Abstract 1 Introduction 2 𝝀-calculus 3 Intersection Types and Filter Models 4 Critical Sequences for Intersection Type Theories 5 Critical Sequences in Action 6 Related Work and Conclusion References

Unsolvable Terms in Filter Models

Mariangiola Dezani-Ciancaglini ORCID Dipartimento di Informatica, Università di Torino, Italy Paola Giannini ORCID DiSSTE, Università del Piemonte Orientale, Vercelli, Italy Furio Honsell ORCID Dipartimento di Scienze Matematiche, Informatiche e Fisiche, Università di Udine, Italy
Abstract

Intersection type theories (itt’s) and filter models, i.e. λ-calculus models generated by itt’s, are reviewed in full generality. In this framework, which subsumes most λ-calculus models in the literature based on Scott-continuous functions, we discuss the interpretation of unsolvable terms. We give a necessary, but not sufficient, condition on an itt for the interpretation of some unsolvable term to be non-trivial in the filter model it generates. This result is obtained building on a type theoretic characterisation of the fine structure of unsolvables.

Keywords and phrases:
λ-calculus, Intersection Types, Unsolvable Terms, Filter Models
Category:
Invited Talk
Funding:
Paola Giannini: This original research has the financial support of the Università del Piemonte Orientale.
Copyright and License:
[Uncaptioned image] © Mariangiola Dezani-Ciancaglini, Paola Giannini, and Furio Honsell; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Type theory
Editors:
Maribel Fernández

1 Introduction

The present paper has a remote companion in [19], a paper written by two of the present authors more than 40 years ago, which first generalised the momentous idea of filter model and finitary intersection type assignment system introduced in [12]. In almost half a century of research on λ-calculus huge developments of these ideas have been carried out by the scientific community. Numberless papers have been published capturing many different kinds of properties of λ-terms by means of intersection types, see e.g. [13, Section 17.2]. Most notably, Abramsky [1] fully clarified and further generalised the connections between λ-models and intersection types in terms of Stone Duality. Finitary/static semantics in the form of a type-assignments have become a paradigm for analysing the fine structure of all sorts of λ-models, e.g. qualitative λ-models [38], quantitative λ-models [20, 31], game λ-models [28]. Finally, quite a few papers have been also devoted to exploring the limits of this very paradigm, e.g. [37].

Filter models are useful since the interpretation of a λ-term is determined by all the types which can be statically assigned to it, see Definition 32. This finitary approximation of the interpretation of λ-terms then permits to fully exploit all the machinery of proof theory in semantics, thus providing powerful technical results on type assignment systems such as Inversion, Lemma 19, or Subject Reduction, Theorem 21. The latter is at the root of the well known ditto “Typed programs cannot go wrong”. Filter models are also very flexible, since they capture many different semantic understandings of λ-calculus. There are filter models for lazy λ-calculus, filter models isomorphic to graph models and to inverse limit models [13, Chapter 16]. Clearly, the paramount theoretical importance of λ-calculus lies in that it models recursive functions [11, Theorem 8.4.13]. Very few people still challenge Church’s Thesis, although Gödel himself, in one of his last published works [33, page 306] raises an intriguing doubt. What is the need, therefore, of yet another paper on such a topic?

There are two distinguished classes of pure λ-terms: solvable terms and its complement, the unsolvable terms [11, Definition 2.2.10]. Solvable terms have many features which derive from their computational behaviour [11, Chapter 8]. They are the largest recursively enumerable set closed under β-conversion, while the set of unsolvable terms is computationally as intractable as it can possibly be. λ-calculus is considered the paradigm of functional programming essentially via solvable terms.

The reason for yet anther paper on filter models and intersection type assignment systems lies in that, as a matter of fact, unsolvable terms have been largely disregarded in the literature. Actually only a dozen or so of families of unsolvable terms have been explicitly considered. So, slightly perturbing the title of a well know work of Girolamo Saccheri, we could call the present paper “Insolvabilia ab omni nævo vindicati”.

The property of an unsolvable term which has been traditionally studied is whether it can be consistently equated to an arbitrary closed λ-term [40], i.e. if it is easy. Other interesting subsets of unsolvable terms are zero terms, i.e.  terms which do not reduce to an abstraction, and mute terms, i.e. those zero terms which do not reduce to the application of a zero term to another λ-term [15]. None of these properties is obviously r.e..

The structure of solvable terms is well represented by Böhm trees [11, Chapter 10], which permit to study syntactic properties of λ-terms such as separability [11, Sections 10.4 and 10.5] and invertibility [11, Section 21.2]. In such trees an unsolvable term is represented by a leaf labelled . Lévy-Longo trees [43, 44] refine Böhm trees in that only zero terms are represented by leaves labelled . In turn Berarducci trees [15] refine Lévy-Longo trees in that only mute terms are represented by leaves labelled .

Characterisations of unsolvable terms traditionally refer to their observational behaviour. The only characterisation, to our knowledge, that tries to analyse the internal structure of an unsolvable term was proposed by Kerth in [41]. He conjectured that each unsolvable term has an infinite reduction in which some of its subterms in specific key positions are solvable, see Definition 11. This conjecture was generalised and proved by David [23]. Kerth used this property of unsolvable terms for proving that certain graph and stable models are sensible, i.e.  they equate all unsolvable terms. Crucial for his analysis is the notion of critical sequence for a graph or stable model [41, Definition 6.2].

In the present paper we discuss filter models by means of the general notion of intersection type theory (itt), see Definition 17. An itt can come with peculiar axioms, rules or may satisfy special conditions. Each itt uniformly induces a type assignment system, see Definition 18, and uniformly generates a filter model, see Definition 32. We tailor the definition of critical sequence to an itt, see Definition 38. We use Kerth/David characterisation of unsolvable terms for showing that, if the interpretation of some unsolvable term in a filter model is different from the bottom element, then the itt which generates the filter model has a critical sequence. Finally, we show some examples of sensible itt’s with critical sequences and we give a condition ensuring the absence of critical sequences in itt’s.

We hope that the present paper will stimulate future research on the still mysterious nature of unsolvable terms, possibly leading to a complementary version to Church’s Thesis as far as non-termination is concerned.

Outline.

In Section 2 we recall the basic notions of λ-calculus and Kerth/David characterisation of unsolvable terms. In Section 3 we introduce in full generality filter models over itt’s. Our main contribution deals with the presence/absence of critical sequences in various classes of filter models, see Sections 4 and 5. We conclude with some pointers to the literature and we discuss future work.

2 𝝀-calculus

2.1 Standard Notions and Results

In this subsection we recall some basic notions and properties of untyped λ-calculus following Chapters 2, 3, and 8 of [11]. Readers familiar with λ-calculus can skip this subsection.

We start by defining λ-terms and β-reduction.

Definition 1 (λ-terms [11, Definition 2.1.1]).

The set Λ of pure λ-terms is defined by:

M::=xλx.MMM.

We write λ-terms with the usual notational conventions. In particular we write λx.M as short for λx1xn.M assuming x=x1xn for n. Free and bound occurrences of variables are defined in the standard way. In particular we assume Barendregt’s convention, i.e.  that different variables have different names [11, Convention 2.1.12]. It is handy and standard to associate names to some closed λ-terms (combinators) [11, Definition 2.1.17(ii)]. In the following we will freely use the combinators below.

Definition 2.

We define 𝐈=λx.x, 𝐊=λxy.x, 𝐁=λxyz.x(yz), 𝛀2=λx.xx, 𝛀3=λx.xxx, 𝐀=λxy.y(xxy).

Definition 3 (β-rule and β-reduction [11, Definitions 2.1.15, 3.1.3 and 3.1.5]).
  1. 1.

    The β-rule replaces (λx.M)N with M[x:=N], where M[x:=N] denotes the λ-term obtained by the (capture free) substitution of x by N in M.

  2. 2.

    The one step β-reduction β is defined as the contextual closure of the β-rule.

  3. 3.

    The β-reduction β is defined as the reflexive and transitive closure of β.

  4. 4.

    The β-convertibility is defined as the equivalence relation generated by β.

Crucial to our development are the notions of solvability and unsolvability of λ-terms.

Definition 4 (Solvable and unsolvable λ-terms [11, Definition 2.2.10]).
  1. 1.

    A λ-term M is solvable if there are n λ-terms N1,,Nn such that

    (λx.M)N1Nnβ𝐈,

    where x are the variables which occur free in M.

  2. 2.

    A λ-term is unsolvable if it is not solvable.

As in [41] our study of unsolvable terms is based on the notion of head reduction.

Definition 5 (Head normal form and head redex [11, Definition 8.3.9]).
  1. 1.

    If M=λx.xM1Mm, then M is in head normal form and x is the head variable of M.

  2. 2.

    If M=λx.(λx.N)PM1Mm, then (λx.N)P is the head redex of M.

Every λ-term either is in head normal form or has a head redex.

Proposition 6 (Shape of λ-terms [11, Corollary 8.3.8]).

Every λ-term is either of the form λx.xM1Mm or of the form λx.(λx.N)PM1Mm, where m0.

Definition 7 (Head reduction [11, Definition 8.3.10]).

We write MhN if N is obtained from M by reducing its head redex. The head reduction of M is the finite or infinite sequence of terms M0, , Mn, such that M=M0 and MnhMn+1 with n.

We use h to denote the reflexive and transitive closure of h.

In our development we take advantage from the characterisation of unsolvability by means of head reduction.

Theorem 8 ([11, Fact 2.2.12]).

A λ-term M is unsolvable iff its head reduction is infinite.

