A Red Hat Linux 6.1 Package List

Total Page:16

File Type:pdf, Size:1020Kb

A Red Hat Linux 6.1 Package List Red Hat Linux 6.1 The Official Red Hat Linux Reference Guide ISBN: 1-58569-020-1 Red Hat, Inc. 2600 Meridian Parkway Durham NC 27709 US 919-547-0012 1-888-733-4281 919-547-0024 [email protected] 13588 Research Triangle Park NC 27713 © 1999 Red Hat, Inc. RefGuide(EN)-6.1-Print-RHI (10/99) Red Hat is a registered trademark and the Red Hat Shadow Man logo, RPM, the RPM logo, and Glint are trademarks of Red Hat, Inc. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group. Alpha is a trademark of Digital Equipment Corporation. SPARC is a registered trademark of SPARC International, Inc. Products bearing the SPARC trademark are based on an architecture developed by Sun Microsystems, Inc. Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries. TrueType is a registered trademark of Apple Computer, Inc. Windows is a registered trademark of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Copyright © 1999 by Red Hat, Inc.. This material may be distributed only subject to the terms and con- ditions set forth in the Open Publication License, V0.4 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit per- mission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Printed in Canada, Ireland, and Japan ii Contents Red Hat Linux 6.1 Introduction ................................................................................... vii Welcome.................................................................................... vii Getting the Documentation That’s Right for You........................................ vii More to Come .............................................................................. xi Sign Up for Support........................................................................ xi Part I System-Related Reference ............................................. 13 Chapter 1 Red Hat Linux 6.1 New Features .......................... 15 1.1 Installation-related Enhancements ............................................. 15 1.2 System-Related New Features.................................................. 15 1.3 Miscellaneous New Features.................................................... 16 Chapter 2 System Administration .......................................... 19 2.1 Filesystem Structure ............................................................. 19 2.2 Special Red Hat File Locations ................................................. 23 2.3 Users, Groups and User-Private Groups ...................................... 23 2.4 Configuring Console Access .................................................... 28 2.5 The floppy Group ................................................................. 31 2.6 User Authentication with PAM................................................... 32 2.7 Shadow Utilities................................................................... 36 2.8 Building a Custom Kernel........................................................ 37 2.9 Sendmail .......................................................................... 42 2.10 Controlling Access to Services.................................................. 44 2.11 Anonymous FTP.................................................................. 44 2.12 NFS Configuration................................................................ 45 2.13 The Boot Process, Init, and Shutdown ......................................... 46 2.14 Rescue Modes.................................................................... 61 2.15 What is Rescue Mode? .......................................................... 61 iii Chapter 3 System Configuration............................................ 67 3.1 System Configuration With Linuxconf ........................................... 67 3.2 System Configuration with the Control Panel.................................. 116 Chapter 4 PowerTools.............................................................. 137 4.1 PowerTools Packages............................................................ 137 4.2 Installing PowerTools Packages................................................. 137 4.3 If You’re Not Running GNOME or KDE......................................... 138 Chapter 5 Working with Update Agent .................................. 141 5.1 Starting Update Agent ............................................................. 141 5.2 Configuring Update Agent......................................................... 142 5.3 Using Update Agent ............................................................... 148 Chapter 6 Package Management with RPM .......................... 153 6.1 RPM Design Goals ............................................................... 153 6.2 Using RPM ........................................................................ 155 6.3 Impressing Your Friends with RPM ............................................. 161 6.4 Other RPM Resources ........................................................... 163 Chapter 7 Gnome-RPM ............................................................ 165 7.1 Starting Gnome-RPM ............................................................ 167 7.2 The Package Display............................................................. 168 7.3 Installing New Packages......................................................... 170 7.4 Configuration...................................................................... 173 7.5 Package Manipulation............................................................ 179 Part II Installation-Related Reference....................................... 187 Chapter 8 Before You Begin.................................................... 189 8.1 Things You Should Know ........................................................ 189 iv Chapter 9 Installing Red Hat Linux with the Text Mode Installer ....................................................................... 197 9.1 The Installation Program User Interface ....................................... 198 9.2 Starting the Installation Program................................................ 201 9.3 Choosing a Language............................................................ 203 9.4 Selecting a Keyboard Type ...................................................... 203 9.5 Selecting an Installation Method ................................................ 204 9.6 Identify Disk Partition to Install From ........................................... 206 9.7 Installing over a Network......................................................... 207 9.8 Welcome........................................................................... 211 9.9 Upgrading or Installing ........................................................... 