MHB Free variables and binding occurrence of each variable.

  • Thread starter Thread starter JamesBwoii
  • Start date Start date
  • Tags Tags
    Variable Variables
AI Thread Summary
The discussion focuses on identifying free variables and binding occurrences in various lambda calculus expressions. The user presents several lambda expressions and attempts to classify their free variables, noting specific variables like $x$, $z$, and $a$. The consensus confirms the identification of free variables, with some expressions having none. The term "binding occurrence" is questioned, as it is not a standard term in lambda calculus. Clarification is suggested regarding the relationship between the lambda abstraction and its free variables, particularly in the expression $\lambda x.x$. The conversation emphasizes the importance of precise terminology in understanding lambda calculus concepts.
JamesBwoii
Messages
71
Reaction score
0
Hi, I'm trying to identify the free variable and binding occurrence but I'm not sure if they're right in lambda calculus.

  1. $x$
  2. $\lambda x.x$
  3. $(\lambda a.z)a$
  4. $\lambda a.za$
  5. $(\lambda n.n)z$
  6. $\lambda z.(\lambda y.(\lambda x.x)y)z$
  7. $(\lambda t.((\lambda t.(\lambda t.t)t)t))t$

Then for free variables for them I have got:

  1. $x$
  2. No free variable
  3. ${z,a}$
  4. $z$
  5. $z$
  6. No free variable
  7. $t$

For the binding occurrence would it just be the link between the $\lambda x$ and the free variable $x$ in $\lambda x.x$?
 
Last edited:
Technology news on Phys.org
Mmm, lambda calculus... (in Homer Simpson's voice).

You are right about free variables. The term "binding occurrence" is not standard. You are probably right, but you may want to consult the definition and maybe post it here. I would say, "...and the free variable $x$ in the body of $\lambda x.x$".
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Back
Top