2.2 Notions and Results on Unsolvable Terms

This subsection is devoted to the characterisation of unsolvability by means of decorations (Definition 11), first conjectured by Kerth in [41], and then proved by David in [23], see Theorem 13.

Following [41] we start defining the descendants and the arguments of λ-terms.

Definition 9 (Descendants of a λ-term [41, Definition 5.1]).
  1. 1.

    Let R=(λx.N)P be a redex in M and Q be a subterm of M without occurrences of the bound x. Let M be obtained by reducing R in M and let Q1,,Qm be the corresponding occurrences of Q in M. Then each Qi for 1im is a child in M of the occurrence of Q in M.

  2. 2.

    The relation parent is the converse of the relation child.

  3. 3.

    The relation descendant is the transitive closure of the relation child.

  4. 4.

    The relation ancestor is the transitive closure of the relation parent.

For example consider the reduction (λxy.xxy)NPβ(λy.NNy)PβNNP and let M=(λxy.xxy)NP, M=(λy.NNy)P and M′′=NNP. Then the two concurrences of N in M are the children of the occurrence of N in M, which in turn is the ancestor of each of the two occurrences of N in M′′, which are therefore its descendants. The occurrence of P in M is the child of the one in M and the occurrence of P in M′′ is the child of the one in M. Neither the term λxy.xxy nor its subterms λy.xxy and xxy in M have a child in M. The subterm NN in M does not have a parent in M, while NN in M is the parent of NN in M′′.

It is easy to verify that the parent and all its children are identical and that the parent, if any, is unique.

Definition 10 (Arguments [41, Definition 5.2]).

If M=N0N1Nm, then N1,,Nm are the arguments of N0 in M.

Definition 11 (Decoration of head reduction [41, Definition 5.3]).

A decoration of the head reduction of a λ-term M0 is a sequence of pairs Mn,N0n such that for all n:

  1. 1.

    MnhMn+1;

  2. 2.

    Mn=λxn.N0nN1nNmnn;

  3. 3.

    N0n is solvable;

  4. 4.

    N0n+1 is a descendant of Ninn for some in (1inmn).

Clearly for a decoration to exist the initial term M0 in the above definition needs be unsolvable by condition (4). The notion of decoration is quite subtle and requires some discussion, which we do by way of examples.

Example 12.
  1. 1.

    The λ-term 𝐈(𝐀𝐀𝐈) is unsolvable since

    𝐈(𝐀𝐀𝐈)h𝐀𝐀𝐈h𝐈(𝐀𝐀𝐈)h𝐀𝐀𝐈h,

    but the λ-term itself 𝐈(𝐀𝐀𝐈) does not have a decoration, since the only argument of 𝐈 is 𝐀𝐀𝐈, which is unsolvable. However the λ-term 𝐀𝐀𝐈, appearing in the infinite reduction above, does have a decoration, namely Mn,N0n, where Mn=𝐀𝐀𝐈 and N0n=𝐀 for all n.

  2. 2.

    In general the head reduction of an unsolvable term can allow for more than one decoration. For example, if 𝐃=λxyz.yz(xxyz), then some of the decorations of 𝐃𝐃𝐈𝐈 are:

    • Mn=𝐃𝐃𝐈𝐈, N0n=𝐃, and

    • M0=𝐃𝐃𝐈𝐈, N00=𝐃, Mn+1=𝐈𝐈(𝐃𝐃𝐈𝐈), N0n+1=𝐈, and

    • M2n=𝐃𝐃𝐈𝐈, N02n=𝐃, M2n+1=𝐈𝐈(𝐃𝐃𝐈𝐈), N0n+1=𝐈

    for all n.

  3. 3.

    The N0n’s in a decoration are uniquely determined by the first component, however N0n+1 is not always the first solvable descendant of an argument of Mn to appear in the head position of the infinite reduction. This latter term might even be a descendant of the same ancestor and yet not be it, as in the following case. Let 𝐆=λxy.xxyxy, then 𝐈𝐆𝐈𝐆h𝐆𝐈𝐆h𝐈𝐈𝐆𝐈𝐆h𝐈𝐆𝐈𝐆. Consider the decoration 𝐈𝐆𝐈𝐆,𝐈. All 𝐈 in 𝐈𝐈𝐆𝐈𝐆 have the same parent, but the one appearing as the second component in the decoration is not the 𝐈 in head position in 𝐈𝐈𝐆𝐈𝐆.

Theorem 13 (Characterisation of unsolvability by decorations [23, Theorem 2]).

Let M be an unsolvable term. Then there is M0 such that MβM0 and the head reduction of M0 has a decoration.

We recall from [41] some properties of the subterms of unsolvable terms in Lemma 15. This lemma uses the following notions of head closed λ-term and head order.

Definition 14 (Head closed λ-term and head order [41, Definition 6.1]).
  1. 1.

    A λ-term in head normal form is head closed if its head variable is bound.

  2. 2.

    If M=λx1xn.xiN1Nm is head closed, then i is the head order of M.

Lemma 15 ([41, Lemma 6.5]).

Let M=λx.N0N1Nm be unsolvable.

  1. 1.

    If N0 is solvable, then

    1. (a)

      the head normal form of N0 is head closed and its head order i satisfies im;

    2. (b)

      the first descendant of some Nj, 1jm, appearing in head position during the head reduction of M is a descendant of Ni.

  2. 2.

    If N0 is unsolvable, then no descendant of some Nj, 1jm, appears in head position during the head reduction of M.

It is also useful to specify λ-terms which arise when reducing the terms in the decoration sequence, but which may not appear themselves in the decoration sequence.

Lemma 16.

In a decoration Mn,N0n each N0n has a head closed normal form Nn and Mnhλy.NinnR, where in is the head order of Nn and Ninn has a head closed normal form.

Proof.

By definition of decoration Mn=λxn.N0nN1nNmnn and N0n is solvable. By Lemma 15(1a) N0n has a head closed normal form Nn. Let Nn=λzn.zinR1Rp. By definition of head reduction, if q is the length of zn,

Mnhλxn.NnN1nNmnnhλxn.(λzin+1zq.NinnR1Rp)Nin+1nNmnnhλxnzmn+1zq.NinnR1′′Rp′′Nq+1nNmnn,

where Ri=Ri[zj:=Njn1jin], Ri′′=Ri[zj:=Njn1jmin(q,mn)]. In the final term of the reduction we have used a somewhat not standard notation, whereby if qmn then no zj’s are abstracted and if mnq then no Njn’s appear. By Lemma 15(2) and the definition of decoration Ninn is solvable. By Lemma 15(1a) Ninn has a head closed normal form.

For example, consider the decoration (𝐈𝐀)(𝐈𝐀)(𝐈𝐈),𝐈𝐀, we have that the head normal form of 𝐈𝐀 is 𝐀 which has head order 2 and (𝐈𝐀)(𝐈𝐀)(𝐈𝐈)h𝐈𝐈((𝐈𝐀)(𝐈𝐀)(𝐈𝐈)), where the term 𝐈𝐈 is a descendant of the second argument of 𝐈𝐀 and has the obvious normal form 𝐈. Notice that none of the head normal forms, nor the intermediate term appears in the decoration itself, yet the head order of their head normal form matters.

3 Intersection Types and Filter Models

This section is devoted to the definitions of intersection types, type theories, type assignment systems and filter models.

Up to Definition 18 (included) we essentially follow Sections 13.1 and 13.2 of [13]. The only differences are that, in defining intersection types and subtyping, we require the constant 𝖴, which is optional in [13], and our subtyping relation has the additional Axiom (𝖴top).

Definition 17 (Intersection Type Theories).
  1. 1.

    Given a set of constants 𝔸 and a distinguished constant 𝖴, the set 𝕋𝔸 of intersection types over 𝔸{𝖴} is generated by the grammar:

    A,B::=𝖼𝖴AAAA,

    where 𝖼𝔸.

  2. 2.

    A subtyping relation is a binary relation on 𝕋𝔸 closed under the following axioms and rules:

  3. 3.

    An intersection type theory (itt) 𝒯 is determined by a set of type constants 𝔸 and a subtyping relation on the set 𝕋𝔸, i.e. 𝒯=𝔸,𝒯.

We adopt the convention that has precedence over . We write A𝒯B as short for A𝒯B and A𝒯B. The above rules permit to show that is a congruence w.r.t. 𝒯 and moreover that it is idempotent, commutative and associative with neutral element 𝖴. We assume that iAi=𝖴.

Definition 18 (Type Assignment System).

The intersection type assignment system induced by an itt 𝒯=𝔸,𝒯 is a formal system deriving judgements of the shape Γ𝒯M:A, where A𝕋𝔸 and a basis Γ is a finite mapping from term variables to types in 𝕋𝔸:

Γ::=Γ,x:A.

The axioms and rules of the type system are the following

It is easy to verify that the following rules are admissible

where xΓ is short for x does not occur in Γ.


The main properties of intersection type assignment systems are the Inversion Lemma and Subject Expansion, which are proved by induction on type derivations.

Lemma 19 (Inversion Lemma [13, Theorem 14.1.1]).
  1. 1.

    If Γ𝒯x:A and A𝒯𝖴, then Γ(x)𝒯A;

  2. 2.

    If Γ𝒯MN:A and A𝒯𝖴, then there are I and Bi, Ci for iI such that iICi𝒯A and Γ𝒯M:BiCi and Γ𝒯N:Bi for all iI;

  3. 3.

    If Γ𝒯λx.M:A, then there are I and Bi, Ci for iI such that iI(BiCi)𝒯A and Γ,x:Bi𝒯M:Ci for all iI.

Theorem 20 (Subject Expansion [13, Corollary 14.2.5(ii)]).

MβM and Γ𝒯M:A imply Γ𝒯M:A.

