Fabulous Book Review

时间:2024.4.27

Anne Frank, a 13-year-old, strong-willed, and courageous girl, is living in the Secret Annex during WW Ⅱto escape the Nazi regime. Anne, along with her family and close friends, are hiding from the Nazis because they are of the Jewish faith. Anne falls in love with Peter, a 15 year-old boy who is living with her in the Secret Annex. They become very close as they spend time in the attic trying to escape Peter's annoying mother. The group living in the Secret Annex has to be extremely careful. If they make too much noise, they have a chance of being caught. If they are caught, they will most likely be sent to a concentration camp. Any loud noise or movement could cost the eight tenants of the Secret Annex to die.

"Anne Frank: The Diary of a Young Girl" is an amazing book. It lets you realize how lucky we are to live in the world we live in today. The struggles that Anne and the group go through to live a "normal" life are nothing like anyone in today's world would be forced to go through. It allows people interested in WW Ⅱ to gain information as to what it was like to live during the war.

"Anne Frank: The Diary of a Young Girl" is a must read. It is very informative, yet allows the reader to learn about WW Ⅱ in an interesting way. So, if you like WW Ⅱ and are interested in learning what it was like to live back then, this book is for you. It is also a good

piece of historical fiction. Pick it up today!


第二篇:The Book Review Column


TheBookReviewColumn1

byWilliamGasarch

DepartmentofComputerScience

UniversityofMarylandatCollegePark

CollegePark,MD,20742

email:gasarch@cs.umd.edu

WelcometotheBookReviewsColumn.Wehopetobringyouatleasttworeviewsofbookseverymonth.Inthiscolumnfourbooksarereviewed.

1.StableMarriageanditsRelationtoOtherCombinatorialProblems:AnIntro-ductiontoAlgorithmAnalysisbyDonaldKnuth.ReviewedbyTimMcNichol.Thisbookusesthestablemarriageproblemasmotivationtolookatsomemathematicsofinter-est.Itwouldbeusefulforundergrads;however,foraseriousstudyofmatchingtherearemoreadvancedandmoreup-to-datebooksavailable.

2.TheLimitsofMathematicsbyGregoryJ.Chaitin.ReviewedbyVladimirTasic.ThisbookisonalgorithmicinformationtheoryandrandomnessastheyrelatetoBerry’sParadox(“theshortestnumberthatrequireslessthan1000characterstodescribeit”hasjustbeendescribedbythatphraseinquotes,yetthatphrasewaslessthan1000characters.)

3.PrivacyontheLinebyWhit?eldDi?eandSusanLandau.ReviewedbyJosephMakle-vitch.Thisbookisaboutthebalancebetweenthecitizen’sneedforprivacyandthegovern-ment’sneedtointrudetopreventorsolvecrimes.Theseissuesarerelevantnowbecauseofcrytographyandcomputers.Theauthorsarerespectedtheoristswhohaveworkedincryptog-raphy,hencetheircommentsareworthyconsidering.Thisbookhascausedsomecontroversyinthemathcommunity—seetheJune-July1998issueofNoticesoftheAMS,alsoavailableat/notices.Or,betteryet,readthebook!

4.ATheoryofObjectsbyAuthors:Mart??nAbadiandLucaCardelli.ReviewedbyBrianPostow.Thisbookisaboutformalizingthesemanticsofobject-orientedlanguages.Todothis,anewcalculusisintroduced.

Reviewof

StableMarriageanditsRelationtoOtherCombinatorialProblems:

AnIntroductiontoAlgorithmAnalysis2

Author:DonaldE.Knuth

PublishedbyAmericanMathematicalSocietyin1996

$19.00,Softcover

ISBNnumber0-821-80603-3

Reviewer:TimothyH.McNicholl

1Overview

ThisbookisatranslationoftherevisedandcorrectededitionofMarriagesstablesetleursrelationsavecd’autresprobl`emescombinatoriespublishedin1976byLesPressesdel’Universit?edeMontr?eal.ItisbasedonaseriesoflecturesgivenbytheauthorattheCentrederecherchesmathematicques.

Thepurposeofthebookistogiveaninformalintroductiontoalgorithmanalysisinwhichthemainideasareintroducedbyexampleratherthanbytheorems.

