{"id":"https://openalex.org/W2616349957","doi":"https://doi.org/10.23638/lmcs-13(4:8)2017","title":"Cyclic Datatypes modulo Bisimulation based on Second-Order Algebraic Theories","display_name":"Cyclic Datatypes modulo Bisimulation based on Second-Order Algebraic Theories","publication_year":2017,"publication_date":"2017-11-15","ids":{"openalex":"https://openalex.org/W2616349957","doi":"https://doi.org/10.23638/lmcs-13(4:8)2017","mag":"2616349957"},"language":"en","primary_location":{"id":"doi:10.23638/lmcs-13(4:8)2017","is_oa":true,"landing_page_url":"https://doi.org/10.23638/lmcs-13(4:8)2017","pdf_url":"https://lmcs.episciences.org/4066/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://lmcs.episciences.org/4066/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081721784","display_name":"Makoto Hamana","orcid":"https://orcid.org/0000-0002-3064-8225"},"institutions":[{"id":"https://openalex.org/I165735259","display_name":"Gunma University","ror":"https://ror.org/046fm7598","country_code":"JP","type":"education","lineage":["https://openalex.org/I165735259"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Makoto Hamana","raw_affiliation_strings":["Department of Computer Science , Gunma University"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science , Gunma University","institution_ids":["https://openalex.org/I165735259"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5081721784"],"corresponding_institution_ids":["https://openalex.org/I165735259"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0540273,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"Volume 13, Issue 4","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9520999789237976,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9520999789237976,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13935","display_name":"Mathematical Control Systems and Analysis","score":0.9190000295639038,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modulo","display_name":"Modulo","score":0.9088644981384277},{"id":"https://openalex.org/keywords/bisimulation","display_name":"Bisimulation","score":0.9073858261108398},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.6208063960075378},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5579793453216553},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.505561113357544},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4441338777542114},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.44092857837677},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.37450918555259705},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3408382534980774},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.3367456793785095},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.25896143913269043},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.061509400606155396}],"concepts":[{"id":"https://openalex.org/C54732982","wikidata":"https://www.wikidata.org/wiki/Q1415345","display_name":"Modulo","level":2,"score":0.9088644981384277},{"id":"https://openalex.org/C135315306","wikidata":"https://www.wikidata.org/wiki/Q866364","display_name":"Bisimulation","level":2,"score":0.9073858261108398},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.6208063960075378},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5579793453216553},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.505561113357544},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4441338777542114},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.44092857837677},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.37450918555259705},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3408382534980774},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.3367456793785095},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.25896143913269043},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.061509400606155396},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.23638/lmcs-13(4:8)2017","is_oa":true,"landing_page_url":"https://doi.org/10.23638/lmcs-13(4:8)2017","pdf_url":"https://lmcs.episciences.org/4066/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1705.06430","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1705.06430","pdf_url":"https://arxiv.org/pdf/1705.06430","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.1705.06430","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1705.06430","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"},{"id":"mag:2964208511","is_oa":true,"landing_page_url":"https://arxiv.org/abs/1705.06430","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"arXiv (Cornell University)","raw_type":null}],"best_oa_location":{"id":"doi:10.23638/lmcs-13(4:8)2017","is_oa":true,"landing_page_url":"https://doi.org/10.23638/lmcs-13(4:8)2017","pdf_url":"https://lmcs.episciences.org/4066/pdf","source":{"id":"https://openalex.org/S114379355","display_name":"Logical Methods in Computer Science","issn_l":"1860-5974","issn":["1860-5974"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313916","host_organization_name":"Logical Methods in Computer Science e.V.","host_organization_lineage":["https://openalex.org/P4310313916"],"host_organization_lineage_names":["Logical Methods in Computer Science e.V."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Logical Methods in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7900000214576721}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2616349957.pdf","grobid_xml":"https://content.openalex.org/works/W2616349957.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1495872178","https://openalex.org/W1522712643","https://openalex.org/W2102135785","https://openalex.org/W2136070637","https://openalex.org/W2783071694","https://openalex.org/W1553849808","https://openalex.org/W1976268573","https://openalex.org/W2089212807","https://openalex.org/W2117548279","https://openalex.org/W2963587252"],"abstract_inverted_index":{"Cyclic":[0],"data":[1,152],"structures,":[2],"such":[3],"as":[4],"cyclic":[5,30,35,63,151],"lists,":[6],"in":[7],"functional":[8],"programming":[9],"are":[10,86],"tricky":[11],"to":[12,120],"handle":[13],"because":[14],"of":[15,23,29,34,43,79,129,146,150],"their":[16],"cyclicity.":[17],"This":[18],"paper":[19],"presents":[20],"an":[21],"investigation":[22],"categorical,":[24],"algebraic,":[25],"and":[26,55,60,81,153],"computational":[27],"foundations":[28],"datatypes.":[31,64],"Our":[32],"framework":[33],"datatypes":[36],"is":[37,117],"based":[38,75],"on":[39,76],"second-order":[40,100],"algebraic":[41],"theories":[42],"Fiore":[44],"et":[45],"al.,":[46],"which":[47,116],"give":[48],"a":[49,118,142],"uniform":[50],"setting":[51],"for":[52,58,99,114,133],"syntax,":[53],"types,":[54],"computation":[56,69,101,135],"rules":[57,70,85],"describing":[59],"reasoning":[61],"about":[62],"We":[65,90,124],"extract":[66],"the":[67,72,84,95,105,127,134,147],"&amp;quot;fold&amp;quot;":[68],"from":[71],"categorical":[73],"semantics":[74],"iteration":[77],"categories":[78],"Bloom":[80],"Esik.":[82],"Thereby,":[83],"correct":[87],"by":[88],"construction.":[89],"prove":[91,126],"strong":[92,122],"normalisation":[93],"using":[94],"General":[96],"Schema":[97],"criterion":[98],"rules.":[102,136],"Rather":[103],"than":[104],"fixed":[106],"point":[107],"law,":[108],"we":[109,140],"particularly":[110],"choose":[111],"Bekic":[112],"law":[113],"computation,":[115],"key":[119],"obtaining":[121],"normalisation.":[123],"also":[125],"property":[128],"&amp;quot;Church-Rosser":[130],"modulo":[131],"bisimulation&amp;quot;":[132],"Combining":[137],"these":[138],"results,":[139],"have":[141],"remarkable":[143],"decidability":[144],"result":[145],"equational":[148],"theory":[149],"fold.":[154],"Comment:":[155],"38":[156],"pages":[157]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