Crucial is also the property of Subject Reduction, which however holds only with a proviso.

Theorem 21 (Subject Reduction [13, Proposition 14.2.1(ii)]).
MβM and Γ𝒯M:A imply Γ𝒯M:A

if and only if

Γ𝒯λx.N:BC implies Γ,x:B𝒯N:C.

In fact, not all type systems induced by itt’s enjoy Subject Reduction. For example let 𝒯0={𝖼0,𝖼1},𝒯0, where 𝒯0 has only the axiom 𝖼0𝖼0𝖼1𝖼0, then 𝒯0λx.x:𝖼1𝖼0, but x:𝖼1⊬𝒯0x:𝖼0. Subject Reduction fails since y:𝖼1𝒯0(λx.x)y:𝖼0, but y:𝖼1⊬𝒯0y:𝖼0.

A necessary but not sufficient condition for Subject Reduction is target soundness.

Definition 22 (Target soundness).

An itt 𝒯 is target sound if when an arrow type is equivalent to 𝖴 then its target is equivalent to 𝖴, videlicet if 𝖴𝒯BA then 𝖴𝒯A, or equivalently Rule (𝖴) in Figure 1 holds in 𝒯.

Proposition 23.

If the itt 𝒯 satisfies Subject Reduction, then 𝒯 is target sound.

Proof.

Assume by contradiction that 𝖴𝒯BA, but 𝖴𝒯A. Then we have that from the valid judgement x:B𝒯λz.y:𝖴 we can derive x:B𝒯λz.y:BA and hence also x:B𝒯(λz.y)x:A, but if Subject Reduction holds we would then have also that x:B𝒯y:A, which contradicts Lemma 19(1).

A sufficient but not necessary condition for Subject Reduction is β-soundness.

Definition 24 (β-soundness [13, Definition 14.1.4]).

An itt 𝒯 is β-sound if A𝒯𝖴 and iI(BiAi)𝒯BA imply that there is JI such that B𝒯jJBj and jJAj𝒯A.

For example the itt 𝒯1={𝖼0,𝖼1},𝒯1, where 𝒯1 has no other axioms and rules, is β-sound. Instead the itt 𝒯0 defined above is not β-sound. The itt 𝒯0 can be made β-sound by adding the axiom 𝖼1𝖼0. Two itt’s which are not β-sound but still satisfy Subject Reduction are defined in [19, 4].

In the following definitions we introduce some important classes of itt’s.

Definition 25 (Lazy condition).

An itt 𝒯=𝔸,𝒯 satisfies the lazy condition if

𝖴𝒯A𝖴 for all A𝕋𝔸.
Definition 26 (Set condition).

An itt 𝒯=𝔸,𝒯 satisfies the set condition if

iIAi𝒯B1BnC with C𝒯𝖴 implies Aj𝒯B1BnD

for some jI and some D𝒯𝖴 such that CD𝒯C.

The motivation behind the introduction of these two conditions, as well as their names, will become apparent in the examples. Lazy filter models are generated by theories satisfying the former condition. On the other hand, all graph models in the literature are isomorphic to filter models satisfying the latter condition. Graph models are set-theoretic, rather than order theoretic, since they arise essentially as powersets of a universal set, which is the least set containing a set of atoms and closed under the operation of forming new elements out of pairs of finite sets of elements and elements. There is no partial order on the elements of the universal set. In the corresponding itt’s atoms are constants and pairs are arrow types, set formation is intersection, and membership is reverse subtyping. The set condition reflects subtyping as reverse membership on arrow types, allowing for a small perturbation on the target of the arrow in order to account for possible intersections on the target arrow types, which Axiom () can split.

Figure 1: Some axioms and rules for itt’s.
Definition 27.

Consider axioms and rules in Figure 1.

  1. 1.

    An itt is lazy if it satisfies the lazy condition and at least Axiom () and Rule () hold.

  2. 2.

    An itt is 𝖴-sound if at least Axiom (𝖴) and Rule (𝖴) hold.

  3. 3.

    An itt is set-like if it satisfies the set condition and at least Axioms (𝖴), () and Rule () hold.

  4. 4.

    An itt is -sound if it satisfies at least Axioms (𝖴), (), and Rules (), (𝖴) hold.

Notice that a lazy or set-like itt 𝒯 satisfies the target condition of Definition 22. Let 𝒯 be lazy. By Rule (), we have that BA𝒯B𝖴 so if 𝖴𝒯B𝖴, also 𝖴𝒯BA is ruled out. Let 𝒯 be set-like. We have that if BA𝒯𝖴, for A𝒯𝖴, we have also B𝖴𝒯BA, which by the set condition implies 𝖴𝒯A against the hypothesis. Notice furthermore, that a set-like or -sound itt is 𝖴-sound.

Some comments on the rules in Figure 1 are in order. Rule () amounts to the covariant, contravariant behaviour of . Notice that it is not the case, that an itt satisfies either the lazy condition or Axiom (𝖴), see Example 35(10). Rule () makes a congruence, while Axiom () expresses that the glb nature of is preserved covariantly.

The set condition and -soundness imply interesting properties for the induced type assignment systems. Clearly the set condition implies β-soundness. Theorem 14.2.8 of [13] shows that -soundness is a sufficient and necessary condition for 𝒯 in order to have type preservation under η-reduction, i.e. that Γ𝒯λx.Mx:A implies Γ𝒯M:A, when x does not occur in M.

In the present paper a key role is played by the following lemma, characterising the types which we can derive in type systems induced by set-like or -sound itt’s for the subterms of a given λ-term. We use x:A as short for x1:A1,,xn:An.

Lemma 28.

Let 𝒯 be set-like or -sound. If Γ𝒯λx.MN1Nm:A with A𝒯U, then Γ,x:B𝒯M:C1CmD and Γ,x:B𝒯Ni:Ci (1im) for some B, C1, , Cm and D𝒯U.

Proof.

Lemma 19(3) applied to Γ𝒯λx1xn.MN1Nm:A with A𝒯U gives Γ,x1:B1j𝒯λx2xn.MN1Nm:A1j for some J1, B1j, A1j with jJ1 such that jJ1(B1jA1j)𝒯A. Axiom (𝖴) with jJ1(B1jA1j)𝒯A𝒯U implies A1j𝒯U for some jJ1. We set B1=B1j and A1=A1j. By iterating we get Γ,x1:B1,xn:Bn𝒯MN1Nm:An with An𝒯U. Let x:B=x1:B1,xn:Bn. Lemma 19(2) applied to Γ,x:B𝒯MN1Nm:An with An𝒯U gives

Γ,x:B𝒯MN1Nm1:CmDm and Γ,x:B𝒯Nm:Cm

for some Lm, Cm, Dm with Lm such that LmDm𝒯An. The remaining of the proof runs differently for set-like and -sound itt’s.

The itt 𝓣 is set-like.

From LmDm𝒯An and An𝖴 we get that at least for one Lm we have Dm𝖴 and hence CmDm𝖴 by the remark above that set-like itt’s satisfy the target condition. We put Cm=Cm and Dm=Dm. Lemma 19(2) applied to Γ,x:B𝒯MN1Nm1:CmDm with CmDm𝒯U gives

Γ,x:B𝒯MN1Nm2:Cm1Dm1 and Γ,x:B𝒯Nm1:Cm1

for some Lm1, Cm1, Dm1 with Lm1 such that Lm1Dm1𝒯CmDm. The set condition implies Dm1′′𝒯CmDm1 for some ′′Lm1 and Dm1𝖴 such that DmDm1𝒯Dm. Putting Cm1=Cm1′′ we can then derive using the typing Rule () and the subtyping Rule ():

Γ,x:B𝒯MN1Nm2:Cm1CmDm1 and Γ,x:B𝒯Nm1:Cm1.

We can iterate this argument applying the set condition progressively on longer and longer sequences of arrows, preserving the Cmi’s and modifying only the final target Dmi1, thus getting

Γ,x:B𝒯M:C1CmD1 and Γ,x:B𝒯Ni:Ci(1im).

We conclude putting D=D1.

The itt 𝓣 is -sound.

Let D=An, then LmDm𝒯D. Using the typing Rule (I) we derive

Γ,x:B𝒯MN1Nm1:Lm(CmDm) and Γ,x:B𝒯Nm:LmCm.

The subtyping Rule () and Axiom () imply Lm(CmDm)𝒯LmCmD. Putting Cm=LmCm we derive, using Rule (),

Γ,x:B𝒯MN1Nm1:CmD and Γ,x:B𝒯Nm:Cm.

Notice that D𝒯𝖴 implies CmD𝒯𝖴, since -sound itt’s are target sound by definition. Thence we can iterate the argument and conclude

Γ,x:B𝒯M:C1CmD and Γ,x:B𝒯Ni:Ci(1im).

 Remark 29.

In the particular case of m=1, in the proof of the above lemma one can use any of the such that D𝒯𝖴, thus avoiding the need for either the set condition or the subtyping Rule () and the subtyping Axiom (). In this way 𝒯 can be only 𝖴-sound instead of set-like or -sound.

In order to discuss λ-models over itt’s we recall the definition of λ-model. An environment in the set 𝒟 is a total mapping from term variables to elements of 𝒟. Let ρ range over environments. As usual, we denote by ρ[x:=𝖽] the environment which returns 𝖽 when applied to x and ρ(y) when applied to yx.

Definition 30 (λ-model [13, Definition 16.1.2]).

A λ-model is a triple 𝒟,,𝒟, where is a binary operation on 𝒟 (application), 𝒟 is a mapping from λ-terms and environments in 𝒟 to elements of 𝒟 (term interpretation), and 𝒟 satisfies:

  1. 1.

    xρ𝒟=ρ(x);

  2. 2.