Thechiefexampleusedisthestablemarriageproblemwhichcanbede?nedasfollows.A?nitesetof‘men’isgivenalongwithasetof‘women’ofthesamecardinality.Inaddition,eachpersonisassumedtohavearankingofthemembersoftheoppositesex.Amatchingisabijectionbetweenthetwosets.Wethinkofamatchingasasetofnmonogamousmarriages.AnunstablematchingisoneinwhichthereisamanXandawomanYsuchthatXranksYhigherthanhisspouseandYranksXhigherthanherspouse.Themethodsusedto?ndthemeannumberofstepsrequiredbythisalgorithmarethenappliedtoanalgorthmto?ndtheshortestdistancesbetweenanodeandalltheothernodesinagraph.Analgorithmforstoringinformationinatablebyhashingisthenconsideredandtheresultsobtainedareusedtodevelopalowerboundonthismeaninthecasewherethewomenallhavethesamerankingofthemen.Theasymptoticvalueofthismeanasafunctionofthenumberofmenisthenobtainedusingaprobabalisticmethod.

2SummaryofContents

Thematerialispresentedinseven‘lectures’.The?rstofthesede?nesthestablemarriageprobleminasuitablyinformalstyle(nomentionismadeoflinearordersandthelike;rather,rankingsarepresentedviamatrices).Examplesaregiventoillustratestableandunstablematchingsaswellastodemonstratethatmany‘societies’haveseveralstablematchings.Thisraisestheissuesastowhethersomestablematchingsarebetterthanothersandwhetherthereexistsan‘optimal’stablematching.Theseissuesareaddressedintheproblemsetforthischapterviathefollowingprovocativeexercise:showthatthematchingobtainedbymarryingeachmantothehighestrankedofallbrideshecanobtaininsomestablematchingisastablematching.Thismatching,whichis‘male-optimal’byde?nition,turnsouttobe‘female-minimal’inthesensethatnowomancandoanyworsethanshedoesinthismatching.

Lecture2presentsanalgorithmforobtainingastablematching.Althoughthisterminologyisnotusedinthetext,thealgorithmcouldbecalledthe‘courtshipalgorithm’sinceitmimicshowmarriagesareformedinmanysocieties.Thealgorithmismercilesslypresentedinpseudo-ALGOL,butitsoperationcanbesummarizedasfollows.Eachmancontinuestomakemarriageproposalsuntilhebecomespermanentlyengaged.Onlyonemanisallowedtomakeproposalsatanypointintime,andwheneveramanmakesaproposal,hedoessotothewomanherankshighestoutofallthosewhohavenotpreviouslyrejectedor‘dumped’him.Awomanrejectsaproposalonlyifsheisalreadyengagedtoamanshelikesbetterthanthesuitor;otherwiseshedumpshercurrent?anceinordertoaccepttheproposal.Itisshownthatthealgorithmeventuallyterminatesandthatwhenitdoesthematchingobtainedisstable.Furthermore,itisshownthatthematchingobtainedisthemale-optimalmatchingdiscussedintheexercisesforlecture1.Anexampleislaborouslyworkedthorughinordertoillustratetheoperationofthealgorithm.Moreinsightintothealgorithm’smachinationscouldhavebeenconveyedifaninformalpresentationofthemainideasinvolvedhadpreceededthepseudo-code.

Thenumberofpropsosalsmadeduringthecourseofthealgorithmprovidesagoodestimateofthenumberofstepsneededbythealgorithm,andtheformerquantityisanalyzedinlecture3.Itisshownthatthemeannumberofproposalsmadewhentherearenmenandnwomenandthepreferencematrixofthewomenis?xedisnomorethan(n?1)Hn+1whereHnisthesumofthe?rstntermsoftheharmonicseries.Onlyanupperboundisobtainedsincetheproblemissimpli?edbyassumingthatthemenhave‘partialamnesia’.Namely,whenvertheymakeaproposal,theycanonlyrememberthelastwomanwhohasdumpedorrejectedthemwhenevertheyaremaking

2

aproposal.Asaresulteachmanpossiblymakessomeredundantproposalsandhenceandupperboundisobtained.Theassumptionofpartialamnesiaallowstheproblemtobealmostcompletelyreducedtothatofdeterminingtheprobabilitythatacouponcollectorwhoalreadypossesesmofncouponsnextobtainsacouponalreadyinhercollection.

