NDL: a Domain-Specific Language for Device Drivers

Total Page:16

File Type:pdf, Size:1020Kb

NDL: a Domain-Specific Language for Device Drivers NDL: A Domain-Specific Language for Device Drivers Christopher L. Conway Stephen A. Edwards [email protected] [email protected] Department of Computer Science, Columbia University 1214 Amsterdam Ave., New York, NY 10027 1 ABSTRACT To address this challenge, we introduce NDL , a domain- Device drivers are difficult to write and error-prone. They specific language for device drivers. The language includes are usually written in C, a fairly low-level language with direct support for the semantics of device drivers, leading to minimal type safety and little support for device semantics. shorter, more maintainable driver code. NDL can be used As a result, they have become a major source of instability to write drivers for a wide variety of devices in a platform- in operating system code. neutral fashion. The compiler is designed to be readily This paper presents NDL, a language for device drivers. ported to a broad class of operating systems. NDL provides high-level abstractions of device resources and In this paper, we demonstrate the features that make NDL constructs tailored to describing common device driver op- device drivers simple and concise and show that the NDL erations. We show that NDL allows for the coding of a se- compiler produces code which is only marginally less effi- mantically correct driver with a code size reduction of more cient than the equivalent C. Throughout this paper, we will than 50% and a minimal impact on performance. illustrate the use of NDL using examples from the driver for an NE2000-compatible Ethernet adapter. Categories and Subject Descriptors 2. RELATED WORK Programming Languages D.3.3 [ ]: Language Constructs A variety of approaches have been suggested to improve and Features|domain-specific languages; D.1.2 the reliability of low-level software and device driver soft- Programming Techniques [ ]: Automatic ware in particular. Crary and Morrissett [3] propose typed Software Programming|program synthesis; D.2.3 [ assembly language as a compiler target for preserving type Engineering ]: Coding Tools and Techniques information from higher-level languages. Unfortunately, C, the most common systems programming language, is not General Terms much more strongly typed than a traditional assembly lan- Design,Languages,Reliability guage; there is little the compiler can do to improve the type safety of C code. Deline and F¨ahndrich [4] use a similar typing system in Keywords the C-like programming language VAULT. The use of vari- Device drivers, systems programming, domain-specific ables is controlled through type guards that describe when languages an operation on a variable is valid. In order for the compiler to accept the program, it must respect the type guards' ac- 1. INTRODUCTION cess specifications and types must match at program join points. VAULT has shown some success in preventing com- Device drivers are critical, low-level systems code. Tra- mon programmer errors, but its limitations on alias types ditionally, they have been written in C due to its efficiency prevent it from being generally applicable to device driver and flexibility. Unfortunately, sophisticated device interac- development. tion protocols and C's lack of type safety make driver code Holzmann [5] and Ball and Rajamani [1] have addressed complex and prone to failure. Indeed, device drivers have the use of static analysis in the verification of traditional C been noted as a major source of faults in operating system systems software. Static analyses can find subtle bugs and code [2]. However, no other high-level language is widely increase confidence in the code, but the types of detectable accepted for device programming. errors are restricted and the quality of the analysis depends on programmer-written property specifications. A group at the University of Rennes has done perhaps the most work on domain-specific languages for device drivers. Permission to make digital or hard copies of all or part of this work for Thibault et al.'s GAL [8] is a domain-specific language for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies X Windows video drivers. Their compiler combines a par- bear this notice and the full citation on the first page. To copy otherwise, to tial evaluation framework with a language tailored to video republish, to post on servers or to redistribute to lists, requires prior specific driver operations to produce driver code that is nearly 90% permission and/or a fee. 1 LCTES'04, June 11–13, 2004, Washington, DC, USA. With apologies to GNU, NDL stands for \The NDL Device Copyright 2004 ACM 1-58113-806-7/04/0006 ...