    MNρ𝒟=Mρ𝒟Nρ𝒟;

  3. 3.

    λx.Mρ𝒟=λy.M[x:=y]ρ𝒟;

  4. 4.

    𝖽𝒟.Mρ[x:=𝖽]𝒟=Nρ[x:=𝖽]𝒟 implies λx.Mρ𝒟=λx.Nρ𝒟;

  5. 5.

    ρ(x)=ρ(x) for all variables x which occur free in M implies Mρ𝒟=Mρ𝒟;

  6. 6.

    λx.Mρ𝒟𝖽=Mρ[x:=𝖽]𝒟.

This definition of λ-model was first formulated by Hindley and Longo [34].

We can build λ-models whose domains are sets of filters of types according to the following definition.

Definition 31 (Filter [13, Definition 13.4.1]).

Let 𝒯=𝔸,𝒯 be an itt and F𝕋𝔸. The set F is a 𝒯-filter if:

  • 𝖴F;

  • A,BF imply ABF;

  • AF and A𝒯B imply BF.

We use F and G as metavariables for filters and 𝒯 to denote the set of 𝒯-filters. We will drop the reference to 𝒯 when clear from the context or irrelevant. If X𝕋𝔸 we denote by 𝒯X the smallest 𝒯-filter which contains X. If X={A} we use 𝒯A as short for 𝒯{A}.

Filters can be endowed with an applicative structure as follows:

Definition 32 (Filter Structure).

Let 𝔼𝒯 be the set of environments in 𝒯. The filter structure over 𝒯 is the triple 𝒯,,𝒯 where

  • application, :𝒯×𝒯𝒯, is defined by

    FG={ABG.BAF};
  • term interpretation, 𝒯:Λ×𝔼𝒯𝒯, is defined by

    Mρ𝒯={A𝕋Γρ.Γ𝒯M:A},

    where ρ ranges over 𝔼 and Γρ if and only if x:AΓ implies Aρ(x).

It is easy to verify that 𝒯 satisfies all conditions required to be a λ-model (Definition 30), but the last one, which is essential when 𝖽 is the interpretation of a λ-term. We always have (λx.M)Nρ𝒯M[x:=N]ρ𝒯, since Subject Expansion always holds by Theorem 20.

Theorem 33 ([13, Proposition 16.2.4]).

The filter structure over 𝒯 is a λ-model (dubbed filter model) iff

(λx.M)Nρ𝒯M[x:=N]ρ𝒯

for all λ-terms M,NΛ, all variables x and all environments ρ in 𝒯.

The condition (λx.M)Nρ𝒯M[x:=N]ρ𝒯 means that all types of (λx.M)N are also types of M[x:=N], i.e.  that the type system 𝒯 enjoys Subject Reduction. Then the following theorem follows naturally, being β-soundness a sufficient condition for Subject Reduction.

Theorem 34 ([13, Corollary 16.2.9(i)]).

If 𝒯 is a β-sound itt, then the filter structure over 𝒯 is a filter model.

All set-like itt’s generate filter models, since the set condition implies β-soundness.

As mentioned after Definition 24, in [19, 4] there are filter models over itt’s which are not β-sound.

It is interesting to notice that all continuous functions are representable in a filter model over a β-sound itt. This generalises Theorem 2.13(iii) in [19].

Blanket Assumption.

Since our focus is on filter models, in the following we will only consider itt’s 𝒯 which satisfy Subject Reduction, namely itt’s for which Γ𝒯λx.M:BA implies Γ,x:B𝒯M:A.

To the best of our knowledge all filter models in the literature are generated by itt’s which fall in one of the categories given in Definition 27 or can be characterised by the axioms and rules in Figure 1. In the following list of distinguished itt’s and corresponding filter models we illustrate this point.

Example 35.
  1. 1.

    Abramsky-Ong’s model [2] is isomorphic to a filter model generated by a lazy itt [13, Theorem 16.4.3];

  2. 2.

    Engeler’s model [29], Scott’s 𝒫(ω) model [51], and the λ-models defined in [44] are isomorphic to filter models generated by set-like itt’s [13, Theorems 16.4.16 and 16.4.21];

  3. 3.

    the itt 𝒯CD={𝖽nn},𝒯CD, which generates the original filter model [12], is the -sound itt without other axioms/rules;

  4. 4.

    the -sound itt 𝒯𝒫LO={ι},𝒯𝒫LO without other axioms/rules generates Plotkin’s model [47];

  5. 5.

    all inverse limit models [49] are isomorphic to filter models generated by -sound itt’s [13, Theorems 16.3.22];

  6. 6.

    the filter models generated by the -sound itt’s introduced in [19, 4] are not β-sound, since not all Scott-continuous functions are represented; e.g. the itt with only two constants c1 and c2 and only the extra axiom scheme AA[c1:=c2];

  7. 7.

    the minimal itt without constants, axioms and only Rule (𝖴) generates a filter model;

  8. 8.

    the minimal 𝖴-sound itt with only one constant, and no other axioms and rules is neither set-like nor -sound, but it generates a filter model;

  9. 9.

    the minimal set-like itt with only one constant, and no other axioms and rules generates a filter model;

  10. 10.

    the itt 𝒯=,𝒯 with only the axiom 𝖴𝖴𝖴, and only Rule (𝖴) does not satisfy the lazy condition nor Axiom (𝖴), but it generates a filter model. Notice that (𝖴𝖴)𝖴𝒯𝖴.

All the itt’s mentioned in the Example above generate filter models since they can be proved to be β-sound, apart from Example 35(6).

In the rest of the paper we will call lazy, 𝖴-sound, set-like, and -sound the filter models over these itt’s, respectively.

Summing up we have the following separation theorem.

Theorem 36.

There are filter models which are:

  • neither lazy nor 𝖴-sound;

  • 𝖴-sound but neither set-like nor -sound;

  • set-like but not -sound;

  • -sound but not set-like.

Proof.

Consider the filter models generated by the itt’s in Example 35(10), Example 35(8), Example 35(9), Example 35(3), respectively.

We conclude this section giving a crucial definition in this paper:

Definition 37 (Sensible Itt, Sensible Filter Model).

An itt 𝒯 is sensible if all unsolvable terms are typed only by types equivalent to 𝖴. A filter model 𝒯 is sensible if 𝒯 is sensible, i.e. all unsolvable terms are interpreted in the bottom filter, 𝒯𝖴. Otherwise the itt and the filter model are said to be non-sensible.

4 Critical Sequences for Intersection Type Theories

Critical sequences are defined in [41] for graph models and a special kind of stable models. We tailor this notion to itt’s.

Definition 38.

A critical sequence for an itt 𝒯=𝔸,𝒯 is a sequence An with n of types in 𝕋𝔸 if for all n:

  1. 1.

    An𝒯𝖴, An𝒯B1nBmnnCn and An+1𝒯Binn for some in (1inmn);

  2. 2.

    there are a head closed term Pn+1 and a basis Γn+1 such that

    Γn+1Pn+1:Binn;
  3. 3.

    if jn+1 is the head order of Pn+1, then jn+1mn+1 and there are a head closed term Qn+1 and a basis Γn+1 such that

    Γn+1Qn+1:Bjn+1n+1.

We say that a filter model, generated by an itt 𝒯, has a critical sequence if 𝒯 has a critical sequence.

for Γ={x:𝖼,y:𝖽𝖽}.

Figure 2: A derivation of 𝒯2𝐀𝐀𝐈:𝖽, see Example 40.

As in [41] we can relate critical sequences to decorations.

Definition 39.

A decoration λxn.N0nN1nNmnn,N0n is a witness of the critical sequence An if for all n:

  1. 1.

    N0n+1hPn+1;

  2. 2.

    Njn+1n+1hQn+1, where jn+1 is the head order of Pn+1.

Example 40.

Let 𝒯2 be the -sound itt obtained by taking 𝔸={𝖼,𝖽} and assuming 𝖼𝖼(𝖽𝖽)𝖽. A critical sequence witnessed by 𝐀𝐀𝐈,𝐀 is An=𝖼, in=1, Pn+1=𝐀, jn+1=2 and Qn+1=𝐈 for all n. Notice that B1n=𝖼, B2n+1=𝖽𝖽 for all n and Figure 2 contains the derivations of 𝒯2𝐀:𝖼 and 𝒯2𝐈:𝖽𝖽.

In the following we first discuss critical sequences for lazy itt’s and then for set-like and -sound itt’s together, see Definition 27, the latter two being the classes which satisfy Lemma 28. An example of a filter model which does not belong to any of the three classes, but has nonetheless a critical sequence by Theorem 45, is given in Proposition 46.

4.1 Lazy Itt’s

In a type system induced by a lazy itt 𝒯 any λ-term of positive order m, namely a λ-term which reduces to m λ-abstractions [13, Definition 16.4.1], can be typed with the type 𝖴m𝖴, where for any type A and m, 𝖴mA is an abbreviation for 𝖴𝖴mA. We can show that

𝖴mA𝒯𝖴for all m1. (1)

Indeed, from Axiom (𝖴top), Rule () and 𝖴mA=𝖴(𝖴m1A) we derive that 𝖴mA𝒯𝖴𝖴. Assuming by contradiction 𝖴mA𝒯𝖴 from 𝖴mA𝒯𝖴𝖴 we get 𝖴𝒯𝖴𝖴, which falsifies the lazy condition. So we conclude that 𝖴mA𝒯𝖴.
Hence, no matter whether the λ-term M is solvable or unsolvable, if M has positive order m, then in the filter model 𝒯, generated by a lazy itt 𝒯, we have that Mρ𝒯𝒯𝖴m𝖴 for all ρ, which is a filter strictly larger than the filter 𝒯𝖴. An interesting example is 𝚯𝐊, where 𝚯=𝐀𝐀 is Turing fixed-point combinator [11, Definition 6.1.4] and 𝐊, 𝐀 are defined in Definition 2. We can derive 𝒯𝚯𝐊:𝖴m𝖴𝒯𝖴 for all m1.

