Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I
|
|
|
- Millicent Hardy
- 10 years ago
- Views:
Transcription
1 Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I John McCarthy, Massachusetts Institute of Technology, Cambridge, Mass. April Introduction A programming system called LISP (for LISt Processor) has been developed for the IBM 704 computer by the Artificial Intelligence group at M.I.T. The system was designed to facilitate experiments with a proposed system called the Advice Taker, whereby a machine could be instructed to handle declarative as well as imperative sentences and could exhibit common sense in carrying out its instructions. The original proposal [1] for the Advice Taker was made in November The main requirement was a programming system for manipulating expressions representing formalized declarative and imperative sentences so that the Advice Taker system could make deductions. In the course of its development the LISP system went through several stages of simplification and eventually came to be based on a scheme for representing the partial recursive functions of a certain class of symbolic expressions. This representation is independent of the IBM 704 computer, or of any other electronic computer, and it now seems expedient to expound the system by starting with the class of expressions called S-expressions and the functions called S-functions. Putting this paper in L A TEXpartly supported by ARPA (ONR) grant N to Stanford University where John McCarthy has been since Copied with minor notational changes from CACM, April If you want the exact typography, look there. Current address, John McCarthy, Computer Science Department, Stanford, CA 94305, ( [email protected]), (URL: ) 1
2 In this article, we first describe a formalism for defining functions recursively. We believe this formalism has advantages both as a programming language and as a vehicle for developing a theory of computation. Next, we describe S-expressions and S-functions, give some examples, and then describe the universal S-function apply which plays the theoretical role of a universal Turing machine and the practical role of an interpreter. Then we describe the representation of S-expressions in the memory of the IBM 704 by list structures similar to those used by Newell, Shaw and Simon [2], and the representation of S-functions by program. Then we mention the main features of the LISP programming system for the IBM 704. Next comes another way of describing computations with symbolic expressions, and finally we give a recursive function interpretation of flow charts. We hope to describe some of the symbolic computations for which LISP has been used in another paper, and also to give elsewhere some applications of our recursive function formalism to mathematical logic and to the problem of mechanical theorem proving. 2 Functions and Function Definitions We shall need a number of mathematical ideas and notations concerning functions in general. Most of the ideas are well known, but the notion of conditional expression is believed to be new 1, and the use of conditional expressions permits functions to be defined recursively in a new and convenient way. a. Partial Functions. A partial function is a function that is defined only on part of its domain. Partial functions necessarily arise when functions are defined by computations because for some values of the arguments the computation defining the value of the function may not terminate. However, some of our elementary functions will be defined as partial functions. b. Propositional Expressions and Predicates. A propositional expression is an expression whose possible values are T (for truth) and F (for falsity). We shall assume that the reader is familiar with the propositional connectives ( and ), ( or ), and ( not ). Typical propositional expressions are: 1 reference Kleene 2
3 x < y (x < y) (b = c) x is prime A predicate is a function whose range consists of the truth values T and F. c. Conditional Expressions. The dependence of truth values on the values of quantities of other kinds is expressed in mathematics by predicates, and the dependence of truth values on other truth values by logical connectives. However, the notations for expressing symbolically the dependence of quantities of other kinds on truth values is inadequate, so that English words and phrases are generally used for expressing these dependences in texts that describe other dependences symbolically. For example, the function x is usually defined in words. Conditional expressions are a device for expressing the dependence of quantities on propositional quantities. A conditional expression has the form (p 1 e 1,, p n e n ) where the p s are propositional expressions and the e s are expressions of any kind. It may be read, If p 1 then e 1 otherwise if p 2 then e 2,, otherwise if p n then e n, or p 1 yields e 1,, p n yields e n. 2 We now give the rules for determining whether the value of (p 1 e 1,, p n e n ) is defined, and if so what its value is. Examine the p s from left to right. If a p whose value is T is encountered before any p whose value is undefined is encountered then the value of the conditional expression is the value of the corresponding e (if this is defined). If any undefined p is encountered before 2 I sent a proposal for conditional expressions to a CACM forum on what should be included in Algol 60. Because the item was short, the editor demoted it to a letter to the editor, for which CACM subsequently apologized. The notation given here was rejected for Algol 60, because it had been decided that no new mathematical notation should be allowed in Algol 60, and everything new had to be English. The if...then...else that Algol 60 adopted was suggested by John Backus. 3
4 a true p, or if all p s are false, or if the e corresponding to the first true p is undefined, then the value of the conditional expression is undefined. We now give examples. (1 < 2 4, 1 > 2 3) = 4 (2 < 1 4, 2 > 1 3, 2 > 1 2) = 3 (2 < 1 4, T 3) = 3 (2 < 1 0 0, T 3) = 3 (2 < 1 3, T 0 ) is undefined 0 (2 < 1 3, 4 < 1 4) is undefined Some of the simplest applications of conditional expressions are in giving such definitions as x = (x < 0 x, T x) δ ij = (i = j 1, T 0) sgn(x) = (x < 0 1, x = 0 0, T 1) d. Recursive Function Definitions. By using conditional expressions we can, without circularity, define functions by formulas in which the defined function occurs. For example, we write n! = (n = 0 1, T n (n 1)!) When we use this formula to evaluate 0! we get the answer 1; because of the way in which the value of a conditional expression was defined, the meaningless 4
5 expression 0 (0-1)! does not arise. The evaluation of 2! according to this definition proceeds as follows: 2! = (2 = 0 1, T 2 (2 1)!) = 2 1! = 2 (1 = 0 1T (1 1)!) = 2 1 0! = 2 1 (0 = 0 1, T 0 (0 1)!) = = 2 We now give two other applications of recursive function definitions. The greatest common divisor, gcd(m,n), of two positive integers m and n is computed by means of the Euclidean algorithm. This algorithm is expressed by the recursive function definition: gcd(m, n) = (m > n gcd(n, m), rem(n, m) = 0 m, T gcd(rem(n, m), m)) where rem(n, m) denotes the remainder left when n is divided by m. The Newtonian algorithm for obtaining an approximate square root of a number a, starting with an initial approximation x and requiring that an acceptable approximation y satisfy y 2 a < ɛ, may be written as sqrt(a, x, ɛ) = ( x 2 a < ɛ x,t sqrt (a, 1(x + a ), ɛ)) 2 x The simultaneous recursive definition of several functions is also possible, and we shall use such definitions if they are required. There is no guarantee that the computation determined by a recursive definition will ever terminate and, for example, an attempt to compute n! from our definition will only succeed if n is a non-negative integer. If the computation does not terminate, the function must be regarded as undefined for the given arguments. The propositional connectives themselves can be defined by conditional expressions. We write 5
