2004, Hangzhou (Zhejiang), China.
This ongoing attempt to reproduce an efficient implementation of FFT using staging and abstract interpretation attempts to answer the question "How can we get the raw performance of hardware without giving up the expressivity and clarity of software?" Here's how Oleg describes the contribution of this paper,
One may think that generating truly optimal power-of-two FFT is straightforward: we generate the naive radix-2 FFT code, and then optimize it, removing trivial multiplications (x*1), trivial additions (x+0), etc. That was the approach demonstrated previously. Oleg points out that the point isn't that they managed to reproduced the FFTW results. The crucial point is that we know exactly which identities (i.e., axioms) contributed to the optimum. The search was principled rather heuristic, and the code is generated in only one pass. There are no manipulations on the code: it is generated just right. By Ehud Lamm at 2005-04-19 08:13 | Meta-Programming | Software Engineering | 7 comments | other blogs | 10777 reads
Why Dependent Types MatterWhy Dependent Types Matter Abstract: via The Types Forum. |
Browse archivesActive forum topics |
Recent comments
22 weeks 10 hours ago
22 weeks 14 hours ago
22 weeks 14 hours ago
44 weeks 1 day ago
48 weeks 3 days ago
50 weeks 22 hours ago
50 weeks 22 hours ago
1 year 4 days ago
1 year 5 weeks ago
1 year 5 weeks ago