User loginNavigation |
archivesY in haskell
From the Haskell mailing list.
People often wonder about Y in Haskell, so I think it is worth to have this link in the archive. Nothing new here for Haskell mavens, though. By Ehud Lamm at 2005-04-19 06:51 | Functional | login or register to post comments | other blogs | 4746 reads
Datatype Laws without Signatures
Datatype Laws without Signatures
Using the well-known categorical notion of `functor' one may define the concept of datatype (algebra) without being forced to introduce a signature, that is, names and typings for the individual sorts (types) and operations involved. This has proved to be advantageous for those theory developments where one is not interested in the syntactic appearance of an algebra. Does it sound like "a module without a signature"? If you like programming with bananas, lenses, and other weird things you might like this paper as well. PS: OTOH, if you are sceptic about bialgebraic programming, then dialgebraic is definitely not for you. By Andris Birkmanis at 2005-04-19 07:56 | Category Theory | Functional | login or register to post comments | other blogs | 5290 reads
Relating FFTW and Split-Radix
Relating FFTW and Split-Radix. Proc. of ICESS'04, the First International Conference on Embedded Software and System, December 9-10 2004, Hangzhou (Zhejiang), China.
This ongoing attempt to reproduce an efficient implementation of FFT using staging and abstract interpretation attempts to answer the question "How can we get the raw performance of hardware without giving up the expressivity and clarity of software?" Here's how Oleg describes the contribution of this paper,
One may think that generating truly optimal power-of-two FFT is straightforward: we generate the naive radix-2 FFT code, and then optimize it, removing trivial multiplications (x*1), trivial additions (x+0), etc. That was the approach demonstrated previously. Oleg points out that the point isn't that they managed to reproduced the FFTW results. The crucial point is that we know exactly which identities (i.e., axioms) contributed to the optimum. The search was principled rather heuristic, and the code is generated in only one pass. There are no manipulations on the code: it is generated just right. By Ehud Lamm at 2005-04-19 08:13 | Meta-Programming | Software Engineering | 7 comments | other blogs | 10867 reads
Why Dependent Types MatterWhy Dependent Types Matter Abstract: via The Types Forum. |
Browse archivesActive forum topics |
Recent comments
36 weeks 1 day ago
36 weeks 1 day ago
36 weeks 1 day ago
1 year 6 weeks ago
1 year 10 weeks ago
1 year 12 weeks ago
1 year 12 weeks ago
1 year 14 weeks ago
1 year 19 weeks ago
1 year 19 weeks ago