211 9.10 Partitioning Your Disk for Red Hat Linux ....................................... 216 9.11 Installing LILO..................................................................... 229 9.12 Naming Your Computer .......................................................... 234 9.13 Configuring a Network Connection ............................................. 235 9.14 Configuring Your Mouse ......................................................... 237 9.15 Configuring the Time Zone ...................................................... 239 9.16 Setting a Root Password......................................................... 241 9.17 Creating a Login Account........................................................ 242 9.18 Authentication Configuration .................................................... 243 9.19 Select Packages to Install ....................................................... 245 9.20 Configuring your Video Adapter................................................. 249 9.21 Creating a Boot Diskette......................................................... 251 9.22 Package Installation .............................................................. 253 9.23 Configuring the X Window System ............................................. 254 9.24 Finishing Up....................................................................... 259 Chapter 10 Kickstart Installations............................................ 261 10.1 Where to Put A Kickstart File.................................................... 261 10.2 Starting a Kickstart Installation.................................................. 263 10.3 The Kickstart File ................................................................. 263 Part III Appendixes ....................................................................... 279 v Appendix A Red Hat Linux 6.1 Package List .......................... 281 A.1 Using the Package List After Installation ..................................... 282 A.2 Amusements ...................................................................... 283 A.3 Applications ....................................................................... 288 A.4 Development ...................................................................... 345 A.5 Documentation.................................................................... 373 A.6 System Environment ............................................................. 382 A.7 User Interface ....................................................................
Recommended publications
  • Technical and Legal Approaches to Unsolicited Electronic Mail, 35 USFL Rev
    UIC School of Law UIC Law Open Access Repository UIC Law Open Access Faculty Scholarship 1-1-2001 Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001) David E. Sorkin John Marshall Law School, [email protected] Follow this and additional works at: https://repository.law.uic.edu/facpubs Part of the Computer Law Commons, Internet Law Commons, Marketing Law Commons, and the Privacy Law Commons Recommended Citation David E. Sorkin, Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001). https://repository.law.uic.edu/facpubs/160 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Open Access Faculty Scholarship by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. Technical and Legal Approaches to Unsolicited Electronic Mailt By DAVID E. SORKIN* "Spamming" is truly the scourge of the Information Age. This problem has become so widespread that it has begun to burden our information infrastructure. Entire new networks have had to be constructed to deal with it, when resources would be far better spent on educational or commercial needs. United States Senator Conrad Burns (R-MT)1 UNSOLICITED ELECTRONIC MAIL, also called "spain," 2 causes or contributes to a wide variety of problems for network administrators, t Copyright © 2000 David E. Sorkin. * Assistant Professor of Law, Center for Information Technology and Privacy Law, The John Marshall Law School; Visiting Scholar (1999-2000), Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University.
    [Show full text]
  • Herramientas En GNU/Linux Para Estudiantes Universitarios
    Herramientas en GNU/Linux para estudiantes universitarios El Escritorio KDE David Vaquero Santiago Herramientas en GNU/Linux para estudiantes universitarios: El Escritorio KDE por David Vaquero Santiago Copyright (c) 2.003 David Vaquero Santiago Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". Tabla de contenidos 1. El Escritorio KDE..............................................................................................................................................1 1.1. La Historia de KDE.................................................................................................................................1 1.2. .................................................................................................................................................................1 2. ..............................................................................................................................................................................3 2.1. El escritorio KDE....................................................................................................................................3 3. Konqueror: La herramienta polivalente..........................................................................................................8
    [Show full text]
  • Newscache – a High Performance Cache Implementation for Usenet News 
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 NewsCache – A High Performance Cache Implementation for Usenet News _ _ _ Thomas Gschwind and Manfred Hauswirth Technische Universität Wien © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org NewsCache – A High Performance Cache Implementation for Usenet News Thomas Gschwind Manfred Hauswirth g ftom,M.Hauswirth @infosys.tuwien.ac.at Distributed Systems Group Technische Universitat¨ Wien Argentinierstraße 8/E1841 A-1040 Wien, Austria, Europe Abstract and thus provided to its clients are defined by the news server’s administrator. Usenet News is reaching its limits as current traffic strains the available infrastructure. News data volume The world-wide set of cooperating news servers makes increases steadily and competition with other Internet up the distribution infrastructure of the News system. services has intensified. Consequently bandwidth re- Articles are distributed among news servers using the quirements are often beyond that provided by typical Network News Transfer Protocol (NNTP) which is de- links and the processing power needed exceeds a sin- fined in RFC977 [2]. In recent years several exten- gle system’s capabilities.