Inthefourthlecture,thesetechniquesareappliedtoDijkstra’salgorithmfor?ndingtheshortestdistancesfromanodeinagraphtoeachoftheothernodesinthegraph.Theapplicationismadeviaananalogybetweenthenodesinthegraphandthewomeninthemarriagealgorithm.Thelogicisglossedover,butitisdemonstratedthatthemeannumberofstepsinDijkstra’salgorithmisnomorethanthemeannumberofproposalsinthemarriagealgorithm.

The?fthlectureconsidersthesearchingofatableviahashing.Itisshowninastraightforwardmannerthatwhentherearemitemsinatablewithnstorageblocks,thenthemeannumberofstepsrequiredtoplacethenextitemis

n+1

Reviewof

TheLimitsofMathematics3

Author:G.J.Chaitin

PublishedbySpringerVerlagin1998

Hardcover,$32.00

160pages

ISBN981-308-359X

Reviewby

VladimirTasic

UniversityofNewBrunswick

vlad@conway.math.unb.ca

Ifyou?ndpleasureinbeingba?edbytheausterityoflogicistincompletenessproofsbasedonBerry’sparadox,thisisnotabookforyou;Boolos’sminimalistgem(whichappearedinthe“NoticesoftheA.M.S.”afewyearsago)isyournaturalchoice.If,ontheotherhand,youactuallywanttolearnsomethingabouttherelationshipbetweenBerry’sparadox,randomnessandincomplete-nesspheno-mena,Irecommend“TheLimitsofMathematics”.Chaitinhasinvestedconsiderableenergyintoexplaininghiswayofthinkingaboutthetopic,fromthepointofviewofalgorithmicinformationtheory.Thisbookisprimarilyconcernedwiththe“why”andthe“how”oflimitativeresults.Theideasarecarefullymotivated,revisitedandreinforcedthroughout,emphasizingintuitiveunderstandingratherthanadrylyformal“theorem-proof”approach.Theresultisabookthatleavesthereaderwiththefeelingofhavingwitnessedoneofthoserareevents:agoodlecture.“TheLimitsofMathematics”isnotintendedtobebed-timereading.Itrequiresactiveparticipationofthereader,whoischallengedtosupplythedetailsandinvitedtotryoutthesoftwarethatcomesalongwiththiscourse.Admittedly,the?ftypagesofcodeattheendofthebookmightappearslightlyintimidatingtothoseofuswhoquitprogramminguponencounteringCOBOL.However,thepresentationofalgorithmicinformationtheoryintermsofanexplicitcomplexitymeasurebasedonamodi?edversionofLISPisoneofthekeyfeaturesofthebook.Inadditiontomakingpossiblethehands-onapproachwhichtheauthorsuggests,dealingwithasuitablychosenLISPdialectallowsChaitintoestablishexplicitlysomeoftheconstantsthatoccurincomplexityestimates.Forexample,itisderivedthatthecomplexity(inChaitin’ssense)ofthebit-stringconsistingofthe?rstNbitsofthehaltingprobabilitymustbegreaterthanN?8000.Variousotherresultsaremadeexplicit,includingtheboundonthecomplexityofthetheoremsofaformalaxiomaticsystem.Thisincompletenesstheoremisusedtomakethecasefora“quasi-empirical”philosophyofmathematicsandtheuseofcomputersastoolsformathematicalexperimentation.Iamnotaspecialistonalgorithmicinformationtheory;havingreadthisbook,IfeelIunderstandsomethingaboutthis?eld.

