Skip to main content

Showing 51–100 of 136 results for author: Bergstra, J

.
  1. arXiv:1308.0219  [pdf, ps, other

    cs.PL cs.CR

    Instruction sequence expressions for the secure hash algorithm SHA-256

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We describe such instruction sequences for the restrictions to bit strings of… ▽ More

    Submitted 18 November, 2017; v1 submitted 1 August, 2013; originally announced August 2013.

    Comments: 14 pages; several minor errors corrected; counting error corrected; instruction sequence fault repaired; misunderstanding cleared up; a minor error corrected; 15 pages, presentation improved, a minor error corrected. preliminaries have text overlap with arXiv:1301.3297

    ACM Class: E.3; F.1.1

  2. arXiv:1307.5173  [pdf, ps, other

    math.LO

    Probability functions in the context of signed involutive meadows

    Authors: Jan A. Bergstra, Alban Ponse

    Abstract: The Kolmogorov axioms for probability functions are placed in the context of signed meadows. A completeness theorem is stated and proven for the resulting equational theory of probability calculus. Elementary definitions of probability theory are restated in this framework.

    Submitted 22 December, 2016; v1 submitted 19 July, 2013; originally announced July 2013.

    Comments: 20 pages, 6 tables, some minor errors are corrected

    MSC Class: 62F15 ACM Class: F.4.1; F.1.2

  3. arXiv:1307.0414  [pdf, other

    stat.ML cs.LG

    Challenges in Representation Learning: A report on three machine learning contests

    Authors: Ian J. Goodfellow, Dumitru Erhan, Pierre Luc Carrier, Aaron Courville, Mehdi Mirza, Ben Hamner, Will Cukierski, Yichuan Tang, David Thaler, Dong-Hyun Lee, Yingbo Zhou, Chetan Ramaiah, Fangxiang Feng, Ruifan Li, Xiaojie Wang, Dimitris Athanasakis, John Shawe-Taylor, Maxim Milakov, John Park, Radu Ionescu, Marius Popescu, Cristian Grozea, James Bergstra, **g**g Xie, Lukasz Romaszko , et al. (3 additional authors not shown)

    Abstract: The ICML 2013 Workshop on Challenges in Representation Learning focused on three challenges: the black box learning challenge, the facial expression recognition challenge, and the multimodal learning challenge. We describe the datasets created for these challenges and summarize the results of the competitions. We provide suggestions for organizers of future challenges and some comments on what kin… ▽ More

    Submitted 1 July, 2013; originally announced July 2013.

    Comments: 8 pages, 2 figures

  4. arXiv:1306.6412  [pdf, ps, other

    cs.SE

    Decision Taking versus Promise Issuing

    Authors: Jan A. Bergstra

    Abstract: An alignment is developed between the terminology of outcome oriented decision taking and a terminology for promise issuing. Differences and correspondences are investigated between the concepts of decision and promise. For decision taking, two forms are distinguished: the external outcome delivering form and internalized decision taking. Internalized decision taking is brought in connection wit… ▽ More

    Submitted 27 June, 2013; originally announced June 2013.

    Comments: 29 pages

  5. arXiv:1306.3476  [pdf, other

    cs.CV cs.LG stat.ML

    Hyperparameter Optimization and Boosting for Classifying Facial Expressions: How good can a "Null" Model be?

    Authors: James Bergstra, David D. Cox

    Abstract: One of the goals of the ICML workshop on representation and learning is to establish benchmark scores for a new data set of labeled facial expressions. This paper presents the performance of a "Null" model consisting of convolutions with random weights, PCA, pooling, normalization, and a linear readout. Our approach focused on hyperparameter optimization rather than novel model components. On the… ▽ More

    Submitted 14 June, 2013; originally announced June 2013.

    Comments: Presented at the Workshop on Representation and Learning, ICML 2013

  6. arXiv:1305.5956  [pdf, ps, other

    cs.CY

    Questions related to Bitcoin and other Informational Money

    Authors: Jan A. Bergstra, Karl de Leeuw

    Abstract: A collection of questions about Bitcoin and its hypothetical relatives Bitguilder and Bitpenny is formulated. These questions concern technical issues about protocols, security issues, issues about the formalizations of informational monies in various contexts, and issues about forms of use and misuse. Some questions are formulated in the more general setting of informational monies and near-monie… ▽ More

    Submitted 26 December, 2013; v1 submitted 25 May, 2013; originally announced May 2013.