In lazy filter models there are plenty of critical sequences whose types are

Ani=𝖴i1(𝖴i𝖴)𝖴

for a fixed i1. From Equation 1 we get 𝖴i1(𝖴i𝖴)𝖴𝒯𝖴, moreover Axiom (𝖴top) and Rule () imply 𝖴i1(𝖴i𝖴)𝖴𝒯𝖴i𝖴, so the first condition of Definition 38 is satisfied. These critical sequences are witnessed by decorations Mn,Non in which all Non have head order i and all Nin have positive order i for all n, see Theorem 41 below. We call i-lazy such critical sequences and such decorations.
Examples of 1-lazy decorations are λx.𝛀m𝛀m,𝛀m where 𝛀m=λy.yym with m2. A 1-lazy critical sequence witnessed by this decoration is An1=(𝖴𝖴)𝖴, in=jn+1=1 and Pn+1=Qn+1=𝛀m for all n.
An interesting example of a 2-lazy decoration arising from the head reduction of Θ𝐊hλx.𝐀𝐀𝐊 is λxx1xn.𝐀𝐀𝐊,𝐀 for all n. A 2-lazy critical sequence witnessed by this decoration is An2=𝖴(𝖴𝖴)𝖴, in=jn+1=2, Pn+1=𝐀, and Qn+1=𝐊 for all n.

The following theorem shows that lazy filter models have i-lazy critical sequences witnessed by i-lazy decorations.

Theorem 41.

Any i-lazy decoration in a lazy filter model witnesses an i-lazy critical sequence.

Proof.

Let λxn.N0nN1nNmnn,N0n be an i-lazy decoration for n. By Lemma 16 N0n+1 and Nin+1 are solvable and they can be both typed by 𝖴i𝖴, since they are of positive order i. Then this decoration witnesses the i-lazy critical sequence Ani=𝖴i1(𝖴i𝖴)𝖴 by taking in=jn=i and Pn+1 and Qn+1 as the head normal forms of N0n+1 and Nin+1, respectively.

Two remarks are in order.

  1. 1.

    Not all decorations can witness i-lazy critical sequences for some i. Examples are the last two decorations in Example 12(2). We conjecture however, that Theorem 41 can be generalised. Namely, given a decoration in a lazy filter model, one can find a critical sequence which it witnesses, and whose types involve only the type symbol 𝖴.

  2. 2.

    As we pointed out already, the lazy condition is not the negation of Axiom (𝖴). One can introduce weaker conditions than the lazy condition for a type theory 𝒯, which nonetheless allow for decorations to be witnesses of some critical sequence for 𝒯. However all the ones we have considered appear to be rather contrived or ad hoc.

4.2 Set-like and -sound Itt’s

Kerth in [41] shows that if an unsolvable term does not have an empty interpretation in a graph or (a special kind of) stable model, then there is a critical sequence in that model, witnessing the decoration of the head reduction of the unsolvable term.

One of the main results of this paper is the extension of Kerth’s result both to set-like filter models and to -sound filter models. The former class includes graph models while the latter includes inverse limit models. Our proof relies on Lemma 28, which permits to prove uniformly a property for two radically different classes of itt’s.

The first part of our proof, which is inspired by Kerth’s proof, considers a decoration Mn,N0n for n. The reduction from Mn to Mn+1 is modified by replacing in every λ-term the ancestors of N0n+1 in Mn+1 by a fresh variable. In the second part of our proof we use Lemma 28 to find meaningful types for Ninn and N0n+1, where N0n+1 is a descendant of Ninn. We conclude by showing the relation between the types of Ninn and N0n+1 by means of the modified reduction from Mn to Mn+1.

Theorem 42.

If a set-like or an -sound filter model gives to an unsolvable term a meaning different from 𝒯𝖴, then any decoration of that unsolvable witnesses a critical sequence.

Proof.

Let M be an unsolvable term with a meaning different from 𝒯𝖴 in a set-like or an -sound filter model over the itt 𝒯. By definition of term interpretation (Definition 32) we get Γ𝒯M:A for some basis Γ and for some type A such that A𝒯𝖴. By Theorem 13 MβM0 such that the head reduction of M0 has a decoration, let it be Mn,N0n for n. By Subject Reduction (Theorem 21) Γ𝒯Mn:A for n.

Let Mn=λxn.N0nNmnn and Mn+1=λxn+1.NinnN1n+1Nmn+1n+1. Consider the reduction

N0nNmnn=M1hM2hhMk=λt.NinnN1n+1Nmn+1n+1,

where xn+1=xnt and let Rs be obtained from Ms by replacing the unique ancestor in Ms of the occurrence of Ninn in head position in Mk with a fresh variable y for 1sk. Then Rs is such that Ms=Rs[y:=Ninn] and there is a single occurrence of y in Rs. For all s<k, y cannot be in head position in Rs, since in this case the corresponding occurrences of Ninn in Ms would be reduced and then it could not have a descendant in Mk. So the head redex of Ms is equal to the head redex of Rs. Let Rs be such that RshRs. Let Rs′′ be obtained by replacing with a fresh z the occurrences of y which are children of the occurrence of y in Rs, but are not ancestors of the occurrence of Ninn in head position in Mk. Then Rs+1=Rs′′[z:=Ninn]. We need to proceed in this way because we cannot simply head reduce N0nNin1nyNin+1nNmnn, since in this reduction the variable y could go in head position before k1 steps, as shown in Example 12(3) and so we would not produce a critical sequence witnessed precisely by the decoration we started from.
Since Γ𝒯Mn:A with A𝒯𝖴 and 𝒯 satisfies Lemma 28 we have, for some An, B1n, , Bmnn, Cn𝒯𝖴:

Γ,x:An𝒯N0n:B1nBmnnCn and Γ,x:An𝒯Njn:Bjn(1jmn).

Then by repeated applications of the typing Rule (E) we get

Γ,x:An𝒯M1:Cn,

and since R1=N0nN1nNin1nyNin+1nNmnn we get also

Γ,x:An,y:Binn𝒯R1:Cn.

By Subject Reduction (Theorem 21), since R1hR1:

Γ,x:An,y:Binn𝒯R1:Cn implies Γ,x:An,y:Binn𝒯R1:Cn.

In turn being R1′′ obtained from R1 by replacing all but one occurrences of y by z:

Γ,x:An,y:Binn𝒯R1:Cn implies Γ,x:An,y:Binn,z:Binn𝒯R1′′:Cn.

Finally from

Γ,x:An,y:Binn,z:Binn𝒯R1′′:Cn and Γ,x:An𝒯Ninn:Binn

we get

Γ,x:An,y:Binn𝒯R2:Cn,

since R2=R1′′[z:=Ninn]. Iterating these steps k1 times, we conclude

Γ,x:An,y:Binn𝒯Rk:Cn.

Notice that Rk=λt.yN1n+1Nmn+1n+1. Applying again Lemma 28, we have for some D, B1n+1, , Bmn+1n+1, Cn+1𝒯𝖴:

Γ,x:An,y:Binn,t:D𝒯y:B1n+1Bmn+1n+1Cn+1

and

Γ,x:An,t:D𝒯Njn+1:Bjn+1(1jmn+1).

We show that the sequence An=B1nBmnnCn for n thus obtained, does indeed produce a critical sequence.
By the target condition if Cn𝖴, then also An𝖴 for all n. Lemma 19(1) applied to Γ,x:An,y:Binn,t:D𝒯y:B1n+1Bmn+1n+1Cn+1 implies An+1𝒯Binn, since An+1=B1n+1Bmn+1n+1Cn+1. So the first condition of Definition 38 is satisfied. By Lemma 16 Ninn has a head closed normal form. We can choose for Pn+1 the head normal form of Ninn, since in 𝒯 it has the type Binn by Subject Reduction. If jn+1 is the head order of Pn+1, then Njn+1n+1 has a head closed normal form by Lemma 16. We can choose for Qn+1 the head normal form of Njn+1n+1, since in 𝒯 it has the type Bjn+1n+1 by Subject Reduction. Therefore also the last two conditions of Definition 38 are satisfied.

Example 43.

Let 𝐈, 𝐀 be defined as in Definition 2 and 𝒯2 be defined as in Example 40. It is easy to verify that 𝒯2 is β-sound by induction on 𝒯2. We can derive 𝒯2𝐀𝐀𝐈:𝖽, see Figure 2. Then the interpretation of 𝐀𝐀𝐈 in the filter model generated by 𝒯2 contains 𝒯2𝖽, and the decoration of 𝐀𝐀𝐈, see Example 12(1), witnesses the critical sequence for 𝒯2 given in Example 40.

 Remark 44.

As pointed out in Remark 29, Lemma 28 holds for merely 𝖴-sound itt’s, when the unsolvable terms are of the shape Mn=λxn.N0nN1n (n). We can then formulate Theorem 42 for 𝖴-sound itt’s and unsolvable terms of this shape.

5 Critical Sequences in Action

In this section we further discuss the critical notion of critical sequence and give examples both in sensible and non-sensible filter models.

In Subsection 4.1, we remarked that lazy filter models are naturally non-sensible and given several examples of critical sequences and decorations witnessing them. For set-like and -sound filter models Theorem 42 gives a necessary condition for them to be non-sensible, namely the existence of a critical sequence witnessing a decoration.