$5.00. Language". smaller than the equivalent C code and just as fast. This start = true; work is promising, but the methodology may not be appli- dmaState = DISABLED; cable to a wider variety of device drivers. remoteDmaByteCount = count; Also at Rennes, M´erillon et al. [6] developed Devil, an interface definition language designed to be a more general NDL also provides a mechanism for describing groups solution for device driver development. A Devil specifica- of mutually exclusive states and procedures for switching tion describes hardware components such as I/O ports and among them. As a result, with a single line of NDL code memory-mapped registers. The specification is compiled the programmer is able to effect a state transition that would into a set of C macros for device manipulation; the macros require many I/O operations in an equivalent C program. are called from traditional C driver code, allowing the driver Copying large amounts of data to and from buffers is an- programmer to avoid writing the lowest-level code by hand. other frequent device operation. There are common idioms This approach prevents certain common programming er- for a buffer-to-buffer copy in C, but they are complicated by rors, but it does not specify the protocol for using the device, the need to support compatible devices with different data and it does not provide the type safety of a higher-level so- bus widths in the same driver. NDL treats buffer copy- lution. Nevertheless, portions of NDL borrow liberally from ing as a special case of assignment. The following fragment Devil's interface definition syntax. reads count bytes read from the FIFO dataport (defined O'Nils and Janstch [7] and Wang et al. [9] have also devel- elsewhere) and placed in the array buffer using the appro- oped tools for device driver synthesis, but they are primar- priate I/O operations. ily concerned with hardware/software codesign for embed- var buffer: byte[count]; ded systems. NDL provides a more flexible tool for a wider buffer = dataport; range of devices. 3.1 Device Inheritance 3. NDL An NDL driver may begin by declaring a parent device NDL is a language for device driver development that from which it should inherit interface and template infor- provides high-level constructs for device programming, de- mation. For example, the NE2000 driver declares itself as scribing the driver in terms of its operational interface. Its an extension of NetworkDevice, which is an abstract device declarations are designed to closely resemble the specifica- that defines functions and variables common to all Ethernet tion document for the device it controls. An NDL driver adapters, such as the start transmit function, which takes is typically composed of a set of register definitions, proto- a packet buffer and queues it for transmission. cols for accessing those registers, and a collection of device In addition, NetworkDevice is associated with a template functions. The compiler translates register definitions and that specifies the boilerplate code required to implement a access protocols into an abstract representation of the de- network driver on a particular platform (e.g., initialization vice interface. Device functions are then translated into a and release of operating system data structures and requests series of operations on that interface. for system resources). Templates provide the glue layer Device drivers are systems-level code that interact directly between the high-level device specification and platform- with the operating system. The NDL compiler generates C specific C driver code. that makes appropriate operating system calls. Platform- specific functions are provided through compiler libraries 3.2 Device States and device templates; platform dependencies are minimal. Often, aspects of a device's behavior are most easily mod- NDL's main abstraction is a representation of the state eled as finite-state machines. For example, the direct mem- of the peripheral device being controlled. Internally, de- ory access system in the NE2000 can be either transferring vices can be in a variety of states, e.g., receiving data, wait- data to the card, from the card, or can be idle. NDL sup- ing for a certain condition, or having encountered an error. ports this view through explicitly defined state machines, From software, this state can be fairly awkward to access. such as those in Figure 1. A state machine is defined as At its simplest, it is spread out across bits in I/O memory a list of mutually exclusive states separated by `||'. Each packed carefully into bytes. Typically it is even more com- state may have a an associated list of statements intended plicated, often consisting of an address and data register pair to switch the machine to that state, invoked when a corre- that provide indirect access to internal device registers. In sponding goto statement is executed. both cases, NDL provides an abstraction layer that provides The states STOPPED and STARTED are mutually exclusive. transparent access to this state information. When the device needs to enter the STOPPED state, the state- For example, a typical sequence of I/O memory accesses ments \goto DMA DISABLED" (indicating a transition to state in C might be coded DMA DISABLED) and \stop = true" will be executed.