    [Show full text]
  • Linux Network Administrators Guide
    Chapter 21. C News One of the most popular software packages for Netnews is C News. It was designed for sites that carry news over UUCP links. This chapter will discuss the central concepts of C News, basic installation, and maintenance tasks. C News stores its configuration files in /etc/news, and most of its binaries are kept below the /usr/lib/news/ directory. Articles are kept below /var/spool/news. You should make sure that virtually all files in these directories are owned by user news or group news. Most problems arise from files being inaccessible to C News. Use su to become the user news before you touch anything in the directory. The only exception is the setnewsids command, which is used to set the real user ID of some news programs. It must be owned by root and have the setuid bit set. In this chapter, we describe all C News configuration files in detail and show you what you have to do to keep your site running. Chapter 21. C News 402 21.1. Delivering News Articles can be fed to C News in several ways. When a local user posts an article, the newsreader usually hands it to the inews command, which completes the header information. News from remote sites, be it a single article or a whole batch, is given to the rnews command, which stores it in the /var/spool/news/in.coming directory, from where it will be picked up at a later time by newsrun. With any of these two techniques, however, the article will eventually be handed to the relaynews command.
    [Show full text]
  • Apg Zope-Plone3 Zope-Externaleditor 0. Poppler-Utils 0. Apache2.2
    deluge-core libmagickcore2 libecpg6 libcvaux-dev libcairo-perl 0.655021834061 0. 0. libisc50 libfindlib-ocaml-dev 0. libparrot1.4.0 libjaxp1.3-java-gcj 0. 0. libgssrpc4 peercast 0. gcj-4.4-jre 0. libxfconf-0-2 0. 0. 0. libbind9-50 deluge-common 0. 0. liblqr-1-0 libecpg-compat3 0. libcv-dev libavahi-common-data libgtk2-perl 0. 1.03092783505 1.5873015873 0. 0. libasm0 2.94117647059 2.40963855422 libacl1 coreutils 0.0842023447114 0. 0.655021834061 0. 0. libplasma-ruby1.8 0. 0. 0. 0. 2.38095238095 libxalan2-java-gcj 0. 0. 0. 0. libfindlib-ocaml 0. librevm0 python-poker-engine 0. peercast-geekast 1.03092783505 0. libxfcegui4-4 0.1941370607650.278515447892 0. libisccc50 0. 0.0971754340503 libparrot-dev parrot 0.0226346763241 0. 0. geoip-database 0. libhighgui-dev 0. libmagickwand2 libpango-perl libpgtypes3 0. gcj-4.4-jdk libgcj10-awt 2.94117647059 libkdb5-4 libkadm5srv6 0. 0. 0. 0. 0.01295672454 libasn1-8-heimdal 0.340676811265 kamera python 1.61290322581 libpoconet8-dbg python-alsaaudio 0. 0. libedfmt0 0. 0. step 1.3314094576 0. 0. libxerces2-java-gcj 0. 0. xfconf ocaml-findlib 3.79746835443 dpkg libattr1 0. peercast-servent 3.75283079909 0. libplasma-ruby gnustep-base-runtime 0.2915263021511.24614678297 libdns50 0. 0. 3.79746835443 apg python-poker-network 0. libdigest-bubblebabble-perl 0. libloader-java-openoffice.org libhx509-4-heimdal libavahi-client3 libavahi-common3 0. libdb4.5 0. libcrypt-openssl-dsa-perl libpococrypto8-dbg 0.3179650238473.05646290247 0. 0. 0. 0. 1.23302944842 2.63157894737 0. kcolorchooser libisccfg50 0. libetrace0 libgcj10-dev 0. marble libkrb5-dev 1.52816947596 parrot-minimal 0.