The existence of a critical sequence, however, is not a sufficient condition for a filter model to be non-sensible. In fact, all itt’s satisfying the following subtyping axiom

ACABC(L)

have a critical sequence, albeit almost a trivial one.

Theorem 45.

Let 𝒯=𝔸,𝒯. If 𝔸 contains at least a constant and Axiom (L) holds for 𝒯, then 𝒯 has a critical sequence.

Proof.

Let 𝖼𝔸. We define An=(𝖼𝖼)((𝖼𝖼)𝖼𝖼)𝖼𝖼, in=jn+1=1 and Pn+1=Qn+1=𝐈 for all n. One can easily check that using Axiom (L):

(𝖼𝖼)𝖼𝖼𝒯(𝖼𝖼)((𝖼𝖼)𝖼𝖼)𝖼𝖼

and hence

(𝖼𝖼)((𝖼𝖼)𝖼𝖼)𝒯(𝖼𝖼)((𝖼𝖼)𝖼𝖼)𝖼𝖼.

Notice that Rule () of Figure 1 implies Axiom (L), hence all -sound filter models have critical sequences. In particular the original filter model [12] and all inverse limit models [13, Theorems 16.3.22] have critical sequences. Hence, in view of Theorem 45, the existence of a critical sequence in a -sound filter model is not very informative per se. The significance of Theorem 42, for non-sensible -sound filter models, resides in that the decoration arising from the reduction of an unsolvable term, by Theorem 13, witnesses a critical sequence.

Clearly Axiom (L) falsifies the set condition, so this axiom does not hold for set-like itt’s. Incidentally, we give the following proposition, which illustrates the flexibility of itt’s in designing special purpose filter models.

Proposition 46.

The minimal (L) itt, 𝒯(L), consisting of only one constant, the extra Axiom (L), and Rule (𝖴) generates a filter model which is neither lazy nor 𝖴-sound.

Proof.

By induction on the subtyping relation of 𝒯(L) one can show that it is β-sound and then apply Theorem 34.

For the sake of completeness we also give an example of a sensible set-like filter model which exhibits a critical sequence.

Example 47.

The set-like itt 𝒯3 with constants 𝔸3={𝖼}{𝖼nn} and axioms 𝖼n𝖼n+1𝖼 for n generates a sensible filter model which has a critical sequence; namely An=𝖼n, in=jn+1=1, Γn+1={y:𝖼n+3}, Γn+1={y:𝖼n+4}, Pn+1=Qn+1=λx.xy for all n. Indeed Γn+1𝒯3Pn+1:𝖼n+1 and Γn+1𝒯3Qn+1:𝖼n+2. The sensibility of the filter model generated by 𝒯3 follows from a result proved in [24].

In the following we give examples of critical sequences for most non-sensible filter models appearing in the literature, which are all witnessed by distinguished unsolvable terms. All itt’s considered in this example are assumed to be -sound. The models in 48(3b) are isomorphic to set-like filter models. We use combinators defined in Definition 2.

Example 48.
  1. 1.

    Park inverse limit model [46] is isomorphic to the filter model generated by the itt 𝒫={𝖼},𝒫, where 𝒫 is obtained by adding the axiom 𝖼𝖼𝖼 [13, Figure 13.4]. In the filter model isomorphic to Park model all closed λ-terms are interpreted by filters containing 𝒫𝖼, as proved in [39]. A critical sequence is An=𝖼, in=jn+1=1, Pn+1=Qn+1=𝛀3 for all n. This critical sequence is witnessed by the decoration, say, 𝛀3𝛀3𝛀3n+2,𝛀3 for all n.

  2. 2.

    Honsell and Ronchi define in [39] the itt ={𝖼,𝖽},, where is obtained by adding the axioms 𝖼(𝖼𝖼)(𝖽𝖽), 𝖽𝖼𝖽, 𝖽𝖼 [13, Figure 13.4]. They show that the interpretation of 𝐘𝐁, where 𝐘=λf.(λx.f(xx))(λx.f(xx)), in the filter model generated by , contains 𝖼. A critical sequence in is An=𝖼𝖼, in=jn+1=1, Pn+1=λxyz.xx(yz), Qn+1=𝐁 for all n. Let 𝐇=λx.𝐁(xx) and Mn=λxy0yn.𝐇𝐇(xy0yn) for all nN. Note that 𝐘𝐁hM0 and 𝐇hPn+1. A decoration for M0 witnessing this critical sequence is Mn,𝐇 for all n.

  3. 3.

    Easy terms, namely λ-terms which can be equated to an arbitrary closed λ-term obtaining a consistent λ-theory [40, 10], are a very intriguing class of, necessarily unsolvable, terms. We present below, various filter models, in which some easy terms are not interpreted by 𝒯𝖴. These models are the intermediary steps for the semantical proofs of easiness of the corresponding terms, in that they permit to force in the interpretation of the easy term, the filter generated by a generic isolated constant, see [6].

    1. (a)

      Alessi, Dezani and Honsell define in [6] two itt’s. The first itt is 𝒜𝒟1={𝖼,𝖽},𝒜𝒟1, where 𝒜𝒟1 is obtained by adding the axiom 𝖼𝖼𝖽. In the filter model generated by 𝒜𝒟1 the interpretation of 𝛀2𝛀2 contains 𝒜𝒟1𝖽. A critical sequence for 𝒜𝒟1 is An=𝖼, in=jn+1=1, Pn+1=Qn+1=𝛀2 for all nN. A decoration for 𝛀2𝛀2 witnessing this critical sequence is 𝛀2𝛀2,𝛀2.

    2. (b)

      In [10], Baeten and Boerboom show how to define graph models in which the interpretation of 𝛀𝟐𝛀𝟐 coincides with the interpretation of a given closed λ-term. In each such model 𝛀𝟐𝛀𝟐 gives rise to many critical sequences which are all structurally similar to the one defined above for the theory 𝒜𝒟1.

    3. (c)

      The second itt in [6] is 𝒜𝒟2={𝖼,𝖽,𝖾,𝖿,𝗀},𝒜𝒟2, where 𝒜𝒟2 is obtained by adding the axioms 𝖼𝖽(𝖽(𝖿𝖿)𝗀), 𝖽𝖾𝖼, 𝖾𝖾𝖽, 𝖼𝖽𝖾. In the filter model generated by 𝒜𝒟2 the interpretation of 𝛀3𝛀3𝐈 contains 𝒜𝒟2𝗀. A critical sequence for 𝒜𝒟2 is An=𝖾, in=jn+1=1, Pn+1=Qn+1=𝛀3 for all n. A decoration for 𝛀3𝛀3𝐈 witnessing this critical sequence is 𝛀3𝛀3𝛀3n+2𝐈,𝛀3 for all n.

    4. (d)

      The easiness of 𝐄𝐄, where 𝐄=λx.x(λy.yx), is shown by Zylberajch in [54, p.58]. This λ-term is interpreted by a filter which contains 𝒜𝒟1𝖽 in the filter model generated by the itt 𝒜𝒟1. Let

      Nn={𝐄if n0(mod 3)λy.y𝐄if n1(mod 3)λz.z(λy.y𝐄)if n2(mod 3)

      and Mn=NnNn+1, we have that 𝐄𝐄βM0. A decoration for M0 is Mn,Nn for all nN. A critical sequence witnessed by this decoration is An=𝖼, in=jn+1=1, Pn+1=Nn+1, Qn+1=Nn+2 for all nN. Notice that, also if the itt is the same, the critical sequence witnessed by the decoration of 𝐄𝐄 is different from the critical sequence witnessed by the decoration of 𝛀2𝛀2.

    5. (e)

      Berarducci and Intrigila prove that 𝛀3𝛀3𝐊 is easy [16]. Let ={𝖼,𝖽,𝖾,𝖿,𝗀},, where is obtained by adding the axioms 𝖼𝖽(𝖽(𝖿𝖴𝖿)𝗀), 𝖽𝖾𝖼, 𝖾𝖾𝖽, 𝖼𝖽𝖾. The subtyping can be proved to be β-sound by induction on its definition. In the filter model generated by the interpretation of 𝛀3𝛀3𝐊 contains 𝗀. A decoration for 𝛀3𝛀3𝐊 is 𝛀3𝛀3𝛀3n+2𝐊,𝛀3 for all nN. A critical sequence witnessed by this decoration is An=𝖾, in=jn+1=1, Pn+1=Qn+1=𝛀3 for all n.

The following definition gives us a criterion for establishing the absence of critical sequences.

Definition 49.

The depth of a type in 𝕋𝔸 for the itt 𝒯=𝔸,𝒯 (notation d𝒯(A)) is defined by

d𝒯(𝖼)=0𝖼𝔸d𝒯(𝖴)=0d𝒯(AB)=max{d𝒯(A),d𝒯(B)}d𝒯(AB)={max{d𝒯(A)+1,d𝒯(B)}if AB𝒯𝖴0otherwise.
Theorem 50.

If A𝒯B implies d𝒯(B)d𝒯(A), then 𝒯 and the filter model over 𝒯, if any, do not have critical sequences.

Proof.

In a critical sequence we have d𝒯(Binn)<d𝒯(An) by definition of depth and d𝒯(An+1)d𝒯(Binn), by the assumption on d𝒯() since An+1𝒯Binn, these imply d(An+1)<d(An) for all n. By infinite descent this is impossible, since depths are not negative.

Corollary 51.

If 𝒯 is set-like or -sound and A𝒯B implies d𝒯(B)d𝒯(A), then 𝒯 and the filter model generated by 𝒯, if any, are sensible.