Reviewof

PrivacyontheLine4

Author:Whit?eldDi?eandSusanLandau

PublishedbyMITPress1998

Hardcover,$25.00

360pages

ISBN0-262-04167-7

Reviewby

JosephMaklevitch

YorkCollege(CUNY)

joeyc@cunyvm.cuny.edu

InhisbookAMathematician’sApology,thepaci?stG.H.Hardyattemptedtotakecomfortfromthefactthatnumbertheory,hisareaofspecialty,mightneverbeputtoanyuse,especiallyusethatHardywouldnothaveapprovedof.Hardywasnaive.StanislasUlam,the”pure”mathematicianturnedphysicist,iscreditedwithbeingtheco-inventerofthehydrogenbomb-adubioushonor.Yetthepaththatideaswillleadto,eventhoseinitiallydevelopedforreasonsofunlikelyvaluetomankind,aredi?culttochart.WhatisperhapsclosertothetruththanHardy’shopeisathoughtofthetopologistLeoZippin:ifsomemathematicianiscleverenoughto?ndwhatseemstobehopelesslyabstractresults,someothermathematicianwillbecleverenoughto?ndausefortheresults.Manytheoristsinmathematicsandcomputersciencetodayliveinaworldmorede?nedbythepotentialofbigdollarsignsthanthattheirworkmaysitadmiredmerelyforits”beautyandelegance”inascholarlyjournal.Today,theoreticiansmaybereluctanttopublishsomeoftheir”beautiful”workinascholarlyjournaltoosoon,lestthisactionserveasanimpedimenttotheuseoftheideaaspartofapatentapplication.Softwarepatentsandotheremergingtrendsinintellectualpropertylawarebecomingpartoftheivorytowerworld.Hardy,Isuspect,wouldnothaveapproved.

Althoughtheissueofthegoodandevilthatcanbeaconsequenceofone’sworkinmathematicsorcomputerscienceisnotexplicitinthenewbookPrivacyontheLinebyWhit?eldDi?eandSusanLandau,itmightwellbe.Researchershavedevelopedawidevarietyofmathematicalandcomputersciencetoolswhich,whenusedinconjunctionwithotherdevelopmentsinphysicsandengineering,arerelatedtoawidearrayofnewdigitaltechnologies.Thesenewtechnologies,suchasbarcodes,fax,emailandvoicemail,awidearrayofnewkindsofpagers,wirelesstelephony,ATMmachines,digitaltelevision,theWorldWideWeb,etc.,arechangingthewaypeopleallovertheworldleadtheirlivesanddobusiness.Althoughtheydonotalwaysrequirecodesfortheirfunctioning,codesareinmanywaysdirectlyrelatedtothesenewtechnologiesbecausecodescanbeusedinawidevarietyofinformationsettings.Theycanbeusedtotrack,correct,compress,hide,andsynchronizedata,tonamebutafewofthemorevisiblepurposesthatcodesareputto.Di?eandLandau’sbookzoomsinonarelativelynarrowpartoftheinformationrevolutionbut,nonetheless,apartofitthata?ectsallpeople.Di?eandLandauzeroinonprivacy.

Concernwithprivacyisveryancient.Fromoneperspective,toachieveprivacyistohideinformationthatyoudonotwantotherstohave.Theneedforkeepingsecretsinthea?airsofstateandthemilitaryareclear.Furthermore,thereisalongtraditionofusingcodesandothertechnicaldevices(e.g.secretwriting)toachievethissecrecy.JuliusCaesarisoftencreditedwithagreatleapforwardinthesystematicattempttohideinformationusingcodes.Hedevisedtheidea

thataplaintextcouldbedisguisedbyreplacingeachletterofthealphabetwiththeletterofthealphabetobtainedbyshiftingthethealphabeta?xednumberofpositionsandcyclinglettersatthebeginningaroundtotheend(orviceversa).Thegoalevenduringearlye?ortsincryptographywasthedevelopmentofeasy-to-useandimpossible-to-breakcodes.(Intechnicalparlancethereisadi?erencebetweencodesandciphers,buthereIwillusethetermcodesinagenericfashion.)