6 p q = (p q, T F) p q = (p T, T q) p = (p F, T T) p q = (p q, T T) It is readily seen that the right-hand sides of the equations have the correct truth tables. If we consider situations in which p or q may be undefined, the connectives and are seen to be noncommutative. For example if p is false and q is undefined, we see that according to the definitions given above p q is false, but q p is undefined. For our applications this noncommutativity is desirable, since p q is computed by first computing p, and if p is false q is not computed. If the computation for p does not terminate, we never get around to computing q. We shall use propositional connectives in this sense hereafter. e. Functions and Forms. It is usual in mathematics outside of mathematical logic to use the word function imprecisely and to apply it to forms such as y 2 + x. Because we shall later compute with expressions for functions, we need a distinction between functions and forms and a notation for expressing this distinction. This distinction and a notation for describing it, from which we deviate trivially, is given by Church [3]. Let f be an expression that stands for a function of two integer variables. It should make sense to write f(3, 4) and the value of this expression should be determined. The expression y 2 +x does not meet this requirement; y 2 +x(3, 4) is not a conventional notation, and if we attempted to define it we would be uncertain whether its value would turn out to be 13 or 19. Church calls an expression like y 2 + x, a form. A form can be converted into a function if we can determine the correspondence between the variables occurring in the form and the ordered list of arguments of the desired function. This is accomplished by Church s λ-notation. If E is a form in variables x 1,, x n, then λ((x 1,, x n ), E) will be taken to be the function of n variables whose value is determined by substituting the arguments for the variables x 1,, x n in that order in E and evaluating the resulting expression. For example, λ((x, y), y 2 + x) is a function of two variables, and λ((x, y), y 2 + x)(3, 4) = 19. The variables occurring in the list of variables of a λ-expression are dummy or bound, like variables of integration in a definite integral. That is, we may 6
7 change the names of the bound variables in a function expression without changing the value of the expression, provided that we make the same change for each occurrence of the variable and do not make two variables the same that previously were different. Thus λ((x, y), y 2 + x), λ((u, v), v 2 + u) and λ((y, x), x 2 + y) denote the same function. We shall frequently use expressions in which some of the variables are bound by λ s and others are not. Such an expression may be regarded as defining a function with parameters. The unbound variables are called free variables. An adequate notation that distinguishes functions from forms allows an unambiguous treatment of functions of functions. It would involve too much of a digression to give examples here, but we shall use functions with functions as arguments later in this report. Difficulties arise in combining functions described by λ-expressions, or by any other notation involving variables, because different bound variables may be represented by the same symbol. This is called collision of bound variables. There is a notation involving operators that are called combinators for combining functions without the use of variables. Unfortunately, the combinatory expressions for interesting combinations of functions tend to be lengthy and unreadable. f. Expressions for Recursive Functions. The λ-notation is inadequate for naming functions defined recursively. For example, using λ s, we can convert the definition into sqrt(a, x, ɛ) = ( x 2 a < ɛ x, T sqrt(a, 1 2 (x + a ), ɛ)) x sqrt = λ((a, x, ɛ), ( x 2 a < ɛ x, T sqrt(a, 1 2 (x + a ), ɛ))), x but the right-hand side cannot serve as an expression for the function because there would be nothing to indicate that the reference to sqrt within the expression stood for the expression as a whole. In order to be able to write expressions for recursive functions, we introduce another notation. label(a, E) denotes the expression E, provided that occurrences of a within E are to be interpreted as referring to the expression 7
8 as a whole. Thus we can write label(sqrt, λ((a, x, ɛ), ( x 2 a < ɛ x, T sqrt(a, 1(x + a ), ɛ)))) 2 x as a name for our sqrt function. The symbol a in label (a, E) is also bound, that is, it may be altered systematically without changing the meaning of the expression. It behaves differently from a variable bound by a λ, however. 3 Recursive Functions of Symbolic Expressions We shall first define a class of symbolic expressions in terms of ordered pairs and lists. Then we shall define five elementary functions and predicates, and build from them by composition, conditional expressions, and recursive definitions an extensive class of functions of which we shall give a number of examples. We shall then show how these functions themselves can be expressed as symbolic expressions, and we shall define a universal function apply that allows us to compute from the expression for a given function its value for given arguments. Finally, we shall define some functions with functions as arguments and give some useful examples. a. A Class of Symbolic Expressions. We shall now define the S-expressions (S stands for symbolic). They are formed by using the special characters ) ( and an infinite set of distinguishable atomic symbols. For atomic symbols, we shall use strings of capital Latin letters and digits with single imbedded 8
9 blanks. 3 Examples of atomic symbols are A ABA APPLE PIE NUMBER 3 There is a twofold reason for departing from the usual mathematical practice of using single letters for atomic symbols. First, computer programs frequently require hundreds of distinguishable symbols that must be formed from the 47 characters that are printable by the IBM 704 computer. Second, it is convenient to allow English words and phrases to stand for atomic entities for mnemonic reasons. The symbols are atomic in the sense that any substructure they may have as sequences of characters is ignored. We assume only that different symbols can be distinguished. S-expressions are then defined as follows: 1. Atomic symbols are S-expressions. 2. If e 1 and e 2 are S-expressions, so is (e 1 e 2 ). Examples of S-expressions are AB (A B) ((AB C) D) An S-expression is then simply an ordered pair, the terms of which may be atomic symbols or simpler S-expressions. We can can represent a list of arbitrary length in terms of S-expressions as follows. The list is represented by the S-expression (m 1, m 2,, m n ) (m 1 (m 2 ( (m n NIL) ))) Here NIL is an atomic symbol used to terminate lists. Since many of the symbolic expressions with which we deal are conveniently expressed as lists, we shall introduce a list notation to abbreviate certain S-expressions. We have remark: Imbedded blanks could be allowed within symbols, because lists were then written with commas between elements. 9
10 l. (m) stands for (m NIL). 2. (m 1,, m n ) stands for (m 1 ( (m n NIL) )). 3. (m 1,, m n x) stands for (m 1 ( (m n x) )). Subexpressions can be similarly abbreviated. Some examples of these abbreviations are ((AB, C), D) for ((AB (C NIL)) (D NIL)) ((A, B), C, D E) for ((A (B NIL)) (C (D E))) Since we regard the expressions with commas as abbreviations for those not involving commas, we shall refer to them all as S-expressions. b. Functions of S-expressions and the Expressions That Represent Them. We now define a class of functions of S-expressions. The expressions representing these functions are written in a conventional functional notation. However, in order to clearly distinguish the expressions representing functions from S- expressions, we shall use sequences of lower-case letters for function names and variables ranging over the set of S-expressions. We also use brackets and semicolons, instead of parentheses and commas, for denoting the application of functions to their arguments. Thus we write car[x] car[cons[(a B); x]] In these M-expressions (meta-expressions) any S-expression that occur stand for themselves. c. The Elementary S-functions and Predicates. We introduce the following functions and predicates: 1. atom. atom[x] has the value of T or F according to whether x is an atomic symbol. Thus atom [X] = T atom [(X A)] = F 2. eq. eq [x;y] is defined if and only if both x and y are atomic. eq [x; y] = T if x and y are the same symbol, and eq [x; y] = F otherwise. Thus 10
11 eq [X; X] = T eq [X; A] = F eq [X; (X A)] is undefined. 3. car. car[x] is defined if and only if x is not atomic. car [(e 1 e 2 )] = e 1. Thus car [X] is undefined. car [(X A)] = X car [((X A) Y )] = (X A) 4. cdr. cdr [x] is also defined when x is not atomic. We have cdr [(e 1 e 2 )] = e 2. Thus cdr [X] is undefined. cdr [(X A)] = A cdr [((X A) Y )] = Y 5. cons. cons [x; y] is defined for any x and y. We have cons [e 1 ; e 2 ] = (e 1 e 2 ). Thus cons [X; A] = (X A) cons [(X A); Y ] = ((X A)Y ) car, cdr, and cons are easily seen to satisfy the relations car [cons [x; y]] = x cdr [cons [x; y]] = y cons [car [x]; cdr [x]] = x, provided that x is not atomic. The names car and cons will come to have mnemonic significance only when we discuss the representation of the system in the computer. Compositions of car and cdr give the subexpressions of a given expression in a given position. Compositions of cons form expressions of a given structure out of parts. The class of functions which can be formed in this way is quite limited and not very interesting. d. Recursive S-functions. We get a much larger class of functions (in fact, all computable functions) when we allow ourselves to form new functions of S-expressions by conditional expressions and recursive definition. We now give 11