Proof.

Immediate from Theorem 50 and Theorem 42.

From the above theorem we immediately get that the set-like filter model generated by the itt ={𝖼nn},, without further axioms/rules, does not have a critical sequence. By Corollary 51 this filter model, which is isomorphic to Engeler’s graph model [29], is sensible as is the set-like filter model generated by the itt in Example 35(9). We point out that the absence of critical sequences in Engeler’s graph model is shown in [41] by a slightly longer proof. It is interesting to notice that the above arguments provide conceptually different proofs, that the models are sensible, from the traditional ones based on indexed reductions [43].

By Theorem 50 the filter models over the itt’s in Example 35(7), (8), and (10) do not have critical sequences, but we cannot apply Corollary 51 to show that they are sensible. The itt’s in Example 35(7) and (10) in fact are non-sensible, since we can derive the type (𝖴𝖴)𝖴𝖴 for all unsolvable terms of positive order. Instead the itt in Example 35(8) can be shown to be sensible using a criterion proved in [24].

6 Related Work and Conclusion

Intersection types originated in Torino in the late 70’s and early 80’s from the work of the first author of the present paper together with Mario Coppo, see e.g. [20, 12] and  [13, Part III]. Intersection types allowed for a novel approach to the semantics of functional languages. The traditional way of interpreting a statement of the shape Mϕ, i.e. “the program M satisfies the property ϕ in a semantic domain 𝒟”, was that of viewing M as a point in 𝒟, and ϕ as a suitable subset Φ of 𝒟. The statement Mϕ was then interpreted as the membership judgement M𝒟Φ, where the interpretation function 𝒟 maps programs to elements of 𝒟.

Intersection types “reversed” this traditional point of view in the spirit of a Stone Duality, see [19, 1]. Namely, axioms and rules involving intersection types are used in this approach to define a basis for the topology of a pointless space, and points are no more the building blocks of the semantic domains, but are recovered as filters of types. According to this intuition Mϕ is translated in the “opposite” membership judgement, i.e. AM, “the type A (corresponding to the property ϕ and interpreted as Φ) is a member of the filter (of properties) which gives the whole interpretation of M”.

This approach allows to reap many pleasing results, because it opens up the study of program semantics to the syntactic methods from proof theory. The interpretation of a program being fully determined only when all the properties it satisfies are known, its interpretation can be approximated statically in a finitary way through a type assignment system. Many syntactic technical results can then be established, such as the Inversion Lemma and Subject Reduction, and many computational properties of λ-terms can be naturally characterised statically. The original filter model [12] was introduced for showing the completeness of Scott’s semantics [50] for simple types à la Curry [22, p.317]. But, already in that model some computational properties of λ-terms were naturally characterised statically. Since then, many filter models have been proposed for characterising many more computational properties of λ-terms [21, 35, 25, 26, 5, 53]. Recently intersection types have been used for giving exact bounds to the number of β-reductions needed to reach the normal forms and to the number of symbols in the normal forms [30, 42, 14, 17, 18, 3, 9]. The key move to increase the expressivity of intersection types is to consider non-idempotent intersections in relevant type assignment systems, by means of which the number of occurrences of variables during the reduction process can be quantitatively measured.

Filter models encompass many kinds of λ-models. Inverse limit models [13, Section 16.3], graph models [13, pp.722-27] and lazy models [13, Theorem 16.4.3] are all filter models. Filter models, where easy terms are interpreted either as arbitrary λ-terms or as arbitrary continuous predicates, are constructed in a series of papers [6, 8, 27, 7].

In the vast literature on intersection types, unsolvable terms have been considered only marginally. Throughout this paper we have referred to most of such papers, however general results are missing. The present paper tries to contribute in filling this gap and possibly to stimulate further research. The present paper was triggered by [41], from which the crucial definitions of decoration and critical sequence are taken. Crucial to this paper is also the proof of Kerth’s conjecture by David [23]. In [41] critical sequences are defined for graph models and for a kind of stable models. We define critical sequence for itt’s which generate filter models. This general notion of critical sequence achieves full significance once it has a decoration witnessing it. Since there are filter models isomorphic to models of the lazy λ-calculus, graph models and inverse limit models we discuss critical sequences for all these models both in the sensible case and in the non-sensible case. In the introduction to [41], Kerth conjectures that the results of his paper should apply to inverse limit models too. The present paper provides a clear and articulate answer to that conjecture. However we leave open a complete answer for filter models which are neither lazy, set-like nor -sound.

The existence of a critical sequence in an itt does not imply, however, that the generated filter model is non-sensible. In the companion paper [24] we introduce sufficient conditions on itt’s which imply that they generate sensible filter models.

There are many notions and results in the present paper which could be considered in relation to stable models  [38, 36, 41, 45], models of call-by-value λ-calculus [36, 48, 52], quantitative domains [31], and game models [36, 28, 32].

We conclude this paper addressing again the crucial question of characterising non-sensible itt’s in a conceptually independent way from the existence of an unsolvable which can be typed in the itt. What is missing, in the language of the present paper, is a strengthened notion of critical sequence which implies that it is witnessed by a decoration. This is probably rather difficult as the final remark of the present paper below shows, indicating that part of the mystery of unsolvables is still there for future generations to address.

 Remark 52.

One could wonder if asking that the Pn+1’s and Qn+1’s, in the definition of critical sequence, contain the self application of a bound variable would ensure the existence of a witnessing decoration. A counterexample is the -sound itt with the axiom 𝖼n𝖼n+1𝖴𝖼0 for n. In fact a critical sequence is An=𝖼n, in=jn+1=1, Γn+1={z:𝖼n+3}, Γn+1={z:𝖼n+4}, Pn+1=Qn+1=λxy.xz(xx) for all n. This itt can be shown to be β-sound by induction on subtyping. A result in [24] allows us to prove that the filter model generated by this itt is sensible.