FromCaesar’searlybreakthrough,progresshasaccelerated.BythetimeWorldWarIIoc-curredmostcountrieshadsophisticatedgovernmentagenciesinvolvedinthedesignandattempttodeciphercodes.Goingintothewarthegeneralpublicactuallyhadtheimpressionthatbyusingingeniousmechanicalmachines,thatmilitaryoperationsandgovernmentoperationscouldbecar-riedoutwithoutrevealinginformationtothepryingeyesofothercountries.However,revelationsmadeafterthewarexplodedthatmyth.ItwaslearnedthatBritishandAmericancryptographershadchangedthecourseofthewarandhistorybyusingmathematicsandemergingcomputationaltechniquestobreaktheGermanandJapanesecodes.Thesigni?canceofthefactthatEnglandwasreadingGermancodeswasofsuchimportanceandvalue,thatsomehaveclaimedthatChurchillchosenottoalerto?cialsinCoventryofanimpendingGermanattack(whichresultedinhorri?clossoflifeandproperty)ratherthanriskthattheGermanswoulddeducethattheircodeswerecompromisedifCoventrydisplayedpreparationforthewell-guardedattackplans.(Britishgovern-mento?cialsdenythatChurchilldidthis,givinganexplanationofwhyBritishauthoritiesdidnotknowoftheCoventryattackplans.However,wouldauthoritieseventodayadmitthetruereasonsifthedecisioninvolvedtradingthelivesofinnocentpeoplefora”higher”good?)

Thesetriumphsofhumaningenuityraisedthepossibilitythattherewasnosuchthingasanunbreakablecryptologicalsystem.Thisisnottechnicallytrue.Thereistheone-timepad,asystemwhichusestwocopiesofarandomlygeneratedkeytoguaranteesecurity.Theproblemwiththeone-timepadisthatitrequiresahighoverheadtoimplement.Thus,eventhoughduringthecoldwartheSovietUnionusedone-timepads,theUnitedStateswasabletotakeadvantageofthesloppyimplementationused.

Untilafewyearsagocryptology,thescienceofconstructingandbreakingcodes,waslargelywithintherealmofagenciesofgovernmentsconcernedwithnationalsecurity.IntheUnitedStatesthisagencyistheNationalSecurityAgency(NSA),anorganizationwhichuntilveryrecentlyworkedinwaysandatcoststhatwerelargelyunscrutinized,certainlybythepublicatlargeandevenbyotherpartsofthegovernment.WhileinrecentyearsNSAwasknownforhiringlargenumbersofcomputerscientists,mathematicians,andlanguagespecialists,itdidnothavetoomuchinterfacewithotherpartsofnationallife.Thiswastochangeinpartduetoaremarkabletheoreticalbreakthroughinvolvingthemanagementofcodekeys.Firstdescribedintheopenairofscholarlyideas,Whit?eldDi?e,MartinHellmanandRalphMerkledevelopedarevolutionarynewapproachtocryptographywhichinvolvedwhathascometobecalledpublic-keycryptography.Basedonthisinnovation,otherworkers,notablyLeonardAdleman,RonaldRivest,andAdiShamir,generatedimplementablesystemsbasedontheseprinciples.

Thedevelopmentofpublic-keyconceptsnotonlyraisedthepossibilityofcheapsecurecodesbutalsootherinterestingpossibilities.Forexample,whenmessagesaresentthereareconcernsaboutissuessuchaswhoreallysentthemessageorwhetheramessagesentbyXhasbeenalteredafterXsentit.Cansystemsbedevisedthatprovideelectronicequivalentsofsharingpower,signingabindingdocument,provingidentity,etc.?Notalloftheearlysuggestionsforpublic-keysystemshavesurvivedattemptstoshowthattheycouldnotbebroken(i.e.MerkleandHellman’sknapsacksystemhasbeenshowntobeinsecure).However,public-keyideashaveraisedthespecterofeasytoimplement,secure(i.e.forallpracticalpurposesunbreakable)codesthatcanbeusedtoprotectemail,wirelesstelephony,andrelatedtechnologies,includingonesnotyetthoughtof.Public-key

6

cryptographycatapultedcodesintothebusinessworld.Inaglobaleconomysellingsecuresystemsfortheinterchangeofmoneyorideasbetweenbanks,creditcardtransitions,etc.o?ersahugemarket.Suddenly,theactivitiesofscholarsandbusinessescametotheattentionofNSAand/ortheFBI.NSAwasconcernedthathardwareofAmericanoriginwouldbesoldabroadandusedtoprotectthesecretsofforeigncountrieswhosesecretswerecurrentlypotentiallymonitorablebytheUS.TheFBIwasconcernedthatmembersoforganizedcrimewouldbeabletoavoidbeingbroughttojusticeiftheycouldtakeadvantageofthesecuritythatnewtechnologiesmightmakepossible.

