Jason (jcreed) wrote,
Jason
jcreed

There was this Manifest Security meeting happening today that I sat in on. Neat stuff. I think I finally understand exactly how Henry and Frank's paper can be 'deconstructed', and it's quite simple. Make a poset with judgments knows_K, has_K, asserts_K, valid, true, lax. What the paper calls "hyp" on the left is the same as what it calls "true" on the right, and I'm calling them both just "true". Valid and knows_K are unrestricted, and the rest are linear. Axiomatize the stronger-than relation by taking for every K all of
knows_K ≥ has_K
knows_K ≥ valid
valid ≥ true
has_K ≥ true
true ≥ asserts_K
true ≥ lax
and taking the reflexive, transitive closure. Then all the connectives are defined "at true". The connectives [[ ]], [ ], < >, !, and { } are defined as round trips through knows, has, asserts, valid, and lax, departing from and returning to true.

Afterwards tagged along with rwh and ben pierce and one of pierce's students for dinner, much technical conversation ensued.
Tags: work
Subscribe

  • (no subject)

    Hey, tiny red cube of jello, do you wanna go for a WALK?

  • (no subject)

    This snarky programming language design checklist (inspired directly by that classic snarky spam solution checklist) came out of some irc…

  • (no subject)

    groen? Is that you? If not, shouldn't it be, really?

  • Post a new comment

    Error

    Anonymous comments are disabled in this journal

    default userpic

    Your reply will be screened

    Your IP address will be recorded 

  • 0 comments