MYWOT
Child safety
Confidence
Trustworthiness
Confidence
MALICIOUS CONTENT INDICATORS
Golem.ph.utexas.edu most likely does not offer any malicious content.
Secure connection support
HTTPS
Golem.ph.utexas.edu provides SSL-encrypted connection.
ADULT CONTENT INDICATORS
Golem.ph.utexas.edu most likely does not offer any adult content.
Popular pages
- Welcome
-
How to Apply Category Theory to Thermodynamics | The n-Category Café
Posted by Emily Riehl guest post by Nandan Kulkarni and Chad Harper This blog post discusses the paper “Compositional Thermostatics” by John Baez, Owen Lynch, and Joe Moeller. The series of posts on D...
-
Type Theory and Propositions | The n-Category Café
x x is a raindrop”, so I thought your point might rest on the assumption that the theory, to which Field’s result is applied, would be in an untyped predicate logic. While you can indeed get similar c...
-
The Categorical Origins of Lebesgue Integration, Revisited | The n-Category Café
Looks like a good read, Tom! We had a small burst of functional analysis meets category theory earlier this year with talk of Smith spaces (aka Waelbrock dual spaces) forming Ban Ban^{op}. Smith spac...
-
Profunctor Optics: The Categorical View | The n-Category Café
) \Lambda(l \circ u) \in \mathbf{C}(A, T^Y), and the rest is just a combination of morphisms that uses the product and the coproduct. This approach to composition is not practical: we would need to wr...
-
Learning Computer Science With Categories | The n-Category Café
Re: Learning Computer Science With Categories It will be a shame if this book is not free forever, because I’m not sure what I’d rather link to folks who are interested in the topic. I couldn’t help b...