Recommended publications
  • End-User Debugging for E-Commerce
    End-User Debugging for E-Commerce Henry Lieberman Earl Wagner MIT Media Lab 20 Ames St, Cambridge, MA 02139 USA {lieber, ewagner}@media.mit.edu ABSTRACT another phone number to be dialed. It might ask for card numbers or transaction numbers that aren’t readily at hand, and have to One of the biggest unaddressed challenges for the digital looked up offline. If someone in customer service is successfully economy is what to do when electronic transactions go wrong. reached, that person (often a low-paid worker in a high-pressure Consumers are frustrated by interminable phone menus, and long call center) may specify a tedious process to be performed. They delays to problem resolution. Businesses are frustrated by the may not be empowered to actually understand or fix the problem high cost of providing quality customer service. themselves. Customers find themselves bounced endlessly from We believe that many simple problems, such as mistyped one support person to another. All of us have had these kinds of numbers or lost orders, could be easily diagnosed if users were experiences. supplied with end-user debugging tools, analogous to tools for Customer service problems are incredibly frustrating. Not only do software debugging. These tools can show the history of actions they cause frustration about the immediate transaction, they also and data, and provide assistance for keeping track of and testing poison the relationship between customers and vendors. hypotheses. These tools would benefit not only users, but Customers feel like they are being deflected, that they are not businesses as well by decreasing the need for customer service.
    [Show full text]
  • Relationships Between Category Theory and Functional Programming with an Application
    Turkish Journal of Mathematics Turk J Math (2019) 43: 1566 – 1577 http://journals.tubitak.gov.tr/math/ © TÜBİTAK Research Article doi:10.3906/mat-1807-189 Relationships between category theory and functional programming with an application Alper ODABAŞ∗,, Elis SOYLU YILMAZ, Department of Mathematics and Computer Sciences, Faculty of Arts and Sciences, Eskişehir Osmangazi University, Eskişehir, Turkey Received: 25.07.2018 • Accepted/Published Online: 08.04.2019 • Final Version: 29.05.2019 Abstract: The most recent studies in mathematics are concerned with objects, morphisms, and the relationship between morphisms. Prominent examples can be listed as functions, vector spaces with linear transformations, and groups with homomorphisms. Category theory proposes and constitutes new structures by examining objects, morphisms, and compositions. Source and target of a morphism in category theory corresponds to input and output in programming language. Thus, a connection can be obtained between category theory and functional programming languages. From this point, this paper constructs a small category implementation in a functional programming language called Haskell. Key words: Category theory, functional programming, Haskell 1. Introduction Eilenberg and MacLane ([7]) are the pioneers who built the structures of the categories, functors, and natural transformations which are revealed first in 1945. A broader literature review reveals an important connection between homology and theoretical homology theory. These findings relieve mathematics from theoretical constraint and enables branches of science to involve the above relationship. The most significant transition in computer science is between category theory and computation. Oneof the most important aspects of computation is composing the new functions or modules by using the primitive functions, recursive structures, etc.
    [Show full text]
  • On the Cognitive Prerequisites of Learning Computer Programming
    On the Cognitive Prerequisites of Learning Computer Programming Roy D. Pea D. Midian Kurland Technical Report No. 18 ON THE COGNITIVE PREREQUISITES OF LEARNING COMPUTER PROGRAMMING* Roy D. Pea and D. Midian Kurland Introduction Training in computer literacy of some form, much of which will consist of training in computer programming, is likely to involve $3 billion of the $14 billion to be spent on personal computers by 1986 (Harmon, 1983). Who will do the training? "hardware and software manu- facturers, management consultants, -retailers, independent computer instruction centers, corporations' in-house training programs, public and private schools and universities, and a variety of consultants1' (ibid.,- p. 27). To date, very little is known about what one needs to know in order to learn to program, and the ways in which edu- cators might provide optimal learning conditions. The ultimate suc- cess of these vast training programs in programming--especially toward the goal of providing a basic computer programming compe- tency for all individuals--will depend to a great degree on an ade- quate understanding of the developmental psychology of programming skills, a field currently in its infancy. In the absence of such a theory, training will continue, guided--or to express it more aptly, misguided--by the tacit Volk theories1' of programming development that until now have served as the underpinnings of programming instruction. Our paper begins to explore the complex agenda of issues, promise, and problems that building a developmental science of programming entails. Microcomputer Use in Schools The National Center for Education Statistics has recently released figures revealing that the use of micros in schools tripled from Fall 1980 to Spring 1983.