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • Visual Basic 6.0 Internet Programming:Table of Contents
    To access the contents, click the chapter and section titles. Visual Basic 6.0 Internet Programming (Publisher: John Wiley & Sons, Inc.) Author(s): Carl Franklin ISBN: 0471314986 Publication Date: 02/01/99 Brief Full Advanced Search Search this book: Search Tips FOREWORD CHAPTER 1—THE INTERNET Attack of the Buzzwords! Protocols and Data Protocol Stacks and the OSI Model TCP/IP Names and Addresses Ports Name Resolution Sockets The TCP/IP Model CHAPTER 2—WINSOCK PROGRAMMING Introduction Why Not Use the Winsock API? Installing the Software Loading DSSOCK32.OCX into Visual Basic DSSOCK.BAS SocketConnect IsDotAddress ParseString Getting Started with dsSocket Making a Sockets Connection What’s Going On Here? SocketID and the Socket Property Closing the Connection Handling Multiple Connections on the Server Side Sending Data Receiving Data LineMode, EOLChar, and DataSize The Simple Approach A New Twist Splitting Up the Process with Flags A Slight Variation Event Driven = No Loops Which Approach Is Better? Error Handling Winsock Errors Error-Handling Techniques Minimal Error Trapping Debug.Print Error Trapping Message Dialog Reporting Error Log Reporting UDP—User Datagram Protocol Terminal—A Winsock Terminal Program Epilogue CHAPTER 3—SIMPLE PROTOCOLS Introduction NTP (Network Time Protocol) WHOIS FINGER SetTime Application Epilogue CHAPTER 4—USENET NEWS Introduction NNTP MessageIDs vs. Message Numbers NNTP Versions NNTP Commands Sample Conversation The WILDMAT Format Server Responses Usenet Article Format VB Programming Technique String Parsing
    [Show full text]
  • The Early History of F# (HOPL IV – Second Submitted Draft)
    The Early History of F# (HOPL IV – second submitted draft) DON SYME, Principal Researcher, Microsoft; F# Language Designer; F# Community Contributor This paper describes the genesis and early history of the F# programming language. I start with the origins of strongly-typed functional programming (FP) in the 1970s, 80s and 90s. During the same period, Microsoft was founded and grew to dominate the software industry. In 1997, as a response to Java, Microsoft initiated internal projects which eventually became the .NET programming framework and the C# language. From 1997 the worlds of academic functional programming and industry combined at Microsoft Research, Cambridge. The researchers engaged with the company through Project 7, the initial effort to bring multiple languages to .NET, leading to the initiation of .NET Generics in 1998 and F# in 2002. F# was one of several responses by advocates of strongly-typed functional programming to the “object-oriented tidal wave” of the mid-1990s. The development of the core features of F# happened from 2004-2007, and I describe the decision-making process that led to the “productization” of F# by Microsoft in 2007-10 and the release of F# 2.0. The origins of F#’s characteristic features are covered: object programming, quotations, statically resolved type parameters, active patterns, computation expressions, async, units-of-measure and type providers. I describe key developments in F# since 2010, including F# 3.0-4.5, and its evolution as an open source, cross-platform language with multiple delivery channels. I conclude by examining some uses of F# and the influence F# has had on other languages so far.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • A Technical Summary
    A Technical Summary Table A.1. Kerberos administrative ACL (MIT) Allow Deny Operation a A Add principals or policies d D Delete principals or policies m M Modify principals or policies c C Change passwords i I Inquiry the database l L List principals or policies s S Set key for principals * or x Allow all privileges Table A.2. Kerberos kadmin password policies (MIT) Option Meaning -history Minimum count of unusable old passwords -maxlife Maximum allowed lifetime -minclasses Minimum character classes -minlength Minimum password length -minlife Minimum lifetime 380 A Technical Summary Table A.3. LDAP access control list levels Level Privilege Coding Explanation none =0 No access at all auth =x Permits authentication attempt compare =cx Permits comparison search =scx Permits search filter application read =rscx Permits search result inspection write =wrscx Permits modification or deletion Table A.4. The OpenAFS access control list attributes Permission Meaning l List contents (lookup) i Create new files or directories (insert) d Delete files or directories a Change ACL attributes of directories (administer) r Read contents of files w Modify contents of files (write) k Lock files for reading read Equivalent to rl write Equivalent to rlidwk (no administrative rights) all Equivalent to rlidwka none Remove all ACL permissions Table A.5. The OpenAFS @sys names (excerpt) @sys Architecture alpha dux40 Digital UNIX 4 on an Alpha alpha dux50 Digital UNIX 5 on an Alpha i386 linux24 Linux Kernel 2.4 on Intel and compatible i386 linux26 Linux Kernel 2.6 on Intel and compatible i386 nt40 Microsoft Windows NT and later on Intel and compatible ppc darwin70 Apple MacOS X 10.3 on a PowerPC Macintosh ppc darwin80 Apple MacOS X 10.4 on a PowerPC Macintosh ppc darwin90 Apple MacOS X 10.5 on a PowerPC Macintosh rs aix52 IBM AIX 5.2 on a pSeries rs aix53 IBM AIX 5.3 on a pSeries sgi 65 SGI Irix 6.5 on a MPIS x86 darwin80 Apple MacOS X 10.4 on an Intel Macintosh x86 darwin90 Apple MacOS X 10.5 on an Intel Macintosh A Technical Summary 381 Table A.6.
