term rewriting
Recently Published Documents


TOTAL DOCUMENTS

619
(FIVE YEARS 33)

H-INDEX

34
(FIVE YEARS 1)

2021 ◽  
Vol 55 (3) ◽  
pp. 92-96
Author(s):  
Shashi Gowda ◽  
Yingbo Ma ◽  
Alessandro Cheli ◽  
Maja Gwóźzdź ◽  
Viral B. Shah ◽  
...  

As mathematical computing becomes more democratized in high-level languages, high-performance symbolic-numeric systems are necessary for domain scientists and engineers to get the best performance out of their machine without deep knowledge of code optimization. Naturally, users need different term types either to have different algebraic properties for them, or to use efficient data structures. To this end, we developed Symbolics.jl, an extendable symbolic system which uses dynamic multiple dispatch to change behavior depending on the domain needs. In this work we detail an underlying abstract term interface which allows for speed without sacrificing generality. We show that by formalizing a generic API on actions independent of implementation, we can retroactively add optimized data structures to our system without changing the pre-existing term rewriters. We showcase how this can be used to optimize term construction and give a 113x acceleration on general symbolic transformations. Further, we show that such a generic API allows for complementary term-rewriting implementations. Exploiting this feature, we demonstrate the ability to swap between classical term-rewriting simplifiers and e-graph-based term-rewriting simplifiers. We illustrate how this symbolic system improves numerical computing tasks by showcasing an e-graph ruleset which minimizes the number of CPU cycles during expression evaluation, and demonstrate how it simplifies a real-world reaction-network simulation to halve the runtime. Additionally, we show a reaction-diffusion partial differential equation solver which is able to be automatically converted into symbolic expressions via multiple dispatch tracing, which is subsequently accelerated and parallelized to give a 157x simulation speedup. Together, this presents Symbolics.jl as a next-generation symbolic-numeric computing environment geared towards modeling and simulation.


Author(s):  
Salvador Lucas

AbstractContext-sensitive rewriting is a restriction of rewriting where reduction steps are allowed on specific arguments $$\mu (f)\subseteq \{1,\ldots ,k\}$$ μ ( f ) ⊆ { 1 , … , k } of k-ary function symbols f only. Terms which cannot be further rewritten in this way are called $$\mu $$ μ -normal forms. For left-linear term rewriting systems (TRSs), the so-called normalization via$$\mu $$ μ -normalization procedure provides a systematic way to obtain normal forms by the stepwise computation and combination of intermediate $$\mu $$ μ -normal forms. In this paper, we show how to obtain bounds on the derivational complexity of computations using this procedure by using bounds on the derivational complexity of context-sensitive rewriting. Two main applications are envisaged: Normalization via $$\mu $$ μ -normalization can be used with non-terminating TRSs where the procedure still terminates; on the other hand, it can be used to improve on bounds of derivational complexity of terminating TRSs as it discards many rewritings.


2021 ◽  
Author(s):  
T. M. L. de Veras ◽  
A. F. Ramos ◽  
R. J. G. B. de Queiroz ◽  
A. G. de Oliveira

We address the question as to how to formalise the concept of computational paths (sequences of rewrites) as equalities between two terms of the same type. The intention is to demonstrate the use of a term rewriting system in performing computations with these computational paths, establishing equalities between equalities, and further higher equalities, in particular, in the calculation of fundamental groups of surfaces such as the circle, the torus and the real projective plane.


2021 ◽  
Vol 22 (1) ◽  
pp. 1-44
Author(s):  
Adrien Koutsos

Computational indistinguishability is a key property in cryptography and verification of security protocols. Current tools for proving it rely on cryptographic game transformations. We follow Bana and Comon’s approach [7, 8], axiomatizing what an adversary cannot distinguish. We prove the decidability of a set of first-order axioms that are computationally sound, though incomplete, for protocols with a bounded number of sessions whose security is based on an <small>IND-CCA 2 </small> encryption scheme. Alternatively, our result can be viewed as the decidability of a family of cryptographic game transformations. Our proof relies on term rewriting and automated deduction techniques.


2021 ◽  
pp. 175-189
Author(s):  
Johri van Eerd ◽  
Jan Friso Groote ◽  
Pieter Hijma ◽  
Jan Martens ◽  
Anton Wijs
Keyword(s):  

Author(s):  
Akihisa Yamada

AbstractInterpretation methods constitute a foundation of termination analysis for term rewriting. From time to time remarkable instances of interpretation methods appeared, such as polynomial interpretations, matrix interpretations, arctic interpretations, and their variants. In this paper we introduce a general framework, the multi-dimensional interpretation method, that subsumes these variants as well as many previously unknown interpretation methods as instances. Employing the notion of derivers, we prove the soundness of the proposed method in an elegant way. We implement the proposed method in the termination prover and verify its significance through experiments.


2021 ◽  
pp. 386-404
Author(s):  
Tomoki Shiraishi ◽  
Kentaro Kikuchi ◽  
Takahito Aoto

Sign in / Sign up

Export Citation Format

Share Document