Hets - the Heterogeneous Tool Set

Copyright(c) Kristina Sojakova, DFKI Bremen 2009
LicenseGPLv2 or higher, see LICENSE.txt
Safe HaskellSafe-Inferred



Algorithm description:

Input : graph where nodes are signatures and edges are morphisms Output : a signature "sig" and for each input signature "sig1" a morphism m : sig1 -> sig

1 : Compute the transitive and symmetric closure of the relation R induced by the morphisms in the graph

2 : Initialize the output signature "sig" and collection of morphisms M to empty Initialize the set of analyzed symbols to empty

3 : For each input signature sig1 : 3.1 : Initialize the output map "m" to empty 3.2 : For each symbol "s" in sig1 (keeping the order in which they are defined) : 3.1.1 Check if s R s' for any already analyzed symbol "s'" 3.1.2 If yes: Recover from M the value "c" that s' maps to Update m by adding the pair (s,c) 3.1.3 If no: Get the type "t" of s in sig1 Translate t along m; call this new type "t1" Update sig by adding the declaration s : t1 (in case the name s is already contained in sig, we generate a fresh name "s1" and add the declaration s1 : t and pair (s,s1) to sig and m respectively. 3.3 : Add m to M