8C The search algorithm 121Note. This .W('t, 0) trivially satisfies 80(i)-(ii). (The algorithm may be seen asbuilding approximations to an unknown term Mt; Vt is the weakest approximationand represents the fact that at this stage we know nothing at all about Mt otherthan its type.)Step d + 1. Assume sl(r,d) has been defined and satisfies 8C5(i)-(ii).Substep I. If C(T,d) = 0 or no member of .c/(r,d) contains meta-variables thenstop. (In this case .W(r,d+ 1) is undefined and the algorithm's output is just thefinite sequence d(i, 0), ... , d ('C, d).)Substep II. Otherwise, begin the construction of d(,r,d+ 1) by listing the propernf-schemes in d (?, d) and applying IIa-IIb below to each one.Subsubstep IIa. Given any proper Xt E d(r,d), list the meta-variables in Xt;say they areVi'..., Vyq (q ?1),and apply Ilal-M2 to each one.Part IIal. Given any meta-variable VP in an Xt E Qf(T,d), say(1) p = (m>0);first list all i < m for which Tail(aj) = a = Tail(p). (If there are none orm = 0, go direct to IIa2.) For each such i, ai has formDefine(ni > 0).(3) yip Ax1'...xm'(xiil1...V aini'')awhere the x's and V's are distinct new variables and meta-variables. (Yifis called a suitable replacement for VP.)Part IIa2. List the abstractors that cover the (unique) occurrence of VP inXt, in the order they occur in XT from left to right; say they are(4) Azi', ... , ?[` (t > 0).List all j < t (if any) such that Tail (Cj) = a. For each such j,1 j has form(5) j(hj >_0).Define(6) Zj Ax" Vii'...Vjhj i)awhere the x's and V's are distinct and new.replacement. for VP.)(Ze is called a suitable
122 8 Counting a type's inhabitantsNotes. (i) It is easy to see that each Y;P defined in IIal and each Zf defined inIIa2 is a long nf-scheme with depth < 1 and the same type as VP, so VP can bereplaced by Y;P or Z' in XT without violating type-restrictions or the restrictionsin the definition of long nf-scheme (8C1, 8C3-4). And the result of making such areplacement will clearly have depth < d + 1.(ii) YAP and Z° need not contain meta-variables. In fact YAP is without metavariablesif o; is an atom, and in this caseSimilarly Zf is without meta-variables if ( is an atom, and in this caseZfAx?'xOm .1 mHence if Y;P or Zf is without meta-variables its depth is 0 and if VP is replaced byit then Depth(XT) will not increase.(iii) The total <strong>number</strong> of suitable replacements (Y's and Z's) for VP is at mostm+t.Subsubstep IIb. When IIal-IIa2 have been applied to all the meta-variablesin XT the result is a list of suitable replacements for each V; in X.If one or more of V1,...,V9 has no suitable replacements, abandon XT,calling it a reject, and start applying Substep II to the next member ofd). (A reject will generate no members of W('t, d + 1).)If all of 17j,..., V9 in XT have suitable replacements, XT is called extendable;in this case list all possible sequences(7) (W1',..., WyP")where W; is a suitable replacement for V; for i = 1,. .. , q. For each sequence(7) construct a new nf-scheme X*T from XT by simultaneously replacing V;by W; in XT for i = 1,..., q. (Call each sequence (7) a suitable multireplacementand call X *T an extension of XI; if this extension is a termcall it a success.)Notes. (i) The <strong>number</strong> of extensions of XT is finite since each is generated by asuitable multi-replacement and the <strong>number</strong> of these is clearly finite (for a given XT).(ii) To construct an extension each meta-variable in XT is replaced by either anf-scheme with depth 1 or a term with depth 0. If the latter holds for all themeta-variables in XT the extension has depth < d and is a success. If the formerholds for at least one meta-variable, the extension has depth < d + 1 and containsmeta-variables.Substep III. Finally, if the set d(r,d) contains at least one proper nf-scheme,define d(r,d+1) to be the set containing all the extensions of all the extendableproper nf-schemes in W(r,d).Notes. (i) By the notes after IIa and IIb above it is easy to check that sd(r, d + 1)satisfies 8C5(i) and (ii).(ii) By the way, d('t, d + 1) does not contain d(T, d) as a subset.C
- Page 2 and 3:
BASIC SIMPLE TYPE THEORY
- Page 4 and 5:
BASIC SIMPLE TYPE THEORYJ. Roger Hi
- Page 6:
To Carol
- Page 9 and 10:
VlllContents7C The converse PT proo
- Page 11 and 12:
xIntroductionhave proved themselves
- Page 14 and 15:
1The type-free A-calculusThe R-calc
- Page 16 and 17:
1A A-terms and their structure 31A6
- Page 18 and 19:
I B #-reduction and #-normal forms
- Page 20 and 21:
IC rl- and firs-reductions 7Proof S
- Page 22 and 23:
IC q- and iq-reductions93TFig. lC7a
- Page 24 and 25:
1D Restricted A-terms 11(ii) The BC
