no tex files
This commit is contained in:
parent
071fcd465c
commit
f2a06b6b5e
2 changed files with 0 additions and 672 deletions
BIN
tesi/tesi.pdf
BIN
tesi/tesi.pdf
Binary file not shown.
|
@ -1,672 +0,0 @@
|
||||||
% Created 2020-03-03 Tue 17:18
|
|
||||||
% Intended LaTeX compiler: pdflatex
|
|
||||||
\documentclass[11pt]{article}
|
|
||||||
\usepackage[utf8]{inputenc}
|
|
||||||
\usepackage[T1]{fontenc}
|
|
||||||
\usepackage{graphicx}
|
|
||||||
\usepackage{grffile}
|
|
||||||
\usepackage{longtable}
|
|
||||||
\usepackage{wrapfig}
|
|
||||||
\usepackage{rotating}
|
|
||||||
\usepackage[normalem]{ulem}
|
|
||||||
\usepackage{amsmath}
|
|
||||||
\usepackage{textcomp}
|
|
||||||
\usepackage{amssymb}
|
|
||||||
\usepackage{capt-of}
|
|
||||||
\usepackage{hyperref}
|
|
||||||
\usepackage{algorithm}
|
|
||||||
\usepackage{comment}
|
|
||||||
\usepackage{algpseudocode}
|
|
||||||
\usepackage{amsmath,amssymb,amsthm}
|
|
||||||
\newtheorem{definition}{Definition}
|
|
||||||
\usepackage{graphicx}
|
|
||||||
\usepackage{listings}
|
|
||||||
\usepackage{color}
|
|
||||||
\author{Francesco Mecca}
|
|
||||||
\date{}
|
|
||||||
\title{Translation Verification of the pattern matching compiler}
|
|
||||||
\hypersetup{
|
|
||||||
pdfauthor={Francesco Mecca},
|
|
||||||
pdftitle={Translation Verification of the pattern matching compiler},
|
|
||||||
pdfkeywords={},
|
|
||||||
pdfsubject={},
|
|
||||||
pdfcreator={Emacs 26.3 (Org mode 9.1.9)},
|
|
||||||
pdflang={English}}
|
|
||||||
\begin{document}
|
|
||||||
|
|
||||||
\maketitle
|
|
||||||
\begin{comment}
|
|
||||||
\section{{\bfseries\sffamily TODO} Scaletta [1/5]}
|
|
||||||
\label{sec:org7578cff}
|
|
||||||
\begin{itemize}
|
|
||||||
\item[{$\boxtimes$}] Abstract
|
|
||||||
\item[{$\boxminus$}] Background [40\%]
|
|
||||||
\begin{itemize}
|
|
||||||
\item[{$\boxtimes$}]
|
|
||||||
|
|
||||||
\item[{$\square$}] Lambda code [0\%]
|
|
||||||
\begin{itemize}
|
|
||||||
\item[{$\square$}] Compiler optimizations
|
|
||||||
\item[{$\square$}] other instructions
|
|
||||||
\end{itemize}
|
|
||||||
\item[{$\boxtimes$}] Pattern matching
|
|
||||||
\item[{$\square$}] Symbolic execution
|
|
||||||
\item[{$\square$}] Translation Validation
|
|
||||||
\end{itemize}
|
|
||||||
\item[{$\square$}] Translation validation of the Pattern Matching Compiler
|
|
||||||
\begin{itemize}
|
|
||||||
\item[{$\square$}] Source translation
|
|
||||||
\begin{itemize}
|
|
||||||
\item[{$\square$}] Formal Grammar
|
|
||||||
\item[{$\square$}] Compilation of source patterns
|
|
||||||
\item[{$\square$}] Rest?
|
|
||||||
\end{itemize}
|
|
||||||
\item[{$\square$}] Target translation
|
|
||||||
\begin{itemize}
|
|
||||||
\item[{$\square$}] Formal Grammar
|
|
||||||
\item[{$\square$}] Symbolic execution of the lambda target
|
|
||||||
\end{itemize}
|
|
||||||
\item[{$\square$}] Equivalence between source and target
|
|
||||||
\end{itemize}
|
|
||||||
\item[{$\square$}] Proof of correctness
|
|
||||||
\item[{$\square$}] Practical results
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
\end{comment}
|
|
||||||
|
|
||||||
\begin{abstract}
|
|
||||||
|
|
||||||
This dissertation presents an algorithm for the translation validation of the
|
|
||||||
pattern matching compiler. Given the source representation of the target program and the
|
|
||||||
target program compiled in untyped lambda form, the algoritmhm is capable of modelling
|
|
||||||
the source program in terms of symbolic constraints on it's branches and apply symbolic
|
|
||||||
execution on the untyped lambda representation in order to validate wheter the compilation
|
|
||||||
produced a valid result.