    Comments: 31 pages. In v2 the section on patterns for use and misuse has been improved and expanded with so-called contaminations. Other small improvements were made and 13 additional references have been included

  7. arXiv:1304.4758  [pdf, ps, other

    cs.CY cs.CR

    Bitcoin and Beyond: Exclusively Informational Monies

    Authors: Jan A. Bergstra, Karl de Leeuw

    Abstract: The famous new money Bitcoin is classified as a technical informational money (TIM). Besides introducing the idea of a TIM, a more extreme notion of informational money will be developed: exclusively informational money (EXIM). The informational coins (INCOs) of an EXIM can be in control of an agent but are not owned by any agent. INCOs of an EXIM cannot be stolen, but they can be lost, or throw… ▽ More

    Submitted 30 December, 2013; v1 submitted 17 April, 2013; originally announced April 2013.

    Comments: 82 pages. Revision of v2: the Paragraph on monopresence and pseudomonopresence has been improved and extended; the paragraph on units for monies of account has been extended; several minor clarifications have been included; 8 additional references were added; improvements were made of small errors throughout the paper

  8. arXiv:1303.0382  [pdf, ps, other

    cs.LO

    Network algebra for synchronous dataflow

    Authors: J. A. Bergstra, C. A. Middelburg, Gh. Stefanescu

    Abstract: We develop an algebraic theory of synchronous dataflow networks. First, a basic algebraic theory of networks, called BNA (Basic Network Algebra), is introduced. This theory captures the basic algebraic properties of networks. For synchronous dataflow networks, it is subsequently extended with additional constants for the branching connections that occur between the cells of synchronous dataflow ne… ▽ More

    Submitted 2 March, 2013; originally announced March 2013.

    Comments: 24 pages

    ACM Class: F.1.1; F.1.2

  9. Instruction sequence based non-uniform complexity classes

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: We present an approach to non-uniform complexity in which single-pass instruction sequences play a key part, and answer various questions that arise from this approach. We introduce several kinds of non-uniform complexity classes. One kind includes a counterpart of the well-known non-uniform complexity class P/poly and another kind includes a counterpart of the well-known non-uniform complexity cl… ▽ More

    Submitted 19 July, 2013; v1 submitted 15 January, 2013; originally announced January 2013.

    Comments: 33 pages, supersedes arXiv:0809.0352 [cs.CC] in many respects (see end of introduction); remarks added

    ACM Class: F.1.1; F.1.3

    Journal ref: Scientific Annals of Computer Science 24(1):47--89, 2014

  10. arXiv:1211.5590  [pdf, other

    cs.SC cs.LG

    Theano: new features and speed improvements

    Authors: Frédéric Bastien, Pascal Lamblin, Razvan Pascanu, James Bergstra, Ian Goodfellow, Arnaud Bergeron, Nicolas Bouchard, David Warde-Farley, Yoshua Bengio

    Abstract: Theano is a linear algebra compiler that optimizes a user's symbolically-specified mathematical computations to produce efficient low-level implementations. In this paper, we present new features and efficiency improvements to Theano, and benchmarks demonstrating Theano's performance relative to Torch7, a recently introduced machine learning library, and to RNNLM, a C++ library targeted at recurre… ▽ More

    Submitted 23 November, 2012; originally announced November 2012.

    Comments: Presented at the Deep Learning Workshop, NIPS 2012

  11. arXiv:1210.6636  [pdf, ps, other

    cs.SE

    Informaticology: combining Computer Science, Data Science, and Fiction Science

    Authors: Jan A. Bergstra

    Abstract: Motivated by an intention to remedy current complications with Dutch terminology concerning informatics, the term informaticology is positioned to denote an academic counterpart of informatics where informatics is conceived of as a container for a coherent family of practical disciplines ranging from computer engineering and software engineering to network technology, data center management, infor… ▽ More

    Submitted 24 October, 2012; originally announced October 2012.