12 some examples of functions that are definable in this way. 1. ff[x]. The value of ff[x] is the first atomic symbol of the S-expression x with the parentheses ignored. Thus We have ff[((a B) C)] = A ff[x] = [atom[x] x; T ff[car[x]]] We now trace in detail the steps in the evaluation of ff [((A B) C)]: ff [((A B) C)] = [atom[((a B) C)] ((A B) C); T ff[car[((a B)C )]]] = [F ((A B) C); T ff[car[((a B) C)]]] = [T ff[car[((a B) C)]]] = ff[car[((a B) C)]] = ff[(a B)] = [atom[(a B)] (A B); T ff[car[(a B)]]] = [F (A B); T ff[car[(a B)]]] = [T ff[car[(a B)]]] = ff[car[(a B)]] = ff[a] 12
13 = [atom[a] A; T ff[car[a]]] = [T A; T ff[car[a]]] = A 2. subst [x; y; z]. This function gives the result of substituting the S- expression x for all occurrences of the atomic symbol y in the S-expression z. It is defined by subst [x; y; z] = [atom [z] [eq [z; y] x; T z]; T cons [subst [x; y; car [z]]; subst [x; y; cdr [z]]]] As an example, we have subst[(x A); B; ((A B) C)] = ((A (X A)) C) 3. equal [x; y]. This is a predicate that has the value T if x and y are the same S-expression, and has the value F otherwise. We have equal [x; y] = [atom [x] atom [y] eq [x; y]] [ atom [x] atom [y] equal [car [x]; car [y]] equal [cdr [x]; cdr [y]]] It is convenient to see how the elementary functions look in the abbreviated list notation. The reader will easily verify that (i) car[(m 1, m 2,, m n )] = m 1 (ii) cdr[(m s, m 2,, m n )] = (m 2,, m n ) (iii) cdr[(m)] = NIL (iv) cons[m 1 ; (m 2,, m n )] = (m 1, m 2,, m n ) (v) cons[m; NIL] = (m) We define 13
14 null[x] = atom[x] eq[x; NIL] This predicate is useful in dealing with lists. Compositions of car and cdr arise so frequently that many expressions can be written more concisely if we abbreviate cadr[x] for car[cdr[x]], caddr[x] for car[cdr[cdr[x]]], etc. Another useful abbreviation is to write list [e 1 ; e 2 ; ; e n ] for cons[e 1 ; cons[e 2 ; ; cons[e n ; NIL] ]]. This function gives the list, (e 1,, e n ), as a function of its elements. The following functions are useful when S-expressions are regarded as lists. 1. append [x;y]. append [x; y] = [null[x] y; T cons [car [x]; append [cdr [x]; y]]] An example is append [(A, B); (C, D, E)] = (A, B, C, D, E) 2. among [x;y]. This predicate is true if the S-expression x occurs among the elements of the list y. We have among[x; y] = null[y] [equal[x; car[y]] among[x; cdr[y]]] 3. pair [x;y]. This function gives the list of pairs of corresponding elements of the lists x and y. We have pair[x; y] = [null[x] null[y] NIL; atom[x] atom[y] cons[list[car[x]; car[y]]; pair[cdr[x]; cdr[y]]] An example is pair[(a, B, C); (X, (Y, Z), U)] = ((A, X), (B, (Y, Z)), (C, U)). 14
15 4. assoc [x;y]. If y is a list of the form ((u 1, v 1 ),, (u n, v n )) and x is one of the u s, then assoc [x; y] is the corresponding v. We have assoc[x; y] = eq[caar[y]; x] cadar[y]; T assoc[x; cdr[y]]] An example is assoc[x; ((W, (A, B)), (X, (C, D)), (Y, (E, F)))] = (C, D). 5. sublis[x; y]. Here x is assumed to have the form of a list of pairs ((u 1, v 1 ),, (u n, v n )), where the u s are atomic, and y may be any S-expression. The value of sublis[x; y] is the result of substituting each v for the corresponding u in y. In order to define sublis, we first define an auxiliary function. We have and sub2[x; z] = [null[x] z; eq[caar[x]; z] cadar[x]; T sub2[cdr[x]; z]] sublis[x; y] = [atom[y] sub2[x; y]; T cons[sublis[x; car[y]]; sublis[x; cdr[y]]] We have sublis [((X, (A, B)), (Y, (B, C))); (A, X Y)] = (A, (A, B), B, C) e. Representation of S-Functions by S-Expressions. S-functions have been described by M-expressions. We now give a rule for translating M-expressions into S-expressions, in order to be able to use S-functions for making certain computations with S-functions and for answering certain questions about S- functions. The translation is determined by the following rules in rich we denote the translation of an M-expression E by E*. 1. If E is an S-expression E* is (QUOTE, E). 2. Variables and function names that were represented by strings of lowercase letters are translated to the corresponding strings of the corresponding uppercase letters. Thus car* is CAR, and subst* is SUBST. 3. A form f[e 1 ; ; e n ] is translated to (f, e 1, e n ). Thus cons [car [x]; cdr [x]] is (CONS, (CAR, X), (CDR, X)). 4. {[p 1 e 1 ; ; p n e n ]} is (COND, (p 1, e 1),, (p n e n)). 15
16 5. {λ[[x 1 ; ; x n ]; E]} is (LAMBDA, (x 1,, x n ), E ). 6. {label[a; E]} is (LABEL, a, E ). With these conventions the substitution function whose M-expression is label [subst; λ [[x; y; z]; [atom [z] [eq [y; z] x; T z]; T cons [subst [x; y; car [z]]; subst [x; y; cdr [z]]]]]] has the S-expression (LABEL, SUBST, (LAMBDA, (X, Y, Z), (COND ((ATOM, Z), (COND, (EQ, Y, Z), X), ((QUOTE, T), Z))), ((QUOTE, T), (CONS, (SUBST, X, Y, (CAR Z)), (SUBST, X, Y, (CDR, Z))))))) This notation is writable and somewhat readable. It can be made easier to read and write at the cost of making its structure less regular. If more characters were available on the computer, it could be improved considerably. 4 f. The Universal S-Function apply. There is an S-function apply with the property that if f is an S-expression for an S-function f and args is a list of arguments of the form (arg 1,, arg n ), where arg 1,, arg n are arbitrary S- expressions, then apply[f; args] and f [arg 1 ; ; arg n ] are defined for the same values of arg 1,, arg n, and are equal when defined. For example, λ[[x; y]; cons[car[x]; y]][(a, B); (C, D)] = apply[(lambda, (X, Y ), (CONS, (CAR, X), Y )); ((A, B), (C, D))] = (A, C, D) The S-function apply is defined by where apply[f; args] = eval[cons[f; appq[args]]; NIL], appq[m] = [null[m] NIL; T cons[list[quot E; car[m]]; appq[cdr[m]]]] and eval[e; a] = [ : More characters were made available on SAIL and later on the Lisp machines. Alas, the world went back to inferior character sets again though not as far back as when this paper was written in early
17 atom [e] assoc [e; a]; atom [car [e]] [ eq [car [e]; QUOTE] cadr [e]; eq [car [e]; ATOM] atom [eval [cadr [e]; a]]; eq [car [e]; EQ] [eval [cadr [e]; a] = eval [caddr [e]; a]]; eq [car [e]; COND] evcon [cdr [e]; a]; eq [car [e]; CAR] car [eval [cadr [e]; a]]; eq [car [e]; CDR] cdr [eval [cadr [e]; a]]; eq [car [e]; CONS] cons [eval [cadr [e]; a]; eval [caddr [e]; a]]; T eval [cons [assoc [car [e]; a]; evlis [cdr [e]; a]]; a]]; eq [caar [e]; LABEL] eval [cons [caddar [e]; cdr [e]]; cons [list [cadar [e]; car [e]; a]]; eq [caar [e]; LAMBDA] eval [caddar [e]; append [pair [cadar [e]; evlis [cdr [e]; a]; a]]] and and evcon[c; a] = [eval[caar[c]; a] eval[cadar[c]; a]; T evcon[cdr[c]; a]] evlis[m; a] = [null[m] NIL; T cons[eval[car[m]; a]; evlis[cdr[m]; a]]] 17
18 We now explain a number of points about these definitions apply itself forms an expression representing the value of the function applied to the arguments, and puts the work of evaluating this expression onto a function eval. It uses appq to put quotes around each of the arguments, so that eval will regard them as standing for themselves. 2. eval[e; a] has two arguments, an expression e to be evaluated, and a list of pairs a. The first item of each pair is an atomic symbol, and the second is the expression for which the symbol stands. 3. If the expression to be evaluated is atomic, eval evaluates whatever is paired with it first on the list a. 4. If e is not atomic but car[e] is atomic, then the expression has one of the forms (QUOTE, e) or (ATOM, e) or (EQ, e 1, e 2 ) or (COND, (p 1, e 1 ),, (p n, e n )), or (CAR, e) or (CDR, e) or (CONS, e 1, e 2 ) or (f, e 1,, e n ) where f is an atomic symbol. In the case (QUOTE, e) the expression e, itself, is taken. In the case of (ATOM, e) or (CAR, e) or (CDR, e) the expression e is evaluated and the appropriate function taken. In the case of (EQ, e 1, e 2 ) or (CONS, e 1, e 2 ) two expressions have to be evaluated. In the case of (COND, (p 1, e 1 ), (p n, e n )) the p s have to be evaluated in order until a true p is found, and then the corresponding e must be evaluated. This is accomplished by evcon. Finally, in the case of (f, e 1,, e n ) we evaluate the expression that results from replacing f in this expression by whatever it is paired with in the list a. 5. The evaluation of ((LABEL, f, E), e 1,, e n ) is accomplished by evaluating (E, e 1,, e n ) with the pairing (f, (LABEL, f, E)) put on the front of the previous list a of pairs. 6. Finally, the evaluation of ((LAMBDA, (x 1,, x n ), E), e 1, e n ) is accomplished by evaluating E with the list of pairs ((x 1, e 1 ),, ((x n, e n )) put on the front of the previous list a. The list a could be eliminated, and LAMBDA and LABEL expressions evaluated by substituting the arguments for the variables in the expressions E. Unfortunately, difficulties involving collisions of bound variables arise, but they are avoided by using the list a : This version isn t quite right. A comparison of this and other versions of eval including what was actually implemented (and debugged) is given in The Influence of the Designer on the Design by Herbert Stoyan and included in Artificial Intelligence and Mathematical Theory of Computation: Papers in Honor of John McCarthy, Vladimir Lifschitz (ed.), Academic Press,