|
|
||||||
In this context a valid result means that for every input in the domain of the source
|
|
||||||
program the untyped lambda translation produces the same output as the source program.
|
|
||||||
The input of the program is modelled in terms of symbolic constraints closely related to
|
|
||||||
the runtime representation of objects and the output consists of OCaml code
|
|
||||||
blackboxes that are not evaluated in the context of the verification.
|
|
||||||
|
|
||||||
\end{abstract}
|
|
||||||
|
|
||||||
\section{Background}
|
|
||||||
\label{sec:org5b6accf}
|
|
||||||
|
|
||||||
\subsection{}
|
|
||||||
\label{sec:org3c9e604}
|
|
||||||
Objective Caml () is a dialect of the ML (Meta-Language) family of programming
|
|
||||||
languages.
|
|
||||||
shares many features with other dialects of ML, such as SML and Caml Light,
|
|
||||||
The main features of ML languages are the use of the Hindley-Milner type system that
|
|
||||||
provides many advantages with respect to static type systems of traditional imperative and object
|
|
||||||
oriented language such as C, C++ and Java, such as:
|
|
||||||
\begin{itemize}
|
|
||||||
\item Polymorphism: in certain scenarios a function can accept more than one
|
|
||||||
type for the input parameters. For example a function that computes the lenght of a
|
|
||||||
list doesn't need to inspect the type of the elements of the list and for this reason
|
|
||||||
a List.length function can accept lists of integers, lists of strings and in general
|
|
||||||
lists of any type. Such languages offer polymorphic functions through subtyping at
|
|
||||||
runtime only, while other languages such as C++ offer polymorphism through compile
|
|
||||||
time templates and function overloading.
|
|
||||||
With the Hindley-Milner type system each well typed function can have more than one
|
|
||||||
type but always has a unique best type, called the \emph{principal type}.
|
|
||||||
For example the principal type of the List.length function is "For any \emph{a}, function from
|
|
||||||
list of \emph{a} to \emph{int}" and \emph{a} is called the \emph{type parameter}.
|
|
||||||
\item Strong typing: Languages such as C and C++ allow the programmer to operate on data
|
|
||||||
without considering its type, mainly through pointers. Other languages such as C\#
|
|
||||||
and Go allow type erasure so at runtime the type of the data can't be queried.
|
|
||||||
In the case of programming languages using an Hindley-Milner type system the
|
|
||||||
programmer is not allowed to operate on data by ignoring or promoting its type.
|
|
||||||
\item Type Inference: the principal type of a well formed term can be inferred without any
|
|
||||||
annotation or declaration.
|
|
||||||
\item Algebraic data types: types that are modelled by the use of two
|
|
||||||
algebraic operations, sum and product.
|
|
||||||
A sum type is a type that can hold of many different types of
|
|
||||||
objects, but only one at a time. For example the sum type defined
|
|
||||||
as \emph{A + B} can hold at any moment a value of type A or a value of
|
|
||||||
type B. Sum types are also called tagged union or variants.
|
|
||||||
A product type is a type constructed as a direct product
|
|
||||||
of multiple types and contains at any moment one instance for
|
|
||||||
every type of its operands. Product types are also called tuples
|
|
||||||
or records. Algebraic data types can be recursive
|
|
||||||
in their definition and can be combined.
|
|
||||||
\end{itemize}
|
|
||||||
Moreover ML languages are functional, meaning that functions are
|
|
||||||
treated as first class citizens and variables are immutable,
|
|
||||||
although mutable statements and imperative constructs are permitted.
|
|
||||||
In addition to that features an object system, that provides
|
|
||||||
inheritance, subtyping and dynamic binding, and modules, that
|
|
||||||
provide a way to encapsulate definitions. Modules are checked
|
|
||||||
statically and can be reificated through functors.
|
|
||||||
|
|
||||||
\subsection{Lambda form compilation}
|
|
||||||
\label{sec:org6065c14}
|
|
||||||
\begin{comment}
|
|
||||||
https://dev.realworld.org/compiler-backend.html
|
|
||||||
\end{comment}
|
|
||||||
|
|
||||||
provides compilation in form of a byecode executable with an
|
|
||||||
optionally embeddable interpreter and a native executable that could
|
|
||||||
be statically linked to provide a single file executable.
|
|
||||||
|
|
||||||
After the typechecker has proven that the program is type safe,
|
|
||||||
the compiler lower the code to \emph{Lambda}, an s-expression based
|
|
||||||
language that assumes that its input has already been proved safe.
|
|
||||||
On the \emph{Lambda} representation of the source program, the compiler
|
|
||||||
performes a series of optimization passes before translating the
|
|
||||||
lambda form to assembly code.
