2012
DOI: 10.4204/eptcs.82.2
|View full text |Cite
|
Sign up to set email alerts
|

Basic completion strategies as another application of the Maude strategy language

Abstract: The two levels of data and actions on those data provided by the separation between equations and rules in rewriting logic are completed by a third level of strategies to control the application of those actions. This level is implemented on top of Maude as a strategy language, which has been successfully used in a wide range of applications. First we summarize the Maude strategy language design and review some of its applications; then, we describe a new case study, namely the description of completion proced… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

4
2

Authors

Journals

citations
Cited by 8 publications
(15 citation statements)
references
References 41 publications
0
15
0
Order By: Relevance
“…Controlling deduction procedures based on a given set of rules is one of the paradigmatic use cases for strategies, following the principle of separation of concerns enunciated in the motto Algorithm = Logic + Control [Kow79]. The Knuth-Bendix and other equational completion procedures in Section 6.5 are a complete redesign of a previous specification [VM11] that used the Maude-based prototype of the strategy language, which was based in turn on previous work by Lescanne [Les90]. The novelty of our specification is that it fixes a set of Maude rules for the four alternative completion procedures, and only the recursive strategies that apply them vary from one to another.…”
Section: Chapter 6 Examplesmentioning
confidence: 99%
See 2 more Smart Citations
“…Controlling deduction procedures based on a given set of rules is one of the paradigmatic use cases for strategies, following the principle of separation of concerns enunciated in the motto Algorithm = Logic + Control [Kow79]. The Knuth-Bendix and other equational completion procedures in Section 6.5 are a complete redesign of a previous specification [VM11] that used the Maude-based prototype of the strategy language, which was based in turn on previous work by Lescanne [Les90]. The novelty of our specification is that it fixes a set of Maude rules for the four alternative completion procedures, and only the recursive strategies that apply them vary from one to another.…”
Section: Chapter 6 Examplesmentioning
confidence: 99%
“…Lescanne [Les90] described various such procedures as a combination of transition rules + control, and implemented them in CAML. Completion procedures were also implemented in ELAN [KM95], at the Maude metalevel [CM97], and even using the Maude strategy language [VM11]. However, the separation between rules and control is not clearly enforced in these works, since the rules are adapted to the specific data structure of each method.…”
Section: Basic Completionmentioning
confidence: 99%
See 1 more Smart Citation
“…Using this technique, a base system, specified with all its non-deterministic capabilities, can be put under the control of different strategy-components to achieve different results. This is the idea used in Lescanne (1989); Clavel and Meseguer (1997); Verdejo and Martí-Oliet (2012) to implement Knuth-Bendix-like completion as a basic set of correct rules on which different strategies are applied to get different actual procedures. Again, the same idea is used in Bachmair et al .…”
Section: Strategiesmentioning
confidence: 99%
“…The strategy language is based in its authors experience with strategies in Maude and in previous strategy languages like ELAN [2] and Stratego [5]. It has already been exploited in the specification of algorithms, inference systems, and language semantics: Milner's CCS [12], the ambient calculus [12], the semantics of the parallel functional language Eden [9], equational logic completion procedures [16], a proof calculus for membrane systems [1], etc. These examples are likely to be expressed and generalized using control parameterization with strategies, whose implementation was not available at that time.…”
Section: Introductionmentioning
confidence: 99%