19 Calculating the values of functions by using apply is an activity better suited to electronic computers than to people. As an illustration, however, we now give some of the steps for calculating apply [(LABEL, FF, (LAMBDA, (X), (COND, (ATOM, X), X), ((QUOTE, T),(FF, (CAR, X))))));((A B))] = A The first argument is the S-expression that represents the function ff defined in section 3d. We shall abbreviate it by using the letter φ. We have apply [φ; ( (A B) )] = eval [((LABEL, FF, ψ), (QUOTE, (A B))); NIL] where ψ is the part of φ beginning (LAMBDA = eval[((lambda, (X), ω), (QUOTE, (A B)));((FF, φ))] where ω is the part of ψ beginning (COND = eval [(COND, (π 1, ɛ 1 ), (π 2, ɛ 2 )); ((X, (QUOTE, (A B) ) ), (FF, φ) )] Denoting ((X, (QUOTE, (A B))), (FF, φ)) by a, we obtain = evcon [((π 1, ɛ 1 ), (π 2, ɛ 2 )); a] This involves eval [π 1 ; a] = eval [( ATOM, X); a] = atom [eval [X; a]] = atom [eval [assoc [X; ((X, (QUOTE, (A B))), (FF,φ))];a]] = atom [eval [(QUOTE, (A B)); a]] = atom [(A B)], = F Our main calulation continues with 19
20 apply [φ; ((A B))] = evcon [((π 2, ɛ 2, )); a], which involves eval [π 2 ; a] = eval [(QUOTE, T); a] = T Our main calculation again continues with apply [φ; ((A B))] = eval [ɛ 2 ; a] = eval [(FF, (CAR, X));a] = eval [Cons [φ; evlis [((CAR, X)); a]]; a] Evaluating evlis [((CAR, X)); a] involves eval [(CAR, X); a] = car [eval [X; a]] = car [(A B)], where we took steps from the earlier computation of atom [eval [X; a]] = A, and so evlis [((CAR, X)); a] then becomes list [list [QUOTE; A]] = ((QUOTE, A)), and our main quantity becomes = eval [(φ, (QUOTE, A)); a] The subsequent steps are made as in the beginning of the calculation. The LABEL and LAMBDA cause new pairs to be added to a, which gives a new list of pairs a 1. The π 1 term of the conditional eval [(ATOM, X); a 1 ] has the 20
21 value T because X is paired with (QUOTE, A) first in a 1, rather than with (QUOTE, (A B)) as in a. Therefore we end up with eval [X; a 1 ] from the evcon, and this is just A. g. Functions with Functions as Arguments. There are a number of useful functions some of whose arguments are functions. They are especially useful in defining other functions. One such function is maplist[x; f] with an S- expression argument x and an argument f that is a function from S-expressions to S-expressions. We define maplist[x; f] = [null[x] NIL; T cons[f[x]; maplist[cdr[x]; f]]] The usefulness of maplist is illustrated by formulas for the partial derivative with respect to x of expressions involving sums and products of x and other variables. The S-expressions that we shall differentiate are formed as follows. 1. An atomic symbol is an allowed expression. 2. If e 1, e 2,, e n are allowed expressions, ( PLUS, e 1,, e n ) and (TIMES, e 1,, e n ) are also, and represent the sum and product, respectively, of e 1,, e n. This is, essentially, the Polish notation for functions, except that the inclusion of parentheses and commas allows functions of variable numbers of arguments. An example of an allowed expression is (TIMES, X, (PLUS, X, A), Y), the conventional algebraic notation for which is X(X + A)Y. Our differentiation formula, which gives the derivative of y with respect to x, is diff [y; x] = [atom [y] [eq [y; x] ONE; T ZERO]; eq [car [Y]; PLUS] cons [PLUS; maplist [cdr [y]; λ[[z]; diff [car [z]; x]]]]; eq[car [y]; TIMES] cons[plus; maplist[cdr[y]; λ[[z]; cons [TIMES; maplist[cdr [y]; λ[[w]; eq [z; w] car [w]; T diff [car [[w]; x]]]]]]] The derivative of the expression (TIMES, X, (PLUS, X, A), Y), as computed by this formula, is (PLUS, (TIMES, ONE, (PLUS, X, A), Y), (TIMES, X, (PLUS, ONE, ZERO), Y), (TIMES, X, (PLUS, X, A), ZERO)) Besides maplist, another useful function with functional arguments is search, which is defined as search[x; p; f; u] = [null[x] u; p[x] f[x]; T search[cdr[x]; p; f; u] 21
22 The function search is used to search a list for an element that has the property p, and if such an element is found, f of that element is taken. If there is no such element, the function u of no arguments is computed. 4 The LISP Programming System The LISP programming system is a system for using the IBM 704 computer to compute with symbolic information in the form of S-expressions. It has been or will be used for the following purposes: l. Writing a compiler to compile LISP programs into machine language. 2. Writing a program to check proofs in a class of formal logical systems. 3. Writing programs for formal differentiation and integration. 4. Writing programs to realize various algorithms for generating proofs in predicate calculus. 5. Making certain engineering calculations whose results are formulas rather than numbers. 6. Programming the Advice Taker system. The basis of the system is a way of writing computer programs to evaluate S-functions. This will be described in the following sections. In addition to the facilities for describing S-functions, there are facilities for using S-functions in programs written as sequences of statements along the lines of FORTRAN (4) or ALGOL (5). These features will not be described in this article. a. Representation of S-Expressions by List Structure. A list structure is a collection of computer words arranged as in figure 1a or 1b. Each word of the list structure is represented by one of the subdivided rectangles in the figure. The left box of a rectangle represents the address field of the word and the right box represents the decrement field. An arrow from a box to another rectangle means that the field corresponding to the box contains the location of the word corresponding to the other rectangle. 22
23 Fig. 1 It is permitted for a substructure to occur in more than one place in a list structure, as in figure 1b, but it is not permitted for a structure to have cycles, as in figure 1c. An atomic symbol is represented in the computer by a list structure of special form called the association list of the symbol. The address field of the first word contains a special constant which enables the program to tell that this word represents an atomic symbol. We shall describe association lists in section 4b. An S-expression x that is not atomic is represented by a word, the address and decrement parts of which contain the locations of the subexpressions car[x] and cdr[x], respectively. If we use the symbols A, B, etc. to denote the locations of the association list of these symbols, then the S-expression ((A B) (C (E F))) is represented by the list structure a of figure 2. Turning to the list form of S-expressions, we see that the S-expression (A, (B, C), D), which is an abbreviation for (A ((B (C NIL)) (D NIL))), is represented by the list structure of figure 2b. 23
24 C A D A B E F B C (a) (b) Figure 2 When a list structure is regarded as representing a list, we see that each term of the list occupies the address part of a word, the decrement part of which points to the word containing the next term, while the last word has NIL in its decrement. An expression that has a given subexpression occurring more than once can be represented in more than one way. Whether the list structure for the subexpression is or is not repeated depends upon the history of the program. Whether or not a subexpression is repeated will make no difference in the results of a program as they appear outside the machine, although it will affect the time and storage requirements. For example, the S-expression ((A B) (A B)) can be represented by either the list structure of figure 3a or 3b. A B A B A B (a) (b) Figure 3 The prohibition against circular list structures is essentially a prohibition 24