|
|
||||||
|
|
||||||
\begin{enumerate}
|
|
||||||
\item datatypes
|
|
||||||
\label{sec:org7b158eb}
|
|
||||||
|
|
||||||
Most native data types in , such as integers, tuples, lists,
|
|
||||||
records, can be seen as instances of the following definition
|
|
||||||
|
|
||||||
\begin{verbatim}
|
|
||||||
type t = Nil | One of int | Cons of int * t
|
|
||||||
\end{verbatim}
|
|
||||||
that is a type \emph{t} with three constructors that define its complete
|
|
||||||
signature.
|
|
||||||
Every constructor has an arity. Nil, a constructor of arity 0, is
|
|
||||||
called a constant constructor.
|
|
||||||
|
|
||||||
\item Lambda form types
|
|
||||||
\label{sec:org737fa2f}
|
|
||||||
A lambda form target file produced by the compiler consists of a
|
|
||||||
single s-expression. Every s-expression consist of \emph{(}, a sequence of
|
|
||||||
elements separated by a whitespace and a closing \emph{)}.
|
|
||||||
Elements of s-expressions are:
|
|
||||||
\begin{itemize}
|
|
||||||
\item Atoms: sequences of ascii letters, digits or symbols
|
|
||||||
\item Variables
|
|
||||||
\item Strings: enclosed in double quotes and possibly escaped
|
|
||||||
\item S-expressions: allowing arbitrary nesting
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
There are several numeric types:
|
|
||||||
\begin{itemize}
|
|
||||||
\item integers: that us either 31 or 63 bit two's complement arithmetic
|
|
||||||
depending on system word size, and also wrapping on overflow
|
|
||||||
\item 32 bit and 64 bit integers: that use 32-bit and 64-bit two's complement arithmetic
|
|
||||||
with wrap on overflow
|
|
||||||
\item big integers: offer integers with arbitrary precision
|
|
||||||
\item floats: that use IEEE754 double-precision (64-bit) arithmetic with
|
|
||||||
the addition of the literals \emph{infinity}, \emph{neg\_infinity} and \emph{nan}.
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
The are varios numeric operations defined:
|
|
||||||
|
|
||||||
\begin{itemize}
|
|
||||||
\item Arithmetic operations: +, -, *, /, \% (modulo), neg (unary negation)
|
|
||||||
\item Bitwise operations: \&, |, \^{}, <<, >> (zero-shifting), a>> (sign extending)
|
|
||||||
\item Numeric comparisons: <, >, <=, >=, ==
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
\item Functions
|
|
||||||
\label{sec:org369db83}
|
|
||||||
|
|
||||||
Functions are defined using the following syntax, and close over all
|
|
||||||
bindings in scope: (lambda (arg1 arg2 arg3) BODY)
|
|
||||||
and are applied using the following syntax: (apply FUNC ARG ARG ARG)
|
|
||||||
Evaluation is eager.
|
|
||||||
|
|
||||||
\item Bindings
|
|
||||||
\label{sec:org120bc74}
|
|
||||||
The atom \emph{let} introduces a sequence of bindings:
|
|
||||||
(let BINDING BINDING BINDING \ldots{} BODY)
|
|
||||||
|
|
||||||
\item Other atoms
|
|
||||||
\label{sec:org58bd28f}
|
|
||||||
TODO: if, switch, stringswitch\ldots{}
|
|
||||||
TODO: magari esempi
|
|
||||||
\end{enumerate}
|
|
||||||
|
|
||||||
|
|
||||||
\subsection{Pattern matching}
|
|
||||||
\label{sec:org5d3b2f5}
|
|
||||||
|
|
||||||
Pattern matching is a widely adopted mechanism to interact with ADT.
|
|
||||||
C family languages provide branching on predicates through the use of
|
|
||||||
if statements and switch statements.
|
|
||||||
Pattern matching on the other hands express predicates through
|
|
||||||
syntactic templates that also allow to bind on data structures of
|
|
||||||
arbitrary shapes. One common example of pattern matching is the use of regular
|
|
||||||
expressions on strings. provides pattern matching on ADT and
|
|
||||||
primitive data types.
|
|
||||||
The result of a pattern matching operation is always one of:
|
|
||||||
\begin{itemize}
|
|
||||||
\item this value does not match this pattern”
|
|
||||||
\item this value matches this pattern, resulting the following bindings of
|
|
||||||
names to values and the jump to the expression pointed at the
|
|
||||||
pattern.