  12. arXiv:1209.5111  [pdf, other

    cs.CV cs.NE

    Making a Science of Model Search

    Authors: J. Bergstra, D. Yamins, D. D. Cox

    Abstract: Many computer vision algorithms depend on a variety of parameter choices and settings that are typically hand-tuned in the course of evaluating the algorithm. While such parameter tuning is often presented as being incidental to the algorithm, correctly setting these parameter choices is frequently critical to evaluating a method's full potential. Compounding matters, these parameters often must b… ▽ More

    Submitted 23 September, 2012; originally announced September 2012.

  13. arXiv:1208.2460  [pdf, ps, other

    cs.SE

    Decision Taking for Selling Thread Startup

    Authors: Jan A. Bergstra

    Abstract: Decision Taking is discussed in the context of the role it may play for a selling agent in a search market, in particular for agents involved in the sale of valuable and relatively unique items, such as a dwelling, a second hand car, or a second hand recreational vessel. Detailed connections are made between the architecture of decision making processes and a sample of software technology based… ▽ More

    Submitted 12 August, 2012; originally announced August 2012.

  14. arXiv:1205.6177  [pdf, ps, other

    cs.SE

    Decision Taking versus Action Determination

    Authors: Jan A. Bergstra

    Abstract: Decision taking is discussed in the context of the role it may play for various types of agents, and it is contrasted with action determination. Some remarks are made about the role of decision taking and action determination in the ongoing debate concerning the reverse polder development of the hertogin Hedwige polder.

    Submitted 28 May, 2012; originally announced May 2012.

  15. arXiv:1205.4194  [pdf, ps, other

    cs.SE

    Decision Taking as a Service

    Authors: Jan A. Bergstra

    Abstract: Decision taking can be performed as a service to other parties and it is amenable to outtasking rather than to outsourcing. Outtasking decision taking is compatible with selfsourcing of decision making activities carried out in preparation of decision taking. Decision taking as a service (DTaaS) is viewed as an instance of so-called decision casting. Preconditions for service casting are examined,… ▽ More

    Submitted 10 August, 2014; v1 submitted 18 May, 2012; originally announced May 2012.

  16. arXiv:1204.3249  [pdf, ps, other

    cs.LO

    Process algebra with conditionals in the presence of epsilon

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: In a previous paper, we presented several extensions of ACP with conditional expressions, including one with a retrospection operator on conditions to allow for looking back on conditions under which preceding actions have been performed. In this paper, we add a constant for a process that is only capable of terminating successfully to those extensions of ACP, which can be very useful in applicati… ▽ More

    Submitted 15 April, 2012; originally announced April 2012.

    Comments: 41 pages

    ACM Class: D.1.3; D.2.1; D.2.4; F.1.2; F.3.1; F.3.2

  17. arXiv:1204.1881  [pdf, ps, other

    cs.SE

    Four Conceptions of Instruction Sequence Faults

    Authors: Jan A. Bergstra

    Abstract: The notion of an instruction sequence fault is considered from various perspectives. Four different viewpoints on what constitutes a fault, or how to use the notion of a fault, are formulated. An integration of these views is proposed.

    Submitted 9 April, 2012; originally announced April 2012.

  18. arXiv:1201.6028  [pdf, ps, other

    cs.LO

    Turing Impossibility Properties for Stack Machine Programming

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: The strong, intermediate, and weak Turing impossibility properties are introduced. Some facts concerning Turing impossibility for stack machine programming are trivially adapted from previous work. Several intriguing questions are raised about the Turing impossibility properties concerning different method interfaces for stack machine programming.

    Submitted 29 January, 2012; originally announced January 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:0910.5564

  19. arXiv:1201.3929  [pdf, ps, other

    cs.SE

    About Instruction Sequence Testing

    Authors: J. A. Bergstra

    Abstract: Software testing is presented as a so-called theme within which different authors and groups have defined different subjects each of these subjects having a different focus on testing. A uniform concept of software testing is non-existent and the space of possible coherent perspectives on software testing, each fitting within the theme, is viewed as being spanned by five dimensions, each dimension… ▽ More

    Submitted 18 January, 2012; originally announced January 2012.