    [Show full text]
  • Summary of UNIX Commands Furnishing, Performance, Or the Use of These Previewers Commands Or the Associated Descriptions Available on Most UNIX Systems
    S u mmary of UNIX Commands- version 3.2 Disclaimer 8. Usnet news 9. File transfer and remote access Summary of UNIX The author and publisher make no warranty of any 10. X window kind, expressed or implied, including the warranties of 11. Graph, Plot, Image processing tools commands merchantability or fitness for a particular purpose, with regard to the use of commands contained in this 12. Information systems 1994,1995,1996 Budi Rahardjo reference card. This reference card is provided “as is”. 13. Networking programs <[email protected]> The author and publisher shall not be liable for 14. Programming tools damage in connection with, or arising out of the 15. Text processors, typesetters, and This is a summary of UNIX commands furnishing, performance, or the use of these previewers commands or the associated descriptions available on most UNIX systems. 16. Wordprocessors Depending on the configuration, some of 17. Spreadsheets the commands may be unavailable on your Conventions 18. Databases site. These commands may be a 1. Directory and file commands commercial program, freeware or public bold domain program that must be installed represents program name separately, or probably just not in your bdf search path. Check your local dirname display disk space (HP-UX). See documentation or manual pages for more represents directory name as an also df. details (e.g. man programname). argument cat filename This reference card, obviously, cannot filename display the content of file filename describe all UNIX commands in details, but represents file name as an instead I picked commands that are useful argument cd [dirname] and interesting from a user’s point of view.
    [Show full text]
  • Compiler Construction
    Compiler construction PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 10 Dec 2011 02:23:02 UTC Contents Articles Introduction 1 Compiler construction 1 Compiler 2 Interpreter 10 History of compiler writing 14 Lexical analysis 22 Lexical analysis 22 Regular expression 26 Regular expression examples 37 Finite-state machine 41 Preprocessor 51 Syntactic analysis 54 Parsing 54 Lookahead 58 Symbol table 61 Abstract syntax 63 Abstract syntax tree 64 Context-free grammar 65 Terminal and nonterminal symbols 77 Left recursion 79 Backus–Naur Form 83 Extended Backus–Naur Form 86 TBNF 91 Top-down parsing 91 Recursive descent parser 93 Tail recursive parser 98 Parsing expression grammar 100 LL parser 106 LR parser 114 Parsing table 123 Simple LR parser 125 Canonical LR parser 127 GLR parser 129 LALR parser 130 Recursive ascent parser 133 Parser combinator 140 Bottom-up parsing 143 Chomsky normal form 148 CYK algorithm 150 Simple precedence grammar 153 Simple precedence parser 154 Operator-precedence grammar 156 Operator-precedence parser 159 Shunting-yard algorithm 163 Chart parser 173 Earley parser 174 The lexer hack 178 Scannerless parsing 180 Semantic analysis 182 Attribute grammar 182 L-attributed grammar 184 LR-attributed grammar 185 S-attributed grammar 185 ECLR-attributed grammar 186 Intermediate language 186 Control flow graph 188 Basic block 190 Call graph 192 Data-flow analysis 195 Use-define chain 201 Live variable analysis 204 Reaching definition 206 Three address
    [Show full text]