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
\begin{verbatim}
|
|
||||||
type color = | Red | Blue | Green | Black | White
|
|
||||||
|
|
||||||
match color with
|
|
||||||
| Red -> print "red"
|
|
||||||
| Blue -> print "red"
|
|
||||||
| Green -> print "red"
|
|
||||||
| _ -> print "white or black"
|
|
||||||
\end{verbatim}
|
|
||||||
|
|
||||||
provides tokens to express data destructoring.
|
|
||||||
For example we can examine the content of a list with patten matching
|
|
||||||
|
|
||||||
\begin{verbatim}
|
|
||||||
|
|
||||||
begin match list with
|
|
||||||
| [ ] -> print "empty list"
|
|
||||||
| element1 :: [ ] -> print "one element"
|
|
||||||
| (element1 :: element2) :: [ ] -> print "two elements"
|
|
||||||
| head :: tail-> print "head followed by many elements"
|
|
||||||
\end{verbatim}
|
|
||||||
|
|
||||||
Parenthesized patterns, such as the third one in the previous example,
|
|
||||||
matches the same value as the pattern without parenthesis.
|
|
||||||
|
|
||||||
The same could be done with tuples
|
|
||||||
\begin{verbatim}
|
|
||||||
|
|
||||||
begin match tuple with
|
|
||||||
| (Some _, Some _) -> print "Pair of optional types"
|
|
||||||
| (Some _, None) | (None, Some _) -> print "Pair of optional types, one of which is null"
|
|
||||||
| (None, None) -> print "Pair of optional types, both null"
|
|
||||||
\end{verbatim}
|
|
||||||
|
|
||||||
The pattern pattern₁ | pattern₂ represents the logical "or" of the
|
|
||||||
two patterns pattern₁ and pattern₂. A value matches pattern₁ |
|
|
||||||
pattern₂ if it matches pattern₁ or pattern₂.
|
|
||||||
|
|
||||||
Pattern clauses can make the use of \emph{guards} to test predicates and
|
|
||||||
variables can captured (binded in scope).
|
|
||||||
|
|
||||||
\begin{verbatim}
|
|
||||||
|
|
||||||
begin match token_list with
|
|
||||||
| "switch"::var::"{"::rest -> ...
|
|
||||||
| "case"::":"::var::rest when is_int var -> ...
|
|
||||||
| "case"::":"::var::rest when is_string var -> ...
|
|
||||||
| "}"::[ ] -> ...
|
|
||||||
| "}"::rest -> error "syntax error: " rest
|
|
||||||
|
|
||||||
\end{verbatim}
|
|
||||||
|
|
||||||
Moreover, the pattern matching compiler emits a warning when a
|
|
||||||
pattern is not exhaustive or some patterns are shadowed by precedent ones.
|
|
||||||
|
|
||||||
\subsection{Symbolic execution}
|
|
||||||
\label{sec:orge2e0205}
|
|
||||||
|
|
||||||
\subsection{Translation validation}
|
|
||||||
\label{sec:orgbafe7bc}
|
|
||||||
Translators, such as translators and code generators, are huge pieces of
|
|
||||||
software usually consisting of multiple subsystem and
|
|
||||||
constructing an actual specification of a translator implementation for
|
|
||||||
formal validation is a very long task. Moreover, different
|
|
||||||
translators implement different algorithms, so the correctness proof of
|
|
||||||
a translator cannot be generalized and reused to prove another translator.
|
|
||||||
Translation validation is an alternative to the verification of
|
|
||||||
existing translators that consists of taking the source and the target
|
|
||||||
(compiled) program and proving \emph{a posteriori} their semantic equivalence.
|
|
||||||
|
|
||||||
\begin{itemize}
|
|
||||||
\item[{$\square$}] Techniques for translation validation
|
|
||||||
\item[{$\square$}] What does semantically equivalent mean
|
|
||||||
\item[{$\square$}] What happens when there is no semantic equivalence
|
|
||||||
\item[{$\square$}] Translation validation through symbolic execution
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
\subsection{Translation validation of the Pattern Matching Compiler}
|
|
||||||
\label{sec:org24ee133}
|
|
||||||
|
|
||||||
\begin{enumerate}
|
|
||||||
\item Source program
|
|
||||||
\label{sec:org8c21912}
|
|
||||||
The algorithm takes as its input a source program and translates it
|
|
||||||
into an algebraic data structure called \emph{constraint\_tree}.
|
|
||||||
|
|
||||||
\begin{verbatim}
|
|
||||||
type constraint_tree =
|
|
||||||
| Unreachable
|
|
||||||
| Failure
|
|
||||||
| Leaf of source_expr
|
|
||||||
| Guard of source_blackbox * constraint_tree * constraint_tree
|
|
||||||
| Node of accessor * (constructor * constraint_tree) list * constraint_tree
|
|
||||||
\end{verbatim}
|
|
||||||
|
|
||||||
Unreachable, Leaf of source\_expr and Failure are the terminals of the three.