  20. arXiv:1112.5840  [pdf, ps, other

    cs.OH

    Informatics Perspectives on Decision Taking, a Case Study on Resolving Process Product Ambiguity

    Authors: J. A. Bergstra

    Abstract: A decision is an act or event of decision taking. Decision making always includes decision taking, the latter not involving significant exchanges with non-deciding agents. A decision outcome is a piece of storable information constituting the result of a decision. Decision outcomes are typed, for instance: plan, command, assertion, or boolean reply to a question. Decision outcomes are seen by an a… ▽ More

    Submitted 10 August, 2014; v1 submitted 26 December, 2011; originally announced December 2011.

    Comments: First revision; many minior improvements have been made, concluding section has been replaced

  21. arXiv:1110.1957  [pdf, ps, other

    cs.SE

    Stratified Outsourcing Theory

    Authors: J. A. Bergstra, G. P. A. J. Delen, S. F. M. van Vlijmen

    Abstract: The terminology of sourcing, outsourcing and insourcing is developed in detail on the basis of the preliminary definitions of outsourcing and insourcing and related activities and competences as given in our three previous papers on business mereology, on the concept of a sourcement, and on outsourcing competence respectively. Besides providing more a detailed semantic analysis we will introduce… ▽ More

    Submitted 10 October, 2011; originally announced October 2011.

    ACM Class: K.6.0; J.4; H.4.0; D.0

  22. arXiv:1110.1866  [pdf, ps, other

    cs.PL cs.SE

    Putting Instruction Sequences into Effect

    Authors: Jan A. Bergstra

    Abstract: An attempt is made to define the concept of execution of an instruction sequence. It is found to be a special case of directly putting into effect of an instruction sequence. Directly putting into effect of an instruction sequences comprises interpretation as well as execution. Directly putting into effect is a special case of putting into effect with other special cases classified as indirectly p… ▽ More

    Submitted 9 October, 2011; originally announced October 2011.

  23. arXiv:1109.6638  [pdf, other

    cs.CV cs.AI

    The Statistical Inefficiency of Sparse Coding for Images (or, One Gabor to Rule them All)

    Authors: James Bergstra, Aaron Courville, Yoshua Bengio

    Abstract: Sparse coding is a proven principle for learning compact representations of images. However, sparse coding by itself often leads to very redundant dictionaries. With images, this often takes the form of similar edge detectors which are replicated many times at various positions, scales and orientations. An immediate consequence of this observation is that the estimation of the dictionary component… ▽ More

    Submitted 30 September, 2011; v1 submitted 29 September, 2011; originally announced September 2011.

    Comments: 9 pages, 8 figures

  24. arXiv:1109.6536  [pdf, ps, other

    cs.OH

    Outsourcing Competence

    Authors: J. A. Bergstra, G. P. A. J. Delen, S. F. M. van Vlijmen

    Abstract: The topic of this paper, competences needed for outsourcing, is organized by first providing a generic competence scheme, which is subsequently instantiated to the area of sourcing and outsourcing. Sourcing and outsourcing are positioned as different areas of activity, neither one of which is subsumed under the other one. It is argued that competences relevant for outsourcing are mainly community… ▽ More

    Submitted 29 September, 2011; originally announced September 2011.

    ACM Class: K.6.0; J.4; H.4.0; D.0

  25. arXiv:1107.4684  [pdf, ps, other

    cs.SE cs.GL

    Introducing Sourcements

    Authors: J. A. Bergstra, G. P. A. J. Delen, S. F. M. van Vlijmen

    Abstract: Sourcing processes are discussed at a high abstraction level. A dedicated terminology is developed concerning general aspects of sourcing. The term sourcement is coined to denote a building block for sourcing. No- tions of allocation, functional architecture and allocational architecture, equilibrium, and configuration are discussed. Limitations of the concept of outsourcing are outlined. This the… ▽ More

    Submitted 23 July, 2011; originally announced July 2011.