References

  • [1] Samson Abramsky. Domain theory in logical form. Annals of Pure and Applied Logic, 51(1-2):1–77, 1991. doi:10.1016/0168-0072(91)90065-T.
  • [2] Samson Abramsky and C.-H. Luke Ong. Full abstraction in the lazy lambda calculus. Information and Computation, 105(2):159–267, 1993. doi:10.1006/INCO.1993.1044.
  • [3] Beniamino Accattoli, Stéphane Graham-Lengrand, and Delia Kesner. Tight typings and split bounds. PACMPL, 2(ICFP):94:1–94:30, 2018. doi:10.1145/3236789.
  • [4] Fabio Alessi, Franco Barbanera, and Mariangiola Dezani-Ciancaglini. Tailoring filter models. In Stefano Berardi, Mario Coppo, and Ferruccio Damiani, editors, TYPES, volume 3085 of LNCS, pages 17–33. Springer, 2003. doi:10.1007/978-3-540-24849-1_2.
  • [5] Fabio Alessi, Franco Barbanera, and Mariangiola Dezani-Ciancaglini. Intersection types and lambda models. Theoretical Computer Science, 355(2):108–126, 2006. doi:10.1016/j.tcs.2006.01.004.
  • [6] Fabio Alessi, Mariangiola Dezani-Ciancaglini, and Furio Honsell. Filter models and easy terms. In Antonio Restivo, Simona Ronchi Della Rocca, and Luca Roversi, editors, ICTCS, volume 2202 of LNCS, pages 17–37. Springer, 2001. doi:10.1007/3-540-45446-2_2.
  • [7] Fabio Alessi, Mariangiola Dezani-Ciancaglini, and Stefania Lusin. Intersection types and domain operators. Theoretical Computer Science, 316(1):25–47, 2004. doi:10.1016/J.TCS.2004.01.022.
  • [8] Fabio Alessi and Stefania Lusin. Simple easy terms. In Steffen van Bakel, editor, ITRS, volume 70 of ENTCS, pages 1–18. Elsevier, 2002. doi:10.1016/S1571-0661(04)80487-0.
  • [9] Sandra Alves, Delia Kesner, and Miguel Ramos. Extending the quantitative pattern-matching paradigm. In Oleg Kiselyov, editor, APLAS, volume 15194 of LNCS, pages 84–105. Springer, 2024. doi:10.1007/978-981-97-8943-6_5.
  • [10] Jos C. M. Baeten and Bas Boerboom. Omega can be anything it should not be. In Indagationes Mathematicae, volume 82(2), pages 111–120, 1979. doi:10.1016/1385-7258(79)90016-7.
  • [11] Henk Barendregt. The Lambda Calculus - its Syntax and Semantics, volume 103 of Studies in logic and the foundations of mathematics. North-Holland, Amsterdam, 1985.
  • [12] Henk Barendregt, Mario Coppo, and Mariangiola Dezani-Ciancaglini. A filter lambda model and the completeness of type assignment. Journal of Symbolic Logic, 48(4):931–940, 1983. doi:10.2307/2273659.
  • [13] Henk Barendregt, Wil Dekkers, and Richard Statman. Lambda Calculus with Types. Cambridge University Press, 2013. doi:10.1017/CBO9781139032636.
  • [14] Erika De Benedetti and Simona Ronchi Della Rocca. Bounding normalization time through intersection types. In ITRS, volume 121 of EPTCS, pages 48–57. Open Publishing Association, 2012. doi:10.4204/EPTCS.121.4.
  • [15] Alessandro Berarducci. Infinite λ-calculus and non-sensible models. In Aldo Ursini, editor, Logic and Algebra, pages 17:1–17:39. Routledge, 1996. doi:10.1201/9780203748671-17.
  • [16] Alessandro Berarducci and Benedetto Intrigila. Church-Rosser lambda-theories, infinite lambda-terms and consistency problems. In Wilfrid Hodges, Martin Hyland, Charles Steinhorn, and John Truss, editors, Logic: from Foundations to Applications, chapter 2, pages 33–58. Clarendon Press, 1996. URL: https://arpi.unipi.it/handle/11568/46466.
  • [17] Alexis Bernadet and Stéphane Graham-Lengrand. Non-idempotent intersection types and strong normalisation. Logical Methods in Computer Science, 9(4):1–46, 2013. doi:10.2168/LMCS-9(4:3)2013.
  • [18] Antonio Bucciarelli, Delia Kesner, and Daniel Ventura. Non-idempotent intersection types for the lambda-calculus. Logic Journal of the IGPL, 25:433–464, 2017. doi:10.1093/jigpal/jzx018.
  • [19] Mario Coppo, Mariangiola Dezani-Ciancaglini, Furio Honsell, and Giuseppe Longo. Extended type structures and filter lambda models. In G. Lolli, G. Longo, and A. Marcja, editors, Logic Colloquium ’82, volume 112 of Studies in Logic and the Foundations of Mathematics, pages 241–262. Elsevier, 1984. doi:10.1016/S0049-237X(08)71819-6.
  • [20] Mario Coppo, Mariangiola Dezani-Ciancaglini, and Betti Venneri. Principal type schemes and lambda-calculus semantics. In Roger Hindley and Jonathan P. Seldin, editors, To H.B.Curry: Essays on Combinatory Logic, Lambda-calculus and Formalism, pages 535–560. Academic Press, 1980. URL: http://www.di.unito.it/˜dezani/papers/CDV80.pdf.
  • [21] Mario Coppo, Mariangiola Dezani-Ciancaglini, and Maddalena Zacchi. Type theories, normal forms and D-lambda-models. Information and Computation, 72(2):85–116, 1987. doi:10.1016/0890-5401(87)90042-3.
  • [22] Haskell B. Curry and Robert Feys. Combinatory Logic. North-Holland, Amsterdam, 1958.
  • [23] René David. Every unsolvable lambda term has a decoration. In Jean-Yves Girard, editor, TLCA, volume 1581 of LNCS, pages 98–113. Springer, 1999. doi:10.1007/3-540-48959-2_9.
  • [24] Mariangiola Dezani-Ciancaglini, Besik Dundua, Paola Giannini, and Furio Honsell. Sensible intersection type theories. 2025. URL: https://people.unipmn.it/giannini/dgh25.pdf.
  • [25] Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, and Silvia Likavec. Behavioural inverse limit lambda-models. Theoretical Computer Science, 316(1):49–74, 2004. doi:10.1016/J.TCS.2004.01.023.
  • [26] Mariangiola Dezani-Ciancaglini, Furio Honsell, and Yoko Motohama. Compositional characterisations of lambda-terms using intersection types. Theoretical Computer Science, 340(3):459–495, 2005. doi:10.1016/J.TCS.2005.03.011.
  • [27] Mariangiola Dezani-Ciancaglini and Stefania Lusin. Intersection types and lambda theories. CoRR, cs.LO/0211011, 2002. URL: http://arxiv.org/abs/cs/0211011.
  • [28] Pietro Di Gianantonio, Furio Honsell, and Marina Lenisa. A type assignment system for game semantics. Theoretical Computer Science, 398(1):150–169, 2008. doi:10.1016/j.tcs.2008.01.023.
  • [29] Erwin Engeler. Algebras and combinators. Algebra Universalis, 13:389–392, 1981. doi:10.1007/BF02483849.
  • [30] Philippa Gardner. Discovering needed reductions using type theory. In Masami Hagiya and John C. Mitchell, editors, TACS, volume 789 of LNCS, pages 555–574. Springer, 1994. doi:10.1007/3-540-57887-0_115.
  • [31] Pietro Di Gianantonio and Furio Honsell. An abstract notion of application. In Marc Bezem and Jan Friso Groote, editors, TLCA, volume 664 of LNCS, pages 124–138. Springer, 1993. doi:10.1007/BFB0037102.
  • [32] Pietro Di Gianantonio and Marina Lenisa. Innocent game semantics via intersection type assignment systems. In Simona Ronchi Della Rocca, editor, CSL, volume 23 of LIPIcs, pages 231–247. Schloss Dagstuhl, 2013. doi:10.4230/LIPICS.CSL.2013.231.
  • [33] Kurt Gödel, Solomon Feferman, John Dawson, Stephen Kleene, Gregory Moore, Robert Solovay, and Jean Heijenoort. Collected Works: Volume II Publications 1938-1974. Oxford University Press, June 2001. doi:10.1093/oso/9780195147216.001.0001.
  • [34] Roger Hindley and Giuseppe Longo. Lambda calculus models and extensionality. Mathematical Logic Quarterly, 26(19-21):289–310, 1980. doi:10.1002/malq.19800261902.
  • [35] Furio Honsell and Marina Lenisa. Semantical analysis of perpetual strategies in lambda-calculus. Theoretical Computer Science, 212(1-2):183–209, 1999. doi:10.1016/S0304-3975(98)00140-6.
  • [36] Furio Honsell and Marina Lenisa. “Wave-Style” geometry of interaction models in Rel are graph-like lambda-models. In Stefano Berardi, Mario Coppo, and Ferruccio Damiani, editors, TYPES, volume 3085 of LNCS, pages 242–258. Springer, 2003. doi:10.1007/978-3-540-24849-1_16.
  • [37] Furio Honsell and Gordon Plotkin. On the completeness of order-theoretic models of the λ-calculus. Information and Computation, 207, May 2009. doi:10.1016/j.ic.2008.03.027.
  • [38] Furio Honsell and Simona Ronchi Della Rocca. Reasoning about interpretations in qualitative λ-models. In Manfred Broy and Cliff B. Jones, editors, Programming concepts and methods, pages 505–522. North-Holland, 1990. URL: https://people.uniud.it/sites/default/files/HR90.pdf.
  • [39] Furio Honsell and Simona Ronchi Della Rocca. An approximation theorem for topological lambda models and the topological incompleteness of lambda calculus. Journal of Computer and System Sciences, 45(1):49–75, 1992. doi:10.1016/0022-0000(92)90040-P.
  • [40] Giuseppe Jacopini. A condition for identifying two elements of whatever model of combinatory logic. In Corrado Böhm, editor, Lambda-Calculus and Computer Science Theory, volume 37 of LNCS, pages 213–219. Springer, 1975. doi:10.1007/BFB0029527.
  • [41] Rainer Kerth. The interpretation of unsolvable λ-terms in models of untyped λ-calculus. Journal of Symbolic Logic, 63(4):1529–1548, 1998. doi:10.2307/2586665.
  • [42] Assaf J. Kfoury. A linearization of the lambda-calculus and consequences. Journal of Logic and Computation, 10(3):411–436, 2000. doi:10.1093/LOGCOM/10.3.411.
  • [43] Jean-Jacques Lévy. An algebraic interpretation of the lambda beta-calculus and a labeled lambda-calculus. In Corrado Böhm, editor, Lambda-Calculus and Computer Science Theory, volume 37 of LNCS, pages 147–165. Springer, 1975. doi:10.1007/BFB0029523.
  • [44] Giuseppe Longo. Set-theoretical models of λ-calculus: theories, expansions, isomorphisms. Annals of Pure and Applied Logic, 24(2):153–188, 1983. doi:10.1016/0168-0072(83)90030-1.
  • [45] Luca Paolini, Mauro Piccolo, and Simona Ronchi Della Rocca. Logical semantics for stability. In Samson Abramsky, Michael W. Mislove, and Catuscia Palamidessi, editors, MFPS, volume 249 of ENTCS, pages 429–449. Elsevier, 2009. doi:10.1016/J.ENTCS.2009.07.101.
  • [46] David Park. The Y-combinator in Scott’s lambda-calculus models. Theory of Computation Report, University of Warwick. Department of Computer Science, 1976. URL: http://wrap.warwick.ac.uk/46310/.
  • [47] Gordon D. Plotkin. Set-theoretical and other elementary models of the lambda-calculus. Theoretical Computer Science, 121(1&2):351–409, 1993. doi:10.1016/0304-3975(93)90094-A.
  • [48] Simona Ronchi Della Rocca and Luca Paolini. The Parametric Lambda Calculus - A Metamodel for Computation. EATCS. Springer, 2004. doi:10.1007/978-3-662-10394-4.
  • [49] Dana Scott. Continuous lattices. In Francis William Lawvere, editor, Toposes, Algebraic Geometry and Logic, volume 274 of LNM, pages 97–136. Springer, 1972. doi:10.1007/BFb0073967.
  • [50] Dana S. Scott. Open problem n. II 4. In Corrado Böhm, editor, Lambda-Calculus and Computer Science Theory, volume 37 of LNCS, page 369. Springer, 1975. doi:10.1007/BFb0029538.
  • [51] Dana S. Scott. Data types as lattices. SIAM Journal on Computing, 5(3):522–587, 1976. doi:10.1137/0205037.
  • [52] Jeremy G. Siek. Revisiting elementary denotational semantics. CoRR, abs/2312.02359, 2017. doi:10.48550/arXiv.1707.03762.
  • [53] Makoto Tatsuta and Mariangiola Dezani-Ciancaglini. Normalisation is insensible to lambda-term identity or difference. In LICS, pages 327–338. IEEE Computer Society, 2006. doi:10.1109/LICS.2006.36.
  • [54] Cécile Zylberajch. Syntaxe et semantique de la facilité en lambda calcul. PhD thesis, Université de Paris VII, 1991. URL: https://theses.fr/1991PA077272.