25 against an expression being a subexpression of itself. Such an expression could not exist on paper in a world with our topology. Circular list structures would have some advantages in the machine, for example, for representing recursive functions, but difficulties in printing them, and in certain other operations, make it seem advisable not to use them for the present. The advantages of list structures for the storage of symbolic expressions are: 1. The size and even the number of expressions with which the program will have to deal cannot be predicted in advance. Therefore, it is difficult to arrange blocks of storage of fixed length to contain them. 2. Registers can be put back on the free-storage list when they are no longer needed. Even one register returned to the list is of value, but if expressions are stored linearly, it is difficult to make use of blocks of registers of odd sizes that may become available. 3. An expression that occurs as a subexpression of several expressions need be represented in storage only once. b. Association Lists 6. In the LISP programming system we put more in the association list of a symbol than is required by the mathematical system described in the previous sections. In fact, any information that we desire to associate with the symbol may be put on the association list. This information may include: the print name, that is, the string of letters and digits which represents the symbol outside the machine; a numerical value if the symbol represents a number; another S-expression if the symbol, in some way, serves as a name for it; or the location of a routine if the symbol represents a function for which there is a machine-language subroutine. All this implies that in the machine system there are more primitive entities than have been described in the sections on the mathematical system. For the present, we shall only describe how print names are represented on association lists so that in reading or printing the program can establish a correspondence between information on punched cards, magnetic tape or printed page and the list structure inside the machine. The association list of the symbol DIFFERENTIATE has a segment of the form shown in figure 4. Here pname is a symbol that indicates that the structure for the print name of the symbol whose association list this is hanging from the next word on the association list. In the second row of the figure we have a list of three words. The address part of each of these words points to a Word containing : These were later called property lists. 25
26 six 6-bit characters. The last word is filled out with a 6-bit combination that does not represent a character printable by the computer. (Recall that the IBM 7O4 has a 36-bit word and that printable characters are each represented by 6 bits.) The presence of the words with character information means that the association lists do not themselves represent S-expressions, and that only some of the functions for dealing with S-expressions make sense within an association list.... pname... DIFFER ENTIAT E?????? Figure 4 c. Free-Storage List. At any given time only a part of the memory reserved for list structures will actually be in use for storing S-expressions. The remaining registers (in our system the number, initially, is approximately 15,000) are arranged in a single list called the free-storage list. A certain register, FREE, in the program contains the location of the first register in this list. When a word is required to form some additional list structure, the first word on the free-storage list is taken and the number in register FREE is changed to become the location of the second word on the free-storage list. No provision need be made for the user to program the return of registers to the free-storage list. This return takes place automatically, approximately as follows (it is necessary to give a simplified description of this process in this report): There is a fixed set of base registers in the program which contains the locations of list structures that are accessible to the program. Of course, because list structures branch, an arbitrary number of registers may be involved. Each register that is accessible to the program is accessible because it can be reached from one or more of the base registers by a chain of car and cdr operations. When 26
27 the contents of a base register are changed, it may happen that the register to which the base register formerly pointed cannot be reached by a car cdr chain from any base register. Such a register may be considered abandoned by the program because its contents can no longer be found by any possible program; hence its contents are no longer of interest, and so we would like to have it back on the free-storage list. This comes about in the following way. Nothing happens until the program runs out of free storage. When a free register is wanted, and there is none left on the free-storage list, a reclamation 7 cycle starts. First, the program finds all registers accessible from the base registers and makes their signs negative. This is accomplished by starting from each of the base registers and changing the sign of every register that can be reached from it by a car cdr chain. If the program encounters a register in this process which already has a negative sign, it assumes that this register has already been reached. After all of the accessible registers have had their signs changed, the program goes through the area of memory reserved for the storage of list structures and puts all the registers whose signs were not changed in the previous step back on the free-storage list, and makes the signs of the accessible registers positive again. This process, because it is entirely automatic, is more convenient for the programmer than a system in which he has to keep track of and erase unwanted lists. Its efficiency depends upon not coming close to exhausting the available memory with accessible lists. This is because the reclamation process requires several seconds to execute, and therefore must result in the addition of at least several thousand registers to the free-storage list if the program is not to spend most of its time in reclamation. d. Elementary S-Functions in the Computer. We shall now describe the computer representations of atom, =, car, cdr, and cons. An S-expression is communicated to the program that represents a function as the location of the word representing it, and the programs give S-expression answers in the same form. atom. As stated above, a word representing an atomic symbol has a special 7 We already called this process garbage collection, but I guess I chickened out of using it in the paper or else the Research Laboratory of Electronics grammar ladies wouldn t let me. 27
28 constant in its address part: atom is programmed as an open subroutine that tests this part. Unless the M-expression atom[e] occurs as a condition in a conditional expression, the symbol T or F is generated as the result of the test. In case of a conditional expression, a conditional transfer is used and the symbol T or F is not generated. eq. The program for eq[e; f] involves testing for the numerical equality of the locations of the words. This works because each atomic symbol has only one association list. As with atom, the result is either a conditional transfer or one of the symbols T or F. car. Computing car[x] involves getting the contents of the address part of register x. This is essentially accomplished by the single instruction CLA 0, i, where the argument is in index register, and the result appears in the address part of the accumulator. (We take the view that the places from which a function takes its arguments and into which it puts its results are prescribed in the definition of the function, and it is the responsibility of the programmer or the compiler to insert the required datamoving instructions to get the results of one calculation in position for the next.) ( car is a mnemonic for contents of the address part of register. ) cdr. cdr is handled in the same way as car, except that the result appears in the decrement part of the accumulator ( cdr stands for contents of the decrement part of register. ) cons. The value of cons[x; y] must be the location of a register that has x and y in its address and decrement parts, respectively. There may not be such a register in the computer and, even if there were, it would be time-consuming to find it. Actually, what we do is to take the first available register from the free-storage list, put x and y in the address and decrement parts, respectively, and make the value of the function the location of the register taken. ( cons is an abbreviation for construct. ) It is the subroutine for cons that initiates the reclamation when the freestorage list is exhausted. In the version of the system that is used at present cons is represented by a closed subroutine. In the compiled version, cons is open. e. Representation of S-Functions by Programs. The compilation of functions that are compositions of car, cdr, and cons, either by hand or by a compiler program, is straightforward. Conditional expressions give no trouble except that they must be so compiled that only the p s and e s that are re- 28