    ACM Class: K.6.0; J.4; H.4.0; D.0

  26. arXiv:1106.6196  [pdf, ps, other

    cs.PL cs.DC cs.LO

    On the behaviours produced by instruction sequences under execution

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: We study several aspects of the behaviours produced by instruction sequences under execution in the setting of the algebraic theory of processes known as ACP. We use ACP to describe the behaviours produced by instruction sequences under execution and to describe two protocols implementing these behaviours in the case where the processing of instructions takes place remotely. We also show that all… ▽ More

    Submitted 11 June, 2012; v1 submitted 30 June, 2011; originally announced June 2011.

    Comments: 36 pages, consolidates material from arXiv:0811.0436 [cs.PL], arXiv:0902.2859 [cs.PL], and arXiv:0905.2257 [cs.PL]; abstract and introduction rewritten, examples and proofs added

    MSC Class: 68N19; 68N30; 68Q05; 68Q10; 68Q55; 68Q85 ACM Class: D.1.4; D.2.1; F.1.1; F.1.2; F.3.2

    Journal ref: Fundamenta Informaticae, 120(2):111--144, 2012

  27. arXiv:1105.2900  [pdf, ps, other

    q-fin.GN

    Dialectical Roots for Interest Prohibition Theory

    Authors: Jan Aldert Bergstra

    Abstract: It is argued that arguments for strict prohibition of interests must be based on the use of arguments from authority. This is carried out by first making a survey of so-called dialectical roots for interest prohibition and then demonstrating that for at least one important positive interest bearing financial product, the savings account with interest, its prohibition cannot be inferred from a matc… ▽ More

    Submitted 14 May, 2011; originally announced May 2011.

  28. arXiv:1104.2471  [pdf, ps, other

    q-fin.GN

    Interest prohibition and financial product innovation

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: We give a rough sketch of the Judaic, Greek, Islamic and Christian positions in the matter of interest prohibition during the last few millennia and discuss the way in which interest prohibition is dealt with in Islamic finance, the problems with authority-based arguments for interest prohibition, and the prospects of interest prohibition with the advent of electronic money.

    Submitted 13 April, 2011; originally announced April 2011.

    Comments: 9 pages

    Journal ref: Finance Islamique: Regard(s) sur une Finance Alternative, pages 274--284, Mazars Hadj Ali, 2011

  29. arXiv:1104.0308  [pdf, ps, other

    q-fin.GN

    An Application Specific Informal Logic for Interest Prohibition Theory

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Interest prohibition theory concerns theoretical aspects of interest prohibition. We attempt to lay down some aspects of interest prohibition theory wrapped in a larger framework of informal logic. The reason for this is that interest prohibition theory has to deal with a variety of arguments which is so wide that a limitation to so-called correct arguments in advance is counterproductive. We sugg… ▽ More

    Submitted 2 April, 2011; originally announced April 2011.

    Comments: 8 pages

  30. arXiv:1103.4515  [pdf, ps, other

    cs.LO

    Real Islamic Logic

    Authors: Jan Aldert Bergstra

    Abstract: Four options for assigning a meaning to Islamic Logic are surveyed including a new proposal for an option named "Real Islamic Logic" (RIL). That approach to Islamic Logic should serve modern Islamic objectives in a way comparable to the functionality of Islamic Finance. The prospective role of RIL is analyzed from several perspectives: (i) parallel distributed systems design, (ii) reception by a c… ▽ More

    Submitted 23 March, 2011; originally announced March 2011.

  31. arXiv:1012.5739  [pdf, ps, other

    cs.SE

    Business Mereology: Imaginative Definitions of Insourcing and Outsourcing Transformations

    Authors: J. A. Bergstra, S. F. M. van Vlijmen

    Abstract: Outsourcing, the passing on of tasks by organizations to other organizations, often including the personnel and means to perform these tasks, has become an important IT-business strategy over the past decades. We investigate imaginative definitions for outsourcing relations and outsourcing transformations. Abstract models of an extreme and unrealistic simplicity are considered in order to invest… ▽ More

    Submitted 28 December, 2010; originally announced December 2010.

    ACM Class: K.6.0; J.4; H.4.0; D.0

  32. arXiv:1012.5059  [pdf, ps, other

    cs.LO math.LO

    On Hoare-McCarthy algebras

    Authors: Jan A. Bergstra, Alban Ponse

    Abstract: We discuss an algebraic approach to propositional logic with side effects. To this end, we use Hoare's conditional [1985], which is a ternary connective comparable to if-then-else. Starting from McCarthy's notion of sequential evaluation [1963] we discuss a number of valuation congruences and we introduce Hoare-McCarthy algebras as the structures that characterize these congruences.