|
|
||||||
We distinguish
|
|
||||||
\begin{itemize}
|
|
||||||
\item Unreachable: statically it is known that no value can go there
|
|
||||||
\item Failure: a value matching this part results in an error
|
|
||||||
\item Leaf: a value matching this part results into the evaluation of a
|
|
||||||
source blackbox of code
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
The algorithm doesn't support type-declaration-based analysis
|
|
||||||
to know the list of constructors at a given type.
|
|
||||||
Let's consider some trivial examples:
|
|
||||||
|
|
||||||
\begin{verbatim}
|
|
||||||
function true -> 1
|
|
||||||
\end{verbatim}
|
|
||||||
|
|
||||||
[ ] Converti a disegni
|
|
||||||
|
|
||||||
Is translated to
|
|
||||||
\begin{center}
|
|
||||||
\begin{tabular}{l}
|
|
||||||
Node ([(true, Leaf 1)], Failure)\\
|
|
||||||
\end{tabular}
|
|
||||||
\end{center}
|
|
||||||
while
|
|
||||||
\begin{verbatim}
|
|
||||||
function
|
|
||||||
true -> 1
|
|
||||||
| false -> 2
|
|
||||||
\end{verbatim}
|
|
||||||
will give
|
|
||||||
\begin{center}
|
|
||||||
\begin{tabular}{l}
|
|
||||||
Node ([(true, Leaf 1); (false, Leaf 2)])\\
|
|
||||||
\end{tabular}
|
|
||||||
\end{center}
|
|
||||||
|
|
||||||
It is possible to produce Unreachable examples by using
|
|
||||||
refutation clauses (a "dot" in the right-hand-side)
|
|
||||||
\begin{verbatim}
|
|
||||||
function
|
|
||||||
true -> 1
|
|
||||||
| false -> 2
|
|
||||||
| _ -> .
|
|
||||||
\end{verbatim}
|
|
||||||
that gets translated into
|
|
||||||
Node ([(true, Leaf 1); (false, Leaf 2)], Unreachable)
|
|
||||||
|
|
||||||
We trust this annotation, which is reasonable as the type-checker
|
|
||||||
verifies that it indeed holds.
|
|
||||||
|
|
||||||
Guard nodes of the tree are emitted whenever a guard is found. Guards
|
|
||||||
node contains a blackbox of code that is never evaluated and two
|
|
||||||
branches, one that is taken in case the guard evaluates to true and
|
|
||||||
the other one that contains the path taken when the guard evaluates to
|
|
||||||
true.
|
|
||||||
|
|
||||||
[ ] Finisci con Node
|
|
||||||
[ ] Spiega del fallback
|
|
||||||
[ ] rivedi compilazione per tenere in considerazione il tuo albero invece che le lambda
|
|
||||||
[ ] Specifica che stesso algoritmo usato per compilare a lambda, piu` optimizations
|
|
||||||
|
|
||||||
The source code of a pattern matching function in has the
|
|
||||||
following form:
|
|
||||||
|
|
||||||
\begin{center}
|
|
||||||
\begin{tabular}{l}
|
|
||||||
match variable with\\
|
|
||||||
\(\vert{}\) pattern₁ -> expr₁\\
|
|
||||||
\(\vert{}\) pattern₂ when guard -> expr₂\\
|
|
||||||
\(\vert{}\) pattern₃ as var -> expr₃\\
|
|
||||||
⋮\\
|
|
||||||
\(\vert{}\) pₙ -> exprₙ\\
|
|
||||||
\end{tabular}
|
|
||||||
\end{center}
|
|
||||||
|
|
||||||
and can include any expression that is legal for the compiler,
|
|
||||||
such as "when" conditions and assignments. Patterns could or could not
|
|
||||||
be exhaustive.