29 quired are computed. However, problems arise in the compilation of recursive functions. In general (we shall discuss an exception), the routine for a recursive function uses itself as a subroutine. For example, the program for subst[x; y; z] uses itself as a subroutine to evaluate the result of substituting into the subexpressions car[z] and cdr[z]. While subst[x; y; cdr[z]] is being evaluated, the result of the previous evaluation of subst[x; y; car[z]] must be saved in a temporary storage register. However, subst may need the same register for evaluating subst[x; y; cdr[z]]. This possible conflict is resolved by the SAVE and UN- SAVE routines that use the public push-down list 8. The SAVE routine is entered at the beginning of the routine for the recursive function with a request to save a given set of consecutive registers. A block of registers called the public push-down list is reserved for this purpose. The SAVE routine has an index that tells it how many registers in the push-down list are already in use. It moves the contents of the registers which are to be saved to the first unused registers in the push-down list, advances the index of the list, and returns to the program from which control came. This program may then freely use these registers for temporary storage. Before the routine exits it uses UNSAVE, which restores the contents of the temporary registers from the push-down list and moves back the index of this list. The result of these conventions is described, in programming terminology, by saying that the recursive subroutine is transparent to the temporary storage registers. f. Status of the LISP Programming System (February 1960). A variant of the function apply described in section 5f has been translated into a program APPLY for the IBM 704. Since this routine can compute values of S-functions given their descriptions as S-expressions and their arguments, it serves as an interpreter for the LISP programming language which describes computation processes in this way. The program APPLY has been imbedded in the LISP programming system which has the following features: 1. The programmer may define any number of S-functions by S-expressions. these functions may refer to each other or to certain S-functions represented by machine language program. 2. The values of defined functions may be computed. 3. S-expressions may be read and printed (directly or via magnetic tape) : now called a stack 29
30 4. Some error diagnostic and selective tracing facilities are included. 5. The programmer may have selected S-functions compiled into machine language programs put into the core memory. Values of compiled functions are computed about 60 times as fast as they would if interpreted. Compilation is fast enough so that it is not necessary to punch compiled program for future use. 6. A program feature allows programs containing assignment and go to statements in the style of ALGOL. 7. Computation with floating point numbers is possible in the system, but this is inefficient. 8. A programmer s manual is being prepared. The LISP programming system is appropriate for computations where the data can conveniently be represented as symbolic expressions allowing expressions of the same kind as subexpressions. A version of the system for the IBM 709 is being prepared. 5 Another Formalism for Functions of Symbolic Expressions There are a number of ways of defining functions of symbolic expressions which are quite similar to the system we have adopted. Each of them involves three basic functions, conditional expressions, and recursive function definitions, but the class of expressions corresponding to S-expressions is different, and so are the precise definitions of the functions. We shall describe one of these variants called linear LISP. The L-expressions are defined as follows: 1. A finite list of characters is admitted. 2. Any string of admitted characters in an L-expression. This includes the null string denoted by Λ. There are three functions of strings: 1. first[x] is the first character of the string x. f irst[λ] is undefined. For example: f irst[abc] = A 2. rest[x] is the string of characters which remains when the first character of the string is deleted. rest[λ] is undefined. For example: rest[abc] = BC. 3. combine[x; y] is the string formed by prefixing the character x to the string y. For example: combine[a; BC] = ABC 30
31 There are three predicates on strings: 1. char[x], x is a single character. 2. null[x], x is the null string. 3. x = y, defined for x and y characters. The advantage of linear LISP is that no characters are given special roles, as are parentheses, dots, and commas in LISP. This permits computations with all expressions that can be written linearly. The disadvantage of linear LISP is that the extraction of subexpressions is a fairly involved, rather than an elementary, operation. It is not hard to write, in linear LISP, functions that correspond to the basic functions of LISP, so that, mathematically, linear LISP includes LISP. This turns out to be the most convenient way of programming, in linear LISP, the more complicated manipulations. However, if the functions are to be represented by computer routines, LISP is essentially faster. 6 Flowcharts and Recursion Since both the usual form of computer program and recursive function definitions are universal computationally, it is interesting to display the relation between them. The translation of recursive symbolic functions into computer programs was the subject of the rest of this report. In this section we show how to go the other way, at least in principle. The state of the machine at any time during a computation is given by the values of a number of variables. Let these variables be combined into a vector ξ. Consider a program block with one entrance and one exit. It defines and is essentially defined by a certain function f that takes one machine configuration into another, that is, f has the form ξ = f(ξ). Let us call f the associated function of the program block. Now let a number of such blocks be combined into a program by decision elements π that decide after each block is completed which block will be entered next. Nevertheless, let the whole program still have one entrance and one exit. 31
32 π 1 3 f 1 f 2 S π 2 f 3 T π 3 f 4 Figure 5 We give as an example the flowcart of figure 5. Let us describe the function r[ξ] that gives the transformation of the vector ξ between entrance and exit of the whole block. We shall define it in conjunction with the functions s(ξ), and t[ξ], which give the transformations that ξ undergoes between the points S and T, respectively, and the exit. We have r[ξ] = [π 1 1[ξ] S[f 1 [ξ]]; T S[f 2 [ξ]]] S[ξ] = [π 2 1[ξ] r[ξ]; T t[f 3 [ξ]]] t[ξ] = [π3i[ξ] f 4 [ξ]; π 3 2[ξ] r[ξ]; T t[f 3 [ξ]]] Given a flowchart with a single entrance and a single exit, it is easy to write down the recursive function that gives the transformation of the state vector from entrance to exit in terms of the corresponding functions for the computation blocks and the predicates of the branch. In general, we proceed as follows. In figure 6, let β be an n-way branch point, and let f 1,, f n be the computations leading to branch points β 1, β 2,, β n. Let φ be the function 32
33 that transforms ξ between β and the exit of the chart, and let φ 1,, φ n be the corresponding functions for β 1,, β n. We then write φ[ξ] = [p 1 [ξ] φ 1 [f 1 [ξ]]; ; p n [ξ] φ n [ξ]]] β f 1 f2 f n... φ 1 φ 2 φ n β 1 β 2 β n φ Figure 6 7 Acknowledgments The inadequacy of the λ-notation for naming recursive functions was noticed by N. Rochester, and he discovered an alternative to the solution involving label which has been used here. The form of subroutine for cons which permits its composition with other functions was invented, in connection with another programming system, by C. Gerberick and H. L. Gelernter, of IBM Corporation. The LlSP programming system was developed by a group including R. Brayton, D. Edwards, P. Fox, L. Hodes, D. Luckham, K. Maling, J. McCarthy, D. Park, S. Russell. The group was supported by the M.I.T. Computation Center, and by the M.I.T. Research Laboratory of Electronics (which is supported in part by the the U.S. Army (Signal Corps), the U.S. Air Force (Office of Scientific Research, Air Research and Development Command), and the U.S. Navy (Office of Naval Research)). The author also wishes to acknowledge the personal financial sup- 33
34 port of the Alfred P. Sloan Foundation. REFERENCES 1. J. McCARTHY, Programs with common sense, Paper presented at the Symposium on the Mechanization of Thought Processes, National Physical Laboratory, Teddington, England, Nov , (Published in Proceedings of the Symposium by H. M. Stationery Office). 2. A. NEWELL AND J. C. SHAW, Programming the logic theory machine, Proc. Western Joint Computer Conference, Feb A. CHURCH, The Calculi of Lambda-Conversion (Princeton University Press, Princeton, N. J., 1941). 4. FORTRAN Programmer s Reference Manual, IBM Corporation, New York, Oct. 15, A. J. PERLIS AND K. SAMELS0N, International algebraic language, Preliminary Report, Comm. Assoc. Comp. Mach., Dec
A Programming Language for Mechanical Translation Victor H. Yngve, Massachusetts Institute of Technology, Cambridge, Massachusetts
[Mechanical Translation, vol.5, no.1, July 1958; pp. 25-41] A Programming Language for Mechanical Translation Victor H. Yngve, Massachusetts Institute of Technology, Cambridge, Massachusetts A notational
Functional Programming. Functional Programming Languages. Chapter 14. Introduction
Functional Programming Languages Chapter 14 Introduction Functional programming paradigm History Features and concepts Examples: Lisp ML 1 2 Functional Programming Functional Programming Languages The
CHAPTER 2. Logic. 1. Logic Definitions. Notation: Variables are used to represent propositions. The most common variables used are p, q, and r.