    Submitted 22 December, 2010; originally announced December 2010.

    Comments: 29 pages, 1 table

    ACM Class: F.3.2

  33. Preliminaries to an investigation of reduced product set finance

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Principles of financial product synthesis from a few basic financial products constitute an interesting research topic inspired by Islamic finance. We make an effort to answer general questions that should be answered before starting to investigate the main issues concerning this topic with the formalization of financial products and principles of financial product synthesis. We also outline the o… ▽ More

    Submitted 20 December, 2010; originally announced December 2010.

    Comments: 32 pages

    Journal ref: JKAU: Islamic Economics, 24(1):175-210, 2011

  34. arXiv:1010.3674  [pdf, ps, other

    cs.LO math.LO

    Short-circuit logic

    Authors: Jan A. Bergstra, A. Ponse, D. J. C. Staudt

    Abstract: Short-circuit evaluation denotes the semantics of propositional connectives in which the second argument is evaluated only if the first argument does not suffice to determine the value of the expression. In programming, short-circuit evaluation is widely used, with sequential conjunction and disjunction as primitive connectives. A short-circuit logic is a variant of propositional logic (PL) that… ▽ More

    Submitted 12 March, 2013; v1 submitted 18 October, 2010; originally announced October 2010.

    Comments: 59 pages, 7 tables, 3 figures; Daan Staudt is added as an extra author; normal forms for FSCL are defined and completeness of its axiomatization is proved

    ACM Class: F.3.2

  35. arXiv:1010.2850  [pdf, ps, other

    cs.PL

    Steering Fragments of Instruction Sequences

    Authors: Jan A. Bergstra

    Abstract: A steering fragment of an instruction sequence consists of a sequence of steering instructions. These are decision points involving the check of a propositional statement in sequential logic. The question is addressed why composed propositional statements occur in steering fragments given the fact that a straightforward transformation allows their elimination. A survey is provided of constraints t… ▽ More

    Submitted 14 October, 2010; originally announced October 2010.

  36. arXiv:1009.2902  [pdf, ps, other

    cs.SE

    Informal Control code logic

    Authors: Jan A. Bergstra

    Abstract: General definitions as well as rules of reasoning regarding control code production, distribution, deployment, and usage are described. The role of testing, trust, confidence and risk analysis is considered. A rationale for control code testing is sought and found for the case of safety critical embedded control code.

    Submitted 15 September, 2010; originally announced September 2010.

  37. arXiv:1008.0616  [pdf, ps, other

    cs.CY

    Formaleuros, Formalbitcoins, and Virtual Monies

    Authors: Jan A. Bergstra

    Abstract: Formalist positions towards money are considered from a perspective of formal methods in computing. The Formaleuro (FEUR) as a dimension for monetary quantities is proposed as well as the Formalbitcoin (FBTC) which represents an item ready for circulation in a model of informational money. An attempt is made to understand the concept of money from scratch. In order to provide a definition of mon… ▽ More

    Submitted 25 April, 2013; v1 submitted 3 August, 2010; originally announced August 2010.

    Comments: 98 pages. Revision of arXiv.org/abs/1008.0616v1. The revision involves bringing the paper up to date with the appearance of Bitcoin, a significant update of the section on Islamic finance and interest prohibition, deletion of fragments of minor importance, an update of references, moving the ad hoc theory of definitions to an appendix, and a small change of the title

  38. arXiv:1006.0813  [pdf, ps, other

    cs.OS

    On the definition of a theoretical concept of an operating system

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: We dwell on how a definition of a theoretical concept of an operating system, suitable to be incorporated in a mathematical theory of operating systems, could look like. This is considered a valuable preparation for the development of a mathematical theory of operating systems.

    Submitted 4 June, 2010; originally announced June 2010.