|
|
||||||
|
|
||||||
Pattern matching code could also be written using the more compact form:
|
|
||||||
\begin{center}
|
|
||||||
\begin{tabular}{l}
|
|
||||||
function\\
|
|
||||||
\(\vert{}\) pattern₁ -> expr₁\\
|
|
||||||
\(\vert{}\) pattern₂ when guard -> expr₂\\
|
|
||||||
\(\vert{}\) pattern₃ as var -> expr₃\\
|
|
||||||
⋮\\
|
|
||||||
\(\vert{}\) pₙ -> exprₙ\\
|
|
||||||
\end{tabular}
|
|
||||||
\end{center}
|
|
||||||
|
|
||||||
|
|
||||||
This BNF grammar describes formally the grammar of the source program:
|
|
||||||
|
|
||||||
\begin{verbatim}
|
|
||||||
start ::= "match" id "with" patterns | "function" patterns
|
|
||||||
patterns ::= (pattern0|pattern1) pattern1+
|
|
||||||
;; pattern0 and pattern1 are needed to distinguish the first case in which
|
|
||||||
;; we can avoid writing the optional vertical line
|
|
||||||
pattern0 ::= clause
|
|
||||||
pattern1 ::= "|" clause
|
|
||||||
clause ::= lexpr "->" rexpr
|
|
||||||
|
|
||||||
lexpr ::= rule (ε|condition)
|
|
||||||
rexpr ::= _code ;; arbitrary code
|
|
||||||
|
|
||||||
rule ::= wildcard|variable|constructor_pattern|or_pattern ;;
|
|
||||||
|
|
||||||
;; rules
|
|
||||||
wildcard ::= "_"
|
|
||||||
variable ::= identifier
|
|
||||||
constructor_pattern ::= constructor (rule|ε) (assignment|ε)
|
|
||||||
|
|
||||||
constructor ::= int|float|char|string|bool
|
|
||||||
|unit|record|exn|objects|ref
|
|
||||||
|list|tuple|array
|
|
||||||
|variant|parameterized_variant ;; data types
|
|
||||||
|
|
||||||
or_pattern ::= wildcard|variable|constructor_pattern ("|" wildcard|variable|constructor_pattern)+
|
|
||||||
|
|
||||||
condition ::= "when" bexpr
|
|
||||||
assignment ::= "as" id
|
|
||||||
bexpr ::= _code ;; arbitrary code
|
|
||||||
\end{verbatim}
|
|
||||||
|
|
||||||
\begin{comment}
|
|
||||||
Check that it is still this
|
|
||||||
\end{comment}
|
|
||||||
|
|
||||||
Patterns are of the form
|
|
||||||
\begin{center}
|
|
||||||
\begin{tabular}{ll}
|
|
||||||
pattern & type of pattern\\
|
|
||||||
\hline
|
|
||||||
\_ & wildcard\\
|
|
||||||
x & variable\\
|
|
||||||
c(p₁,p₂,\ldots{},pₙ) & constructor pattern\\
|
|
||||||
(p₁\(\vert{}\) p₂) & or-pattern\\
|
|
||||||
\end{tabular}
|
|
||||||
\end{center}
|
|
||||||
|
|
||||||
During compilation by the translators expressions are compiled into
|
|
||||||
lambda code and are referred as lambda code actions lᵢ.
|
|
||||||
|
|
||||||
The entire pattern matching code is represented as a clause matrix
|
|
||||||
that associates rows of patterns (p\(_{\text{i,1}}\), p\(_{\text{i,2}}\), \ldots{}, p\(_{\text{i,n}}\)) to
|
|
||||||
lambda code action lⁱ
|
|
||||||
\begin{equation*}
|
|
||||||
(P → L) =
|
|
||||||
\begin{pmatrix}
|
|
||||||
p_{1,1} & p_{1,2} & \cdots & p_{1,n} & → l₁ \\
|
|
||||||
p_{2,1} & p_{2,2} & \cdots & p_{2,n} & → l₂ \\
|
|
||||||
\vdots & \vdots & \ddots & \vdots & → \vdots \\
|
|
||||||
p_{m,1} & p_{m,2} & \cdots & p_{m,n} & → lₘ
|
|
||||||
\end{pmatrix}
|
|
||||||
\end{equation*}
|
|
||||||
|
|
||||||
The pattern \emph{p} matches a value \emph{v}, written as p ≼ v, when one of the
|
|
||||||
following rules apply
|
|
||||||
|
|
||||||
\begin{center}
|
|
||||||
\begin{tabular}{llll}
|
|
||||||
\hline
|
|
||||||
\_ & ≼ & v & ∀v\\
|
|
||||||
x & ≼ & v & ∀v\\
|
|
||||||
(p₁ \(\vert{}\)$\backslash$ p₂) & ≼ & v & iff p₁ ≼ v or p₂ ≼ v\\
|
|
||||||
c(p₁, p₂, \ldots{}, pₐ) & ≼ & c(v₁, v₂, \ldots{}, vₐ) & iff (p₁, p₂, \ldots{}, pₐ) ≼ (v₁, v₂, \ldots{}, vₐ)\\
|
|
||||||
(p₁, p₂, \ldots{}, pₐ) & ≼ & (v₁, v₂, \ldots{}, vₐ) & iff pᵢ ≼ vᵢ ∀i ∈ [1..a]\\
|
|
||||||
\hline
|
|
||||||
\end{tabular}
|
|
||||||
\end{center}
|
|
||||||
|
|
||||||
When a value \emph{v} matches pattern \emph{p} we say that \emph{v} is an \emph{instance} of \emph{p}.