CHAPTER 2 Logic 1. Logic Definitions 1.1. Propositions. Definition 1.1.1. A proposition is a declarative sentence that is either true (denoted either T or 1) or false (denoted either F or 0). Notation:
Chapter 15 Functional Programming Languages
Chapter 15 Functional Programming Languages Introduction - The design of the imperative languages is based directly on the von Neumann architecture Efficiency (at least at first) is the primary concern,
Math Review. for the Quantitative Reasoning Measure of the GRE revised General Test
Math Review for the Quantitative Reasoning Measure of the GRE revised General Test www.ets.org Overview This Math Review will familiarize you with the mathematical skills and concepts that are important
Name: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.
Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to
[Refer Slide Time: 05:10]
Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? introduction Many students seem to have trouble with the notion of a mathematical proof. People that come to a course like Math 216, who certainly
2) Write in detail the issues in the design of code generator.
COMPUTER SCIENCE AND ENGINEERING VI SEM CSE Principles of Compiler Design Unit-IV Question and answers UNIT IV CODE GENERATION 9 Issues in the design of code generator The target machine Runtime Storage
SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison
SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89 by Joseph Collison Copyright 2000 by Joseph Collison All rights reserved Reproduction or translation of any part of this work beyond that permitted by Sections
Moving from CS 61A Scheme to CS 61B Java
Moving from CS 61A Scheme to CS 61B Java Introduction Java is an object-oriented language. This document describes some of the differences between object-oriented programming in Scheme (which we hope you
Handout #1: Mathematical Reasoning
Math 101 Rumbos Spring 2010 1 Handout #1: Mathematical Reasoning 1 Propositional Logic A proposition is a mathematical statement that it is either true or false; that is, a statement whose certainty or
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
Reading 13 : Finite State Automata and Regular Expressions
CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
COMPUTER SCIENCE TRIPOS
CST.98.5.1 COMPUTER SCIENCE TRIPOS Part IB Wednesday 3 June 1998 1.30 to 4.30 Paper 5 Answer five questions. No more than two questions from any one section are to be answered. Submit the answers in five
Summation Algebra. x i
2 Summation Algebra In the next 3 chapters, we deal with the very basic results in summation algebra, descriptive statistics, and matrix algebra that are prerequisites for the study of SEM theory. You
Factoring Polynomials
Factoring Polynomials Hoste, Miller, Murieka September 12, 2011 1 Factoring In the previous section, we discussed how to determine the product of two or more terms. Consider, for instance, the equations
6 EXTENDING ALGEBRA. 6.0 Introduction. 6.1 The cubic equation. Objectives
6 EXTENDING ALGEBRA Chapter 6 Extending Algebra Objectives After studying this chapter you should understand techniques whereby equations of cubic degree and higher can be solved; be able to factorise
Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.
Elementary Number Theory and Methods of Proof CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.edu/~cse215 1 Number theory Properties: 2 Properties of integers (whole
How To Program In Scheme (Prolog)
The current topic: Scheme! Introduction! Object-oriented programming: Python Functional programming: Scheme! Introduction Next up: Numeric operators, REPL, quotes, functions, conditionals Types and values
The following themes form the major topics of this chapter: The terms and concepts related to trees (Section 5.2).
CHAPTER 5 The Tree Data Model There are many situations in which information has a hierarchical or nested structure like that found in family trees or organization charts. The abstraction that models hierarchical
Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson
Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
3 SOFTWARE AND PROGRAMMING LANGUAGES
3 SOFTWARE AND PROGRAMMING LANGUAGES 3.1 INTRODUCTION In the previous lesson we discussed about the different parts and configurations of computer. It has been mentioned that programs or instructions have
How To Understand The Theory Of Computer Science
Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked
Bachelors of Computer Application Programming Principle & Algorithm (BCA-S102T)
Unit- I Introduction to c Language: C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating
C H A P T E R Regular Expressions regular expression
7 CHAPTER Regular Expressions Most programmers and other power-users of computer systems have used tools that match text patterns. You may have used a Web search engine with a pattern like travel cancun
Basic Lisp Operations
Basic Lisp Operations BLO-1 Function invocation It is an S-expression just another list! ( function arg1 arg2... argn) First list item is the function prefix notation The other list items are the arguments
If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C?
Problem 3 If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C? Suggested Questions to ask students about Problem 3 The key to this question
A Concrete Introduction. to the Abstract Concepts. of Integers and Algebra using Algebra Tiles
A Concrete Introduction to the Abstract Concepts of Integers and Algebra using Algebra Tiles Table of Contents Introduction... 1 page Integers 1: Introduction to Integers... 3 2: Working with Algebra Tiles...
11 Ideals. 11.1 Revisiting Z
11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(
Formal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
Integer roots of quadratic and cubic polynomials with integer coefficients
Integer roots of quadratic and cubic polynomials with integer coefficients Konstantine Zelator Mathematics, Computer Science and Statistics 212 Ben Franklin Hall Bloomsburg University 400 East Second Street
NP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
Chapter One Introduction to Programming
Chapter One Introduction to Programming 1-1 Algorithm and Flowchart Algorithm is a step-by-step procedure for calculation. More precisely, algorithm is an effective method expressed as a finite list of
Linear Algebra Notes for Marsden and Tromba Vector Calculus
Linear Algebra Notes for Marsden and Tromba Vector Calculus n-dimensional Euclidean Space and Matrices Definition of n space As was learned in Math b, a point in Euclidean three space can be thought of
Quotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
Lecture Notes on Polynomials
Lecture Notes on Polynomials Arne Jensen Department of Mathematical Sciences Aalborg University c 008 Introduction These lecture notes give a very short introduction to polynomials with real and complex
The finite field with 2 elements The simplest finite field is
The finite field with 2 elements The simplest finite field is GF (2) = F 2 = {0, 1} = Z/2 It has addition and multiplication + and defined to be 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0 0 0 = 0 0 1 = 0
Chapter 7: Functional Programming Languages
Chapter 7: Functional Programming Languages Aarne Ranta Slides for the book Implementing Programming Languages. An Introduction to Compilers and Interpreters, College Publications, 2012. Fun: a language
SECTION 0.6: POLYNOMIAL, RATIONAL, AND ALGEBRAIC EXPRESSIONS
(Section 0.6: Polynomial, Rational, and Algebraic Expressions) 0.6.1 SECTION 0.6: POLYNOMIAL, RATIONAL, AND ALGEBRAIC EXPRESSIONS LEARNING OBJECTIVES Be able to identify polynomial, rational, and algebraic
The Classes P and NP
The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the
Regular Expressions and Automata using Haskell
Regular Expressions and Automata using Haskell Simon Thompson Computing Laboratory University of Kent at Canterbury January 2000 Contents 1 Introduction 2 2 Regular Expressions 2 3 Matching regular expressions
Notes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
Problem Solving Basics and Computer Programming
Problem Solving Basics and Computer Programming A programming language independent companion to Roberge/Bauer/Smith, "Engaged Learning for Programming in C++: A Laboratory Course", Jones and Bartlett Publishers,
Flowchart Techniques
C H A P T E R 1 Flowchart Techniques 1.1 Programming Aids Programmers use different kinds of tools or aids which help them in developing programs faster and better. Such aids are studied in the following
Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us
The Set Data Model CHAPTER 7. 7.1 What This Chapter Is About
CHAPTER 7 The Set Data Model The set is the most fundamental data model of mathematics. Every concept in mathematics, from trees to real numbers, is expressible as a special kind of set. In this book,
Generating Functions Count
2 Generating Functions Count 2.1 Counting from Polynomials to Power Series Consider the outcomes when a pair of dice are thrown and our interest is the sum of the numbers showing. One way to model the
Turing Machines, Part I
Turing Machines, Part I Languages The $64,000 Question What is a language? What is a class of languages? Computer Science Theory 2 1 Now our picture looks like Context Free Languages Deterministic Context
CONTINUED FRACTIONS AND FACTORING. Niels Lauritzen
CONTINUED FRACTIONS AND FACTORING Niels Lauritzen ii NIELS LAURITZEN DEPARTMENT OF MATHEMATICAL SCIENCES UNIVERSITY OF AARHUS, DENMARK EMAIL: [email protected] URL: http://home.imf.au.dk/niels/ Contents
CAs and Turing Machines. The Basis for Universal Computation
CAs and Turing Machines The Basis for Universal Computation What We Mean By Universal When we claim universal computation we mean that the CA is capable of calculating anything that could possibly be calculated*.