    Comments: 8 pages

    ACM Class: D.4.0

  39. arXiv:1005.5662  [pdf, ps, other

    cs.LO

    On the contribution of backward jumps to instruction sequence expressiveness

    Authors: Jan A. Bergstra, Inge Bethke

    Abstract: We investigate the expressiveness of backward jumps in a framework of formalized sequential programming called program algebra. We show that - if expressiveness is measured in terms of the computability of partial Boolean functions - then backward jumps are superfluous. If we, however, want to prevent explosion of the length of programs, then backward jumps are essential.

    Submitted 31 May, 2010; originally announced May 2010.

    Comments: 16 pages

  40. arXiv:0912.4637  [pdf, ps, other

    cs.MA

    Local and Global Trust Based on the Concept of Promises

    Authors: Jan Bergstra, Mark Burgess

    Abstract: We use the notion of a promise to define local trust between agents possessing autonomous decision-making. An agent is trustworthy if it is expected that it will keep a promise. This definition satisfies most commonplace meanings of trust. Reputation is then an estimation of this expectation value that is passed on from agent to agent. Our definition distinguishes types of trust, for different… ▽ More

    Submitted 23 December, 2009; originally announced December 2009.

  41. arXiv:0911.5018  [pdf, ps, other

    cs.LO cs.PL

    Autosolvability of halting problem instances for instruction sequences

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: We position Turing's result regarding the undecidability of the halting problem as a result about programs rather than machines. The mere requirement that a program of a certain kind must solve the halting problem for all programs of that kind leads to a contradiction in the case of a recent unsolvability result regarding the halting problem for programs. In this paper, we investigate this autosol… ▽ More

    Submitted 17 October, 2010; v1 submitted 26 November, 2009; originally announced November 2009.

    Comments: 18 pages; notational mistakes in tables 5 and 6 corrected; erroneous definition in last paragraph of page 11 corrected

    Report number: PRG0914 ACM Class: F.1.1; F.4.1

  42. arXiv:0911.1851  [pdf, ps, other

    cs.PL cs.LO

    Functional units for natural numbers

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Interaction with services provided by an execution environment forms part of the behaviours exhibited by instruction sequences under execution. Mechanisms related to the kind of interaction in question have been proposed in the setting of thread algebra. Like thread, service is an abstract behavioural concept. The concept of a functional unit is similar to the concept of a service, but more concre… ▽ More

    Submitted 17 October, 2010; v1 submitted 10 November, 2009; originally announced November 2009.

    Comments: 17 pages; notational mistakes in tables 5 and 6 corrected; erroneous definition at bottom of page 9 corrected

    Report number: PRG0913 ACM Class: F.1.1; F.4.1

  43. Instruction sequence processing operators

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Instruction sequence is a key concept in practice, but it has as yet not come prominently into the picture in theoretical circles. This paper concerns instruction sequences, the behaviours produced by them under execution, the interaction between these behaviours and components of the execution environment, and two issues relating to computability theory. Positioning Turing's result regarding the… ▽ More

    Submitted 7 March, 2012; v1 submitted 29 October, 2009; originally announced October 2009.

    Comments: 37 pages; missing equations in table 3 added; combined with arXiv:0911.1851 [cs.PL] and arXiv:0911.5018 [cs.LO]; introduction and concluding remarks rewritten; remarks and examples added; minor error in proof of theorem 4 corrected

    ACM Class: D.3.3; F.1.1; F.4.1

    Journal ref: Acta Informatica, 49(3):139--172, 2012

  44. arXiv:0909.5271  [pdf, ps, other

    math.RA cs.LO

    Partial Komori fields and imperative Komori fields

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: This paper is concerned with the status of 1/0 and ways to deal with it. These matters are treated in the setting of Komori fields, also known as non-trivial cancellation meadows. Different viewpoints on the status of 1/0 exist in mathematics and theoretical computer science. We give a simple account of how mathematicians deal with 1/0 in which a customary convention among mathematicians plays a… ▽ More

    Submitted 29 September, 2009; originally announced September 2009.