|
|
||||||
|
|
||||||
Considering the pattern matrix P we say that the value vector
|
|
||||||
\(\vec{v}\) = (v₁, v₂, \ldots{}, vᵢ) matches the line number i in P if and only if the following two
|
|
||||||
conditions are satisfied:
|
|
||||||
\begin{itemize}
|
|
||||||
\item p\(_{\text{i,1}}\), p\(_{\text{i,2}}\), \(\cdots{}\), p\(_{\text{i,n}}\) ≼ (v₁, v₂, \ldots{}, vᵢ)
|
|
||||||
\item ∀j < i p\(_{\text{j,1}}\), p\(_{\text{j,2}}\), \(\cdots{}\), p\(_{\text{j,n}}\) ⋠ (v₁, v₂, \ldots{}, vᵢ)
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
We can define the following three relations with respect to patterns:
|
|
||||||
\begin{itemize}
|
|
||||||
\item Patter p is less precise than pattern q, written p ≼ q, when all
|
|
||||||
instances of q are instances of p
|
|
||||||
\item Pattern p and q are equivalent, written p ≡ q, when their instances
|
|
||||||
are the same
|
|
||||||
\item Patterns p and q are compatible when they share a common instance
|
|
||||||
\end{itemize}
|
|
||||||
|
|
||||||
\begin{enumerate}
|
|
||||||
\item Initial state of the compilation
|
|
||||||
\label{sec:org9a7b624}
|
|
||||||
|
|
||||||
Given a source of the following form:
|
|
||||||
|
|
||||||
|
|
||||||
\begin{center}
|
|
||||||
\begin{tabular}{l}
|
|
||||||
match variable with\\
|
|
||||||
\(\vert{}\) pattern₁ -> e₁\\
|
|
||||||
\(\vert{}\) pattern₂ -> e₂\\
|
|
||||||
⋮\\
|
|
||||||
\(\vert{}\) pₘ -> eₘ\\
|
|
||||||
\end{tabular}
|
|
||||||
\end{center}
|
|
||||||
|
|
||||||
the initial input of the algorithm C consists of a vector of variables
|
|
||||||
\(\vec{x}\) = (x₁, x₂, \ldots{}, xₙ) of size \emph{n} where \emph{n} is the arity of
|
|
||||||
the type of \emph{x} and a clause matrix P → L of width n and height m.
|
|
||||||
That is:
|
|
||||||
|
|
||||||
\begin{equation*}
|
|
||||||
C((\vec{x} = (x₁, x₂, ..., xₙ),
|
|
||||||
\begin{pmatrix}
|
|
||||||
p_{1,1} & p_{1,2} & \cdots & p_{1,n} → l₁ \\
|
|
||||||
p_{2,1} & p_{2,2} & \cdots & p_{2,n} → l₂ \\
|
|
||||||
\vdots & \vdots & \ddots & \vdots → \vdots \\
|
|
||||||
p_{m,1} & p_{m,2} & \cdots & p_{m,n} → lₘ)
|
|
||||||
\end{pmatrix}
|
|
||||||
\end{equation*}
|
|
||||||
|
|
||||||
The base case C₀ of the algorithm is the case in which the \(\vec{x}\)
|
|
||||||
is empty, that is \(\vec{x}\) = (), then the result of the compilation
|
|
||||||
C₀ is l₁
|
|
||||||
\begin{equation*}
|
|
||||||
C₀((),
|
|
||||||
\begin{pmatrix}
|
|
||||||
→ l₁ \\
|
|
||||||
→ l₂ \\
|
|
||||||
→ \vdots \\
|
|
||||||
→ lₘ
|
|
||||||
\end{pmatrix})
|
|
||||||
) = l₁
|
|
||||||
\end{equation*}
|
|
||||||
|
|
||||||
When \(\vec{x}\) ≠ () then the compilation advances using one of the
|
|
||||||
following four rules:
|
|
||||||
|
|
||||||
\begin{enumerate}
|
|
||||||
\item Variable rule: if all patterns of the first column of P are wildcard patterns or
|
|
||||||
bind the value to a variable, then
|
|
||||||
|
|
||||||
\begin{equation*}
|
|
||||||
C(\vec{x}, P → L) = C((x₂, x₃, ..., xₙ), P' → L')
|
|
||||||
\end{equation*}
|
|
||||||
where
|
|
||||||
\begin{equation*}
|
|
||||||
\begin{pmatrix}
|
|
||||||
p_{1,2} & \cdots & p_{1,n} & → & (let & y₁ & x₁) & l₁ \\
|
|
||||||
p_{2,2} & \cdots & p_{2,n} & → & (let & y₂ & x₁) & l₂ \\
|
|
||||||
\vdots & \ddots & \vdots & → & \vdots & \vdots & \vdots & \vdots \\
|
|
||||||
p_{m,2} & \cdots & p_{m,n} & → & (let & yₘ & x₁) & lₘ
|
|
||||||
\end{pmatrix}
|
|
||||||
\end{equation*}
|
|
||||||
|
|
||||||
That means in every lambda action lᵢ there is a binding of x₁ to the
|
|
||||||
variable that appears on the pattern \$p\(_{\text{i,1}}\). Bindings are omitted
|
|
||||||
for wildcard patterns and the lambda action lᵢ remains unchanged.