Programming Languages in Artificial Intelligence
Programming Languages in Artificial Intelligence Günter Neumann, German Research Center for Artificial Intelligence (LT Lab, DFKI) I. AI programming languages II. Functional programming III. Functional
3515ICT Theory of Computation Turing Machines
Griffith University 3515ICT Theory of Computation Turing Machines (Based loosely on slides by Harald Søndergaard of The University of Melbourne) 9-0 Overview Turing machines: a general model of computation
Programming Languages
Programming Languages Qing Yi Course web site: www.cs.utsa.edu/~qingyi/cs3723 cs3723 1 A little about myself Qing Yi Ph.D. Rice University, USA. Assistant Professor, Department of Computer Science Office:
Revised Version of Chapter 23. We learned long ago how to solve linear congruences. ax c (mod m)
Chapter 23 Squares Modulo p Revised Version of Chapter 23 We learned long ago how to solve linear congruences ax c (mod m) (see Chapter 8). It s now time to take the plunge and move on to quadratic equations.
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Encoding Text with a Small Alphabet
Chapter 2 Encoding Text with a Small Alphabet Given the nature of the Internet, we can break the process of understanding how information is transmitted into two components. First, we have to figure out
ML for the Working Programmer
ML for the Working Programmer 2nd edition Lawrence C. Paulson University of Cambridge CAMBRIDGE UNIVERSITY PRESS CONTENTS Preface to the Second Edition Preface xiii xv 1 Standard ML 1 Functional Programming
Adaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
Regular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
Indiana State Core Curriculum Standards updated 2009 Algebra I
Indiana State Core Curriculum Standards updated 2009 Algebra I Strand Description Boardworks High School Algebra presentations Operations With Real Numbers Linear Equations and A1.1 Students simplify and
1.1 WHAT IS A PROGRAMMING LANGUAGE?
1 INTRODUCTION 1.1 What is a Programming Language? 1.2 Abstractions in Programming Languages 1.3 Computational Paradigms 1.4 Language Definition 1.5 Language Translation 1.6 Language Design How we communicate
Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi
Automata Theory Automata theory is the study of abstract computing devices. A. M. Turing studied an abstract machine that had all the capabilities of today s computers. Turing s goal was to describe the
Predicate Logic. Example: All men are mortal. Socrates is a man. Socrates is mortal.
Predicate Logic Example: All men are mortal. Socrates is a man. Socrates is mortal. Note: We need logic laws that work for statements involving quantities like some and all. In English, the predicate is
6.080/6.089 GITCS Feb 12, 2008. Lecture 3
6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my
On Generalized Fermat Numbers 3 2n +1
Applied Mathematics & Information Sciences 4(3) (010), 307 313 An International Journal c 010 Dixie W Publishing Corporation, U. S. A. On Generalized Fermat Numbers 3 n +1 Amin Witno Department of Basic
Understanding Basic Calculus
Understanding Basic Calculus S.K. Chung Dedicated to all the people who have helped me in my life. i Preface This book is a revised and expanded version of the lecture notes for Basic Calculus and other
A Second Course in Mathematics Concepts for Elementary Teachers: Theory, Problems, and Solutions
A Second Course in Mathematics Concepts for Elementary Teachers: Theory, Problems, and Solutions Marcel B. Finan Arkansas Tech University c All Rights Reserved First Draft February 8, 2006 1 Contents 25
SECTION 10-2 Mathematical Induction
73 0 Sequences and Series 6. Approximate e 0. using the first five terms of the series. Compare this approximation with your calculator evaluation of e 0.. 6. Approximate e 0.5 using the first five terms
9.2 Summation Notation
9. Summation Notation 66 9. Summation Notation In the previous section, we introduced sequences and now we shall present notation and theorems concerning the sum of terms of a sequence. We begin with a
A Framework for the Semantics of Behavioral Contracts
A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK [email protected] Abstract. Contracts have proved a powerful concept
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany [email protected]
KNOWLEDGE FACTORING USING NORMALIZATION THEORY
KNOWLEDGE FACTORING USING NORMALIZATION THEORY J. VANTHIENEN M. SNOECK Katholieke Universiteit Leuven Department of Applied Economic Sciences Dekenstraat 2, 3000 Leuven (Belgium) tel. (+32) 16 28 58 09
So let us begin our quest to find the holy grail of real analysis.
1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers
JavaScript: Introduction to Scripting. 2008 Pearson Education, Inc. All rights reserved.
1 6 JavaScript: Introduction to Scripting 2 Comment is free, but facts are sacred. C. P. Scott The creditor hath a better memory than the debtor. James Howell When faced with a decision, I always ask,
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation
Computational Models Lecture 8, Spring 2009
Slides modified by Benny Chor, based on original slides by Maurice Herlihy, Brown Univ. p. 1 Computational Models Lecture 8, Spring 2009 Encoding of TMs Universal Turing Machines The Halting/Acceptance
Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products
Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing
Section 1.1. Introduction to R n
The Calculus of Functions of Several Variables Section. Introduction to R n Calculus is the study of functional relationships and how related quantities change with each other. In your first exposure to
You know from calculus that functions play a fundamental role in mathematics.
CHPTER 12 Functions You know from calculus that functions play a fundamental role in mathematics. You likely view a function as a kind of formula that describes a relationship between two (or more) quantities.
JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson
JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials
The last three chapters introduced three major proof techniques: direct,
CHAPTER 7 Proving Non-Conditional Statements The last three chapters introduced three major proof techniques: direct, contrapositive and contradiction. These three techniques are used to prove statements
k, then n = p2α 1 1 pα k
Powers of Integers An integer n is a perfect square if n = m for some integer m. Taking into account the prime factorization, if m = p α 1 1 pα k k, then n = pα 1 1 p α k k. That is, n is a perfect square
THREE DIMENSIONAL GEOMETRY
Chapter 8 THREE DIMENSIONAL GEOMETRY 8.1 Introduction In this chapter we present a vector algebra approach to three dimensional geometry. The aim is to present standard properties of lines and planes,
Numerical Analysis Lecture Notes
Numerical Analysis Lecture Notes Peter J. Olver 5. Inner Products and Norms The norm of a vector is a measure of its size. Besides the familiar Euclidean norm based on the dot product, there are a number
8 Divisibility and prime numbers
8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express
Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.
Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize
CHAPTER 5. Number Theory. 1. Integers and Division. Discussion
CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a
6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010. Class 4 Nancy Lynch
6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010 Class 4 Nancy Lynch Today Two more models of computation: Nondeterministic Finite Automata (NFAs)
CMPSCI 250: Introduction to Computation. Lecture #19: Regular Expressions and Their Languages David Mix Barrington 11 April 2013
CMPSCI 250: Introduction to Computation Lecture #19: Regular Expressions and Their Languages David Mix Barrington 11 April 2013 Regular Expressions and Their Languages Alphabets, Strings and Languages
FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 22
FOUNDATIONS OF ALGEBRAIC GEOMETRY CLASS 22 RAVI VAKIL CONTENTS 1. Discrete valuation rings: Dimension 1 Noetherian regular local rings 1 Last day, we discussed the Zariski tangent space, and saw that it
Predicate Logic Review
Predicate Logic Review UC Berkeley, Philosophy 142, Spring 2016 John MacFarlane 1 Grammar A term is an individual constant or a variable. An individual constant is a lowercase letter from the beginning
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
Mathematical Induction
Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How
1 Sets and Set Notation.
LINEAR ALGEBRA MATH 27.6 SPRING 23 (COHEN) LECTURE NOTES Sets and Set Notation. Definition (Naive Definition of a Set). A set is any collection of objects, called the elements of that set. We will most