    Comments: 10 pages

    Report number: PRG0911 MSC Class: 12E99; 12L99

  45. arXiv:0909.2839  [pdf, ps, other

    cs.PL

    A progression ring for interfaces of instruction sequences, threads, and services

    Authors: Jan A. Bergstra, Alban Ponse

    Abstract: We define focus-method interfaces and some connections between such interfaces and instruction sequences, giving rise to instruction sequence components. We provide a flexible and practical notation for interfaces using an abstract datatype specification comparable to that of basic process algebra with deadlock. The structures thus defined are called progression rings. We also define thread and… ▽ More

    Submitted 15 September, 2009; originally announced September 2009.

    Comments: 12 pages

    ACM Class: D.2.2; D.3.1; F.3.2

  46. Indirect jumps improve instruction sequence performance

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Instruction sequences with direct and indirect jump instructions are as expressive as instruction sequences with direct jump instructions only. We show that, in the case where the number of instructions is not bounded, we are faced with increases of the maximal internal delays of instruction sequences on execution that are not bounded by a linear function if we strive for acceptable increases of t… ▽ More

    Submitted 17 August, 2012; v1 submitted 11 September, 2009; originally announced September 2009.

    Comments: 10 pages, definition of maximal internal delay and theorem 1 are stated more precise; presentation improved

    Report number: PRG0910 ACM Class: D.3.3; F.1.1; F.3.3

    Journal ref: Scientific Annals of Computer Science, 22(2):253--265, 2012

  47. arXiv:0909.2088  [pdf, ps, other

    math.RA cs.LO

    Arithmetical meadows

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: An inversive meadow is a commutative ring with identity equipped with a multiplicative inverse operation made total by choosing 0 as its value at 0. Previously, inversive meadows were shortly called meadows. A divisive meadow is an inversive meadows with the multiplicative inverse operation replaced by a division operation. In the spirit of Peacock's arithmetical algebra, we introduce variants of… ▽ More

    Submitted 2 November, 2010; v1 submitted 11 September, 2009; originally announced September 2009.

    Comments: 14 pages; sections 4 and 5 permuted

    Report number: PRG0909 MSC Class: 12E12; 12E30; 12L05

  48. Inversive Meadows and Divisive Meadows

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Inversive meadows are commutative rings with a multiplicative identity element and a total multiplicative inverse operation whose value at 0 is 0. Divisive meadows are inversive meadows with the multiplicative inverse operation replaced by a division operation. We give finite equational specifications of the class of all inversive meadows and the class of all divisive meadows. It depends on the an… ▽ More

    Submitted 2 November, 2010; v1 submitted 3 July, 2009; originally announced July 2009.

    Comments: 18 pages; error corrected; 29 pages, combined with arXiv:0909.2088 [math.RA] and arXiv:0909.5271 [math.RA]

    MSC Class: 12E12; 12L05; 12L12; 16E50; 68Q65

    Journal ref: Journal of Applied Logic, 9(3):203--220, 2011

  49. arXiv:0906.3083  [pdf, ps, other

    cs.PL

    Instruction sequence notations with probabilistic instructions

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: This paper concerns instruction sequences that contain probabilistic instructions, i.e. instructions that are themselves probabilistic by nature. We propose several kinds of probabilistic instructions, provide an informal operational meaning for each of them, and discuss related work. On purpose, we refrain from providing an ad hoc formal meaning for the proposed kinds of instructions. We also dis… ▽ More

    Submitted 1 October, 2014; v1 submitted 17 June, 2009; originally announced June 2009.

    Comments: 15 pages, revised because arxiv:1409.6873v1 [cs.LO] has come out

    Report number: PRG0906 ACM Class: D.1.4; F.1.1; F.1.2

  50. arXiv:0905.4612  [pdf, ps, other

    cs.LO

    Straight-line instruction sequence completeness for total calculation on cancellation meadows

    Authors: Jan A. Bergstra, Inge Bethke

    Abstract: A combination of program algebra with the theory of meadows is designed leading to a theory of computation in algebraic structures which use in addition to a zero test and copying instructions the instruction set $\{x \Leftarrow 0, x \Leftarrow 1, x\Leftarrow -x, x\Leftarrow x^{-1}, x\Leftarrow x+y, x\Leftarrow x\cdot y\}$. It is proven that total functions on cancellation meadows can be compute… ▽ More

    Submitted 29 May, 2009; v1 submitted 28 May, 2009; originally announced May 2009.

    Comments: 24 pages