ThisbringsustosomedetailsofDi?eandLaudau’sbook.Thebookbeginswithabriefhistoryofcryptographyandaprimerofpublic-keymethodsandadiscussionthatnewencryptionideasbringforawidevarietyofimprovedandemergingtechnologies.(Tosupportthisdiscussion,Imighthavewishedforanappendixthattreatedsomeofthedetailsoftheconceptsbehindpublic-keyideas.)Thebookthengivesadetailedhistoryofthewaythatlawenforcementagencieshaveoperatedtoobtaininformationthatmightbeofvalueinsolvingorprosecutingcrime.Speci?cattentionisgiventotheissueoflawenforcementagencies’beingabletomonitorandlisteninontelephonetra?cascomparedwithusingsurveillancedevicesand”wires”assourcesofinformation.Theauthorsdetailtheconsequencesthatnewencryptiontechnologymighthaveforlawenforcementagenciesandthepublic’sdesireforandperceptionofprivacy.Mightthegeneralpublicpreferanassuranceofcommunicationprivacyevenwhenthismeanscriminalswouldhavethesameprotectionasthosewhoobeythelaw?Willkey-escrowsystemsworkasexpectedweresocietytodecidethatitwishedtogothisroute?Thesekindsofquestionsandissues,aswellasmanyrelatedones,areablyraisedbythisbook.

AlthoughDi?eandLandauareconcernedaboutprivacyissues,theydonotbringtotheirreaders’attentionallaspectsofnewtechnologythata?ectthismatter.Examplesarethepowerofglobalpositioningsystemstomonitorthelocationofpeopleusingcellphones,securityviacomputervoicerecognitionsystems,or?ngerprintchips.Theissuestheyraise,infact,havebroadersettingsthantheysuggest.

SincemanyfeelthatprivacyisoneofthecoreAmericanvalues,Di?eandLaudau’sbookisavaluableservicetoallofus.Itraisestheimportantandsubtleissuesthatscholars,legislators,andcitizenshavetobalanceinacapitalisticdemocracy.Thiswellwrittenandresearchedbookdeservestobewidelyread.

References

Hardy,G.H.,AMathematician’sApology,CambridgeU.Press,NewYork,1940.

Lebrow,I.,TheDigitalConnection,ComputerSciencePress,Rockville,1991.

Rivest,R.,TheCaseagainstRegulatingEncryptionTechnology,inSpecialReport,

ComputerSecurityandtheInternet,Scienti?cAmerican,October,1998,p.116-117.

Schneier,B,andD.Banisar,TheElectronicPrivacyPapers:Documentsonthe

BattleforPrivacyintheAgeofSurveillance,Wiley,1996.

7

Reviewof

ATheoryofObjects

Series:MonographsinComputerScience

Authors:Mart??nAbadiandLucaCardelli

Publisher:Springer-Verlag,1996

ISBN:0-387-94775-2

$44.95,Hardcover,396pages

Reviewer:BrianPostow

1Overview

Whenanewprogramminglanguageisdesigneditissometimesusefultohaveaformallanguageinwhichwecandescribewithmathematicalrigorwhataprograminthatlanguageisdoing.Thismathematicallanguagecanbethoughtofasasemanticsoftheprogramminglanguage.Ifthesemanticsissu?cientlywelldevelopedwecanuseittoprovethataprogramdoeswhatwethinkitdoes.Noactualprogrammereverdoesthis,butitiscomfortingtoknowthatitcanbedone.

Thereareseveraldi?erentmathematicallanguagesforgivingthesemanticsofimperativepro-gramminglanguages(e.g.CorPascal).Control?owgraphs,orlogicalinvariantscanbeusedforthis.Therearealsoseveraldi?erentλ?calculifordescribingthesemanticsoffunctionalprogram-minglanguages(e.g.LisporML).Likewisewecanuseclassicallogicandresolutionasasemanticsoflogicallanguages(e.g.Prolog).However,thereisnomathematicallanguagefordiscussingthesemanticsofobjectorientedprogramminglanguages(e.g.JavaorSmalltalk)thatisfullysatisfying.Thegoalofthisbookisto?llthisvoid,oratleasttomakeastart.

