Coherence of subsumption for monadic types

One approach to give semantics to languages with subtypes is by translation to target languages without subtyping: subtypings A ≤ B are interpreted via conversion functions A → B. This paper shows how to extend the method to languages with computational effects, using Moggi's computational metalanguage.

[1]  David Aspinall,et al.  Subtyping dependent types , 2001, Theor. Comput. Sci..

[2]  Paul Blain Levy,et al.  Call-By-Push-Value: A Functional/Imperative Synthesis , 2003, Semantics Structures in Computation.

[3]  Thierry Coquand,et al.  Inheritance as Implicit Coercion , 1991, Inf. Comput..

[4]  John C. Reynolds,et al.  The Coherence of Languages with Intersection Types , 1991, TACS.

[5]  John C. Mitchell,et al.  Foundations for programming languages , 1996, Foundation of computing series.

[6]  John C. Reynolds,et al.  Using category theory to design implicit conversions and generic operators , 1980, Semantics-Directed Compiler Generation.

[7]  Val Tannen,et al.  Computing with coercions , 1990, LISP and Functional Programming.

[8]  Benjamin C. Pierce,et al.  Types and programming languages: the next generation , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..

[9]  Jan Zwanenburg,et al.  Pure Type Systems with Subtyping , 1999, TLCA.

[10]  Eugenio Moggi,et al.  Notions of Computation and Monads , 1991, Inf. Comput..

[11]  Giorgio Ghelli,et al.  Coherence of Subsumption, Minimum Typing and Type-Checking in F<= , 1992, Math. Struct. Comput. Sci..

[12]  Jan Schwinghammer,et al.  A Typed Semantics of Higher-Order Store and Subtyping , 2005, ICTCS.

[13]  John C. Mitchell,et al.  Theoretical aspects of object-oriented programming: types, semantics, and language design , 1994, Choice Reviews Online.

[14]  Val Tannen,et al.  Denotational Semantics for Subtyping Between Recursive Types , 1989 .

[15]  Benjamin C. Pierce,et al.  Higher-Order Subtyping , 1994, Theor. Comput. Sci..

[16]  Luca Cardelli,et al.  A Semantics of Multiple Inheritance , 1984, Information and Computation.

[17]  Frank Pfenning,et al.  A monadic analysis of information flow security with mutable state , 2005, J. Funct. Program..