• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yu Shanshan, Li Shixian, Su Jindian. Hylomorphisms with Parameters and Its Associated Calculational Laws[J]. Journal of Computer Research and Development, 2013, 50(3): 602-618.
Citation: Yu Shanshan, Li Shixian, Su Jindian. Hylomorphisms with Parameters and Its Associated Calculational Laws[J]. Journal of Computer Research and Development, 2013, 50(3): 602-618.

Hylomorphisms with Parameters and Its Associated Calculational Laws

More Information
  • Published Date: March 14, 2013
  • Hylomorphisms in functional programming languages have the disadvantages of describing those recursive functions with parameters. To solve this problem, we use the polynomial functors defined on the category of completed partial orders to propose two different kinds of hylomorphisms with fixed or accumulating parameters, named phylo or ahylo morphisms respectively; and prove that they are both unique under the conditions of fixed or accumulating parameters, which as a result extends the research work of Pardo on recursive functions with parameters, named pfold and afold respectively, to hylomorphisms with parameters. Our work can allow hylomorphisms to directly carry extra parameters as the inputs of calculations or to store those accumulating values produced by programs temporally during the calculations. We also point out and analyze the relations of phylo morphisms and ahylo morphisms with other recursive and corecursive functions, and present their associated calculational laws in a categorical and abstract sense. Most of our work is implemented using the functional programming language Haskell.
  • Related Articles

    [1]Zhang Heng, Zhang Libo, WuYanjun. Large-Scale Graph Processing on Multi-GPU Platforms[J]. Journal of Computer Research and Development, 2018, 55(2): 273-288. DOI: 10.7544/issn1000-1239.2018.20170697
    [2]Zhai Zhigang, Wang Jiandong, Cao Zining, Mao Yuguang. Hybrid Role Mining Methods with Minimal Perturbation[J]. Journal of Computer Research and Development, 2013, 50(5): 951-960.
    [3]Ma Yuchi, Yang Ning, Xie Lin, Li Chuan, and Tang Changjie. Social Roles Discovery of Moving Objects Based on Spatial-Temporal Associated Semantics and Temporal Entropy of Trajectories[J]. Journal of Computer Research and Development, 2012, 49(10): 2153-2160.
    [4]Wu Xinsong, He Yeping, Zhou Zhouyi, Liang Hongliang. An Environment-Adaptive Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2011, 48(6): 983-990.
    [5]Zhai Zhengde, Xu Zhen, and Feng Dengguo. Violation of Static Mutual Exclusive Role Constraints in Dynamic Role Transition[J]. Journal of Computer Research and Development, 2008, 45(4): 677-683.
    [6]Wang Hongbing, Fan Zhihua, and She Chundong. Dynamic Role Assignment for Multi-Agent System with Parallel Constraints Among Goals[J]. Journal of Computer Research and Development, 2007, 44(4): 693-700.
    [7]Liao Junguo, Hong Fan, Zhu Xian, Xiao Haijun. Separation of Duty in Dynamic Role Translations Between Administrative Domains[J]. Journal of Computer Research and Development, 2006, 43(6): 1065-1070.
    [8]Xing Guanglin and Hong Fan. A Workflow Authorization Model Based on Role and Task and Constraints Specification[J]. Journal of Computer Research and Development, 2005, 42(11): 1946-1953.
    [9]Long Qin, Liu Peng, Pan Aimin. Research and Implementation of an Extended Administrative Role-Based Access Control Model[J]. Journal of Computer Research and Development, 2005, 42(5): 868-876.
    [10]Zhang Shuangmin and Shi Chunyi. A Multi-Agent Reinforcement Learning Method Based on Role Tracking[J]. Journal of Computer Research and Development, 2005, 42(2): 203-209.

Catalog

    Article views (705) PDF downloads (403) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return