- Page 26 and 27:
2A The system TAA 132A2 Definition
- Page 28 and 29:
2A The system TA, 152A5.1 Notation
- Page 30 and 31:
2A The system TA2172A8.3 Example Le
- Page 32 and 33:
Proof Trivial from 2A9.2A The syste
- Page 34 and 35:
2B The subject-construction theorem
- Page 36 and 37:
2B The subject-construction theorem
- Page 38 and 39:
2C Subject reduction and expansion2
- Page 40 and 41:
2D The typable terms 27However, Cha
- Page 42 and 43:
2D The typable terms 292D8.1 Note T
- Page 44 and 45:
3A Principal types and their histor
- Page 46 and 47:
3A Principal types and their histor
- Page 48 and 49:
3B Type-substitutions 353B1 Notatio
- Page 50 and 51:
3B Type-substitutions 37Then r U (s
- Page 52 and 53:
3C Motivating the PT algorithm 39(i
- Page 54 and 55:
3D Unification 41this pair was show
- Page 56 and 57:
3D Unification 43If pk * Tk and the
- Page 58 and 59:
A' _ §(Ap) for some s; hence in pa
- Page 60 and 61:
3E The PT algorithm 47Let r - rl U
- Page 62 and 63:
3E The PT algorithm 49for some subs
- Page 64 and 65:
3E The PT algorithm 513E4 Further R
- Page 66 and 67:
4A The equality rule 53The name "TA
- Page 68 and 69:
(M).4A The equality rule 554A3 Weak
- Page 70 and 71:
4B Semantics and completeness 574A1
- Page 72 and 73:
4B Semantics and completeness 59413
- Page 74 and 75:
4B Semantics and completeness 61Pro
- Page 76 and 77:
5A version using typed termsIn Chap
- Page 78 and 79:
5A Typed terms 655A1.5 Warning If M
- Page 80 and 81:
5B Reducing typed terms(ii) if MT E
- Page 82 and 83:
5B Reducing typed terms 695B5.1 Not
- Page 84 and 85: 5C Normalization theorems 71of rede
- Page 86 and 87: SC Normalization theorems 73in leng
- Page 88 and 89: 6A Intuitionist implicational logic
- Page 90 and 91: 6A Intuitionist implicational logic
- Page 92 and 93: 6B The Curry-Howard isomorphism 79T
- Page 94 and 95: 6B The Curry-Howard isomorphism 816
- Page 96 and 97: 6B The Curry-Howard isomorphism 83t
- Page 98 and 99: 6C Some weaker logics 85for some cl
- Page 100 and 101: 6C Some weaker logics 87logic in 6A
- Page 102 and 103: 6D Axiom-based versions 89Deduction
- Page 104 and 105: 6D Axiom-based versions 916D6.1 Not
- Page 106 and 107: The converse principal-type algorit
- Page 108 and 109: 7B Identifications 957A3 Converse P
- Page 110 and 111: 7C The converse PT proofNext, suppo
- Page 112 and 113: Since (a-+b)* __ a--+b, we must pro
- Page 114 and 115: 7C The converse PT proof 101Conside
- Page 116 and 117: instance, construct an m.g.c.i. V -
- Page 118 and 119: AD-7D Condensed detachment 1057D6 M
- Page 120 and 121: 7D Condensed detachment 107Proof By
- Page 122 and 123: 8A Inhabitants 109A Pq-normal inhab
- Page 124 and 125: 8A Inhabitants 1118A7.1 Example Let
- Page 126 and 127: 8A Inhabitants113Fig. 8A12a.8A11.2
- Page 128 and 129: 8B Examples of the search strategy
- Page 130 and 131: 8B Examples of the search strategy
- Page 132 and 133: 8C The search algorithm 119Long(s)
- Page 136 and 137: 8C The search algorithm1238C6.1 Exa
- Page 138 and 139: 8D The Counting algorithm 1258D3.1
- Page 140 and 141: 8E The structure of a nf-scheme 127
- Page 142 and 143: 8E The structure of a nf-scheme129x
- Page 144 and 145: 8E The structure of a nf-scheme131T
- Page 146 and 147: 8F Stretching, shrinking and comple
- Page 148 and 149: 8F Stretching, shrinking and comple
- Page 150 and 151: 8F Stretching, shrinking and comple
- Page 152 and 153: 8F Stretching, shrinking and comple
- Page 154 and 155: 9A The structure of a term 1419A2 D
- Page 156 and 157: 9A The structure of a term(ii) if r
- Page 158 and 159: 9B Residuals 145Proof-note Two case
- Page 160 and 161: 9B Residuals 1479134.1 Lemma Every
- Page 162 and 163: 9C The structure of a TAR-deduction
- Page 164 and 165: 9D The structure of a type 151below
- Page 166 and 167: 9E The condensed structure of a typ
- Page 168 and 169: 9E The condensed structure of a typ
- Page 170 and 171: 9F Imitating combinatory logic in A
- Page 172: [x].N*Before constructing9F Imitati
- Page 175 and 176: 162 Answers to starred exerciseswit
- Page 177 and 178: 164 Answers to starred exercisesIf
- Page 179 and 180: 166 Answers to starred exercisesTo
- Page 182 and 183: BibliographyReferences to unpublish
- Page 184 and 185:
Bibliography 171DOSEN, K. [1992a] M
- Page 186 and 187:
Bibliography 173KALMAN, J. A. [1983
- Page 188 and 189:
Bibliography 175SCEDROV, A. [1990]
- Page 190 and 191:
Table of principal typesThis table
- Page 192 and 193:
IndexA-logics (see axiom-based logi
- Page 194 and 195:
Index 181D-incompleteness of BCI, B
- Page 196 and 197:
Index183PT algorithm, converse (see
- Page 198 and 199:
Index185#-contraction 4of typed ter