|
|
||||||
|
|
||||||
\item Constructor rule: if all patterns in the first column of P are
|
|
||||||
constructors patterns of the form k(q₁, q₂, \ldots{}, qₙ) we define a
|
|
||||||
new matrix, the specialized clause matrix S, by applying the
|
|
||||||
following transformation on every row \emph{p}:
|
|
||||||
\begin{lstlisting}[mathescape,columns=fullflexible,basicstyle=\fontfamily{lmvtt}\selectfont,]
|
|
||||||
for every c ∈ Set of constructors
|
|
||||||
for i ← 1 .. m
|
|
||||||
let kᵢ ← constructor_of($p_{i,1}$)
|
|
||||||
if kᵢ = c then
|
|
||||||
p ← $q_{i,1}$, $q_{i,2}$, ..., $q_{i,n'}$, $p_{i,2}$, $p_{i,3}$, ..., $p_{i, n}$
|
|
||||||
\end{lstlisting}
|
|
||||||
Patterns of the form \(q_{i,j}\) matches on the values of the
|
|
||||||
constructor and we define new fresh variables y₁, y₂, \ldots{}, yₐ so
|
|
||||||
that the lambda action lᵢ becomes
|
|
||||||
\end{enumerate}
|
|
||||||
|
|
||||||
\begin{lstlisting}[mathescape,columns=fullflexible,basicstyle=\fontfamily{lmvtt}\selectfont,]
|
|
||||||
(let (y₁ (field 0 x₁))
|
|
||||||
(y₂ (field 1 x₁))
|
|
||||||
...
|
|
||||||
(yₐ (field (a-1) x₁))
|
|
||||||
lᵢ)
|
|
||||||
\end{lstlisting}
|
|
||||||
|
|
||||||
and the result of the compilation for the set of constructors
|
|
||||||
\{c₁, c₂, \ldots{}, cₖ\} is:
|
|
||||||
|
|
||||||
\begin{lstlisting}[mathescape,columns=fullflexible,basicstyle=\fontfamily{lmvtt}\selectfont,]
|
|
||||||
switch x₁ with
|
|
||||||
case c₁: l₁
|
|
||||||
case c₂: l₂
|
|
||||||
...
|
|
||||||
case cₖ: lₖ
|
|
||||||
default: exit
|
|
||||||
\end{lstlisting}
|
|
||||||
|
|
||||||
\begin{enumerate}
|
|
||||||
\item Orpat rule: there are various strategies for dealing with
|
|
||||||
or-patterns. The most naive one is to split the or-patterns.
|
|
||||||
For example a row p containing an or-pattern:
|
|
||||||
\begin{equation*}
|
|
||||||
(p_{i,1}|q_{i,1}|r_{i,1}), p_{i,2}, ..., p_{i,m} → lᵢ
|
|
||||||
\end{equation*}
|
|
||||||
results in three rows added to the clause matrix
|
|
||||||
\begin{equation*}
|
|
||||||
p_{i,1}, p_{i,2}, ..., p_{i,m} → lᵢ \\
|
|
||||||
\end{equation*}
|
|
||||||
\begin{equation*}
|
|
||||||
q_{i,1}, p_{i,2}, ..., p_{i,m} → lᵢ \\
|
|
||||||
\end{equation*}
|
|
||||||
\begin{equation*}
|
|
||||||
r_{i,1}, p_{i,2}, ..., p_{i,m} → lᵢ
|
|
||||||
\end{equation*}
|
|
||||||
\item Mixture rule:
|
|
||||||
When none of the previous rules apply the clause matrix P → L is
|
|
||||||
splitted into two clause matrices, the first P₁ → L₁ that is the
|
|
||||||
largest prefix matrix for which one of the three previous rules
|
|
||||||
apply, and P₂ → L₂ containing the remaining rows. The algorithm is
|
|
||||||
applied to both matrices.
|
|
||||||
\end{enumerate}
|
|
||||||
|
|
||||||
\begin{comment}
|
|
||||||
#+BEGIN_COMMENT
|
|
||||||
CITE paper?
|
|
||||||
#+END_COMMENT’
|
|
||||||
\end{comment}
|
|
||||||
\end{enumerate}
|
|
||||||
\end{enumerate}
|
|
||||||
\end{document}
|
|
Loading…
Reference in a new issue