Theauthorscomefromthefunctionalprogrammingandformalsemanticssideofthe?eld,ratherthanthesoftwareengineeringside,thereforetheyproposeacalculusthatisbasedontheλ?calculus,ratherthananyactualprogramminglanguageinuse.However,inthisnewcalculus,whichtheycallthe??calculus,insteadoffunctionsbeingprimitive,objectsare.Theauthorsproduceafamilyof??calculiinordertohopefullyrepresentmoreandmorecomplicatedobjectorientedtechniquesandstructures.

2SummaryofContents

Thebookisdividedinto4sections:areviewofobjectorientedfeatures,?rstordercalculi,secondordercalculi,andhigherordercalculi.

2.1Review:ObjectOrientedFeatures

Thisisagoodoverviewoftheobjectorientedstructuresandtechniquesthatwillbediscussedintherestofthebook.Theauthorsdiscussthedi?erencesbetweenclass-basedlanguagesandobjectbasedlanguages,andtheadvantagesanddisadvantagesthereof(thecalculiinthebookarealmostallobjectbasedbecauseoftheincreasedsimplicity).Theyalsodiscusssubclassing,subtyping,inheritance,andsubsumption,andexplainwhatuseanddi?cultiesthesewillcauselaterinthebook.

8

2.2PartI:UntypedandFirst-OrderCalculi

InPartI,theactualcontentofthebookbegins.Theauthorsstartbygivingthesimplest??calculus,anuntypedobjectcalculuswithnobellsorwhistles.Sincethiscalculusdoesn’tdescribesubtypingatall,itismerelyajumpingo?pointforthe?rstordertypedcalculi.

Throughouttherestofthepart,variousissuesareraisedandconstructsareaddedtothecalculustodealwiththem.Forexample,whensubtypingisaddedtothecalculus,itisfoundthatfunctiontypesdon’tfollowthesubtypingrelationintheexpectedway.Ifyouhave2functiontypes:F=A→BandF′=A′→B′andyouwantFtobeasubtypeofF′(F<F′),whatdoyouneedtoknowaboutA,A′,B,andB′?Well,youwantanobjectoftypeFtobeusableinanyplacethatexpectsanobjectoftypeF′.IfB<B′thenwhateverafunctionoftypeFreturns,itwillbeacceptabletothereceiver.Thisiscalledco-variance.Ontheotherhand,whenwelookattheargument,theresultsarenotasintuitive.AnyargumentthatwouldbevalidtopasstoafunctionoftypeF′mustbevalidinthefunctionofclassF.ThereforeA′<Amusthold.Thisiscalledcontra-variance.Issuesofco/contra-varianceoccuratregularintervalsthroughoutthebook.

2.3PartII:Second-OrderCalculi

PartIdealsmainlywithmethodsandsub-typing.PartIIgetstotheothermaindi?cultyofobjectorientedsemantics:thetypeofSelf.

Manyusefulprogramsareverydi?culttowriteifobjectscan’ttalkabouttheirowntype.However,determiningthetypecorrectnessofobjectsthatDOknowwhattypetheyarebecomesunintuitiveveryquickly.Inaddition,Selftypesaddavarietyofnewvarianceissues.Forexample,whatisthee?ectofinheritanceonaninheritedmethodthatusesaSelftype?Thisisaquestionthatrelatestomuchoftherestofthebook.

2.4PartIII:Higher-OrderCalculi

Havingfailedtocometoasatisfying?rstorsecond-ordercalculi,theauthorsresorttohigher-ordercalculitodealwithproblemsthattheyhaddevelopedearlier.Theyreferencetypetheory,especiallyGirard’ssystemF.

Usingahigherordertechniques,theauthorsdoarriveatacalculusthatallowsthemtodoprettymucheverythingthattheywantto(includingbinarymethodsofthetypeSelf*Self→Self).Howeveratthispointthecalculusissocomplexandclutteredwithsyntaxthatitbecomesverydi?culttoworkwith.

3Style

Thisisnotaneasybook.TheoverviewinPart0isrelativelyeasy,andshouldbereadabletoanyonewhoknowsalittlebitaboutwhatobjectorientedprogrammingis.PartIisalittlemorechallengingandassumessomefamiliaritywiththeλ?calculus,andtheconceptofatypederivation.PartIIismoredi?cultwithmorerelianceontypetheory.PartIIIgetsverydense,withpagesofcomplextypederivations.However,tomakeiteasierthesame3-5examplesareusedrepeatedlythroughoutthebook,soitiseasytocomparecalculi.

