safe-tensor: Dependently typed tensor algebra

[ library, math, mit ] [ Propose Tags ]

For an introduction to the library, see Math.Tensor.Safe. For more information, see the README on GitHub at

[Skip to Readme]
Versions [faq],,
Change log
Dependencies base (>=4.7 && <5), constraints (>=0.10 && <0.13), containers (==0.6.*), hmatrix (==0.20.*), mtl (==2.2.*), singletons (>=2.5 && <2.8) [details]
License MIT
Copyright 2020 Nils Alex
Author Nils Alex
Category Math
Home page
Bug tracker
Source repo head: git clone
Uploaded by nalex at 2020-07-08T21:40:07Z
Distributions NixOS:
Downloads 151 total (16 in the last 30 days)
Rating (no votes yet) [estimated by Bayesian average]
Your Rating
  • λ
  • λ
  • λ
Status Hackage Matrix CI
Docs available [build log]
Last success reported on 2020-07-08 [all 1 reports]


[Index] [Quick Jump]


Maintainer's Corner

For package maintainers and hackage trustees

Readme for safe-tensor-

[back to package description]

Hackage-Deps Hackage Build Status


Dependently typed tensor algebra in Haskell. Useful for applications in field theory, e.g., carrying out calculations for


Tensor calculus is reflected in the type system. We regard a tensor as a multilinear map from a product of vector spaces and duals thereof to the common field. The type of each tensor is its generalized rank, describing the vector spaces it acts on and assigning a label to each vector space. There are a few rules for tensor operations:

  • Only tensors of the same type may be added. The result is a tensor of this type.
  • Tensors may be multiplied if the resulting generalized rank does not contain repeated labels for the same (dual) vector space.
  • The contraction of a tensors removes pairs of vector space and dual vector space with the same label from the generalized rank.

It is thus impossible to perform inconsistent tensor operations.

There is also an existentially typed variant of the tensor type useful for runtime computations. These computations take place in the Error monad, throwing errors if operand types are not consistent.

The approach is described in detail in the Hackage documentation.