9

4Opinion

Thisbookdoesn’tclaimtobeacompletetheoryofobjects,merelya?rstattempt.Atthisitsucceeds.Thetheorythattheauthorsdevelopismuchmorecomplexthanwouldbehoped.Forexample,thelistofnotationsusedinthebooktakes15pages,andthereareover30di?erentcalculiandlanguagesdescribedinthebook.

Overall,itisaveryinterestingbook,buttheauthorsdon’tquiteliveuptotheirgoalofmakingasimplelanguagefordiscussingobjectorientedissues.

10

更多相关推荐:
Unit 6 Do you like bananas 教学反思

Unit6DoyoulikebananasSectionA教学反思在新的教学理念下一堂成功的英语课不仅仅是一堂教学任务得到切实落实的英语课更应该是一堂学生积极参与自主探索发挥想象愉快合作的英语课而我们也知道教学...

七年级英语Unit6 Do you like bananas教学反思

Unit6Doyoulikebananas第一课时的教学反思宣州区寒亭中心初中朱方兰本单元内容主要围绕谈论对食物的喜好展开并以like为例进一步学习实义动词在一般现在时中的用法是上一个单元的延伸本节课是这一单元...

unit6 Do you like bananas教学案例与反思

教学案例与反思Unit6DoyoulikebananasSectionA1a2d教学内容分析本单元内容主要围绕谈论饮食喜好并围绕这一主题进行一系列的交际活动将一些水果以及其他食物名词的学习融入到一系列的小任务中...

Unit_6_Do_you_like_bananas_教学反思

Unit6Doyoulikebananas教学反思今天的课学习的主要话题是关于谈论饮食喜好侧重点在于关于食物的词汇学习上和Doyoulike结构的巩固上这节课上我以介绍食物谈论喜欢与厌恶为主题大体设计了三个环节...

Unit 6 Do you like bananas教学反思

Unit6Doyoulikebananas教学反思本单元主要学习动词like的肯定句否定句的用法动词like的一般疑问句的用法以及肯定与否定的回答本单元以介绍食物谈论喜欢与厌恶为主题设计了三个任务先是利用图片来...

七上英语Unit6_Do_you_like_bananas教学反思

Unit6Doyoulikebananas第一课时的教学反思洪山中心校李贞本单元内容主要围绕谈论对食物的喜好展开并以like为例进一步学习实义动词在一般现在时中的用法是上一个单元的延伸本节课是这一单元的第一课时...

七年级unit6_Do_you_like_bananas_?Section_B_3a教学反思

七年级unit6DoyoulikebananasSectionB3a教学反思槐树铺中学李霞本单元的教学目标为1学会询问对方喜欢与不喜欢的食物2学会了解别人喜欢与不喜欢的食物3学会谈论自己与他人早中晚餐喜欢吃的食...

七年级英语上册unit6 Do you like bananas?教学案例及反思

七年级英语上册unit6Doyoulikebananas教学案例及反思一任务型教学活动1任务型教学活动是这样一种教学活动教师根据课程的总体目标结合教学内容创造性地设计贴近学生实际的教学目标并依据设定的教学目标采...

4AUnit4Icanplaybasketball 课堂实录

4AUnit1Icanplaybasketballperiod1执教海门市三厂小学薛琳瑛Step1WarmingupampPrereadingTClassbeginsGoodafternoonboysandgi...

四年级英语上册Unit4Icanplaybasketball第一课时教案

Unit4Icanplaybasketball第一课时Storytime教学内容义务教育教科书英语四年级上册Unit4Icanplaybasketball第一课时Storytime一教学重点1能听懂会说会读会写...

4AUnit4 I can play basketball 第一课时

凤凰小学备课笔记母案

Unit 4 I can play basketball

白云学校20xx20xx学年度第一学期四年级英语教案Unit4Icanplaybasketball教材学情分析本单元主要学习如何询问他人是否会做某项运动要求学生会说一些体育运动及一些表示动作的单词basketb...

do you like bananas 教学反思(38篇)