    [Show full text]
  • Should C Replace FORTRAN As the Language of Scientific Programming?
    Should C Replace FORTRAN as the Language of Scientific Programming? Linda Wharton CSCI 5535 Fall 1995 Abstract Anti-FORTRAN sentiment has recently become more prevalent. Where does the attitude originate? The most probable source is academia, where C and C++ are the languages of choice. Is there a fact based justification for the attitude? FORTRAN and C are evaluated to determine whether C is a better language than FORTRAN for scientific programming. The features of FORTRAN 77, FORTRAN 90, C and C++ are compared, and evaluated as to how well they meet the requirements of the scientific programming domain. FORTRAN was designed specifically for numerical programming, and thus better meets the requirements. Three algorithms in the scientific domain are coded in both FORTRAN and C. They are evaluated on performance, readability of the code and optimization potential. In all cases the FORTRAN implementations proved superior. Is there evidence to mandate that all upgrades and new development should be done in C, rather than FORTRAN? A good computer programmer can solve any given problem in any language, however it is best to code in the language specifically designed for the problem domain. In the case of scientific programming, that language is FORTRAN. 1 Introduction In the computer arena related to scientific programming, a prevalent attitude seems to be that FORTRAN is obsolete, and C should be used as a replacement language. I am employed as a programmer that supports meteorological research. Most of the programming code I work with is written in FORTRAN. Within the course of my work, I continually encounter prejudice against FORTRAN.
    [Show full text]
  • Is Intermediate-Level Conversation the Key to the Pair Programming Success Story?
    ‘Talking the talk’: Is intermediate-level conversation the key to the pair programming success story? S. Freudenberg (née Bryant), P. Romero, B. du Boulay IDEAS Laboratory, University of Sussex [email protected] Abstract One possible method of taming the complexity of software development may be to work collaboratively. Pair programming claims to provide benefits over In fact, one form of collaborative programming has and above those offered by a programmer working now been formalised as ‘pair programming’, one of the alone. In particular, a number of studies have core practices of the Extreme Programming (XP) suggested that pair programming improves software methodology. In pair programming, “all production quality. The literature speculates that the ‘driver’ (the code is written with two people working at one programmer currently typing in the code) and machine, with one keyboard and one mouse” (Beck, ‘navigator’ work together in a complimentary manner, 2000). and that the nature of these roles may be key in A wide range of studies have considered the realizing the reported benefits. Here we dispute two of benefits of pair programming in terms of its effect on these existing claims: (i) That the navigator providing the quality of the resulting software. These studies a ‘continual review’ of the drivers work and have taken place in both academic and commercial highlighting errors (i.e. acting as a reviewer); (ii) That environments. In the commercial arena two studies are the navigator is focused on a higher level of particularly note-worthy: Nosek (1998), who showed abstraction that the driver (i.e. acting as a foreman).
    [Show full text]
  • A Language and System for Composing Autonomous, Heterogeneous and Distributed Megamodules
    A Language and System for Composing Autonomous, Heterogeneous and Distributed Megamodules Dorothea Beringer, Catherine Tornabene, Pankaj Jain, Gio Wiederhold Stanford University, Computer Science Departement, Stanford, CA 94306, USA {beringer, catherin, pjain, gio}@db.stanford.edu Abstract characteristics: The components and the client program using these components are written in the same language, New levels of software composition become possible or at least in languages on the same abstraction level. The through advances in distributed communication services. components are operated and maintained together with the In this paper we focus on the composition of megamodules, application using them. Also, the components are often which are large distributed components or computation created together, and they form a coherent library. The servers that are autonomously operated and maintained. application and the components share a common ontology The composition of megamodules offers various and computing infrastructure. In case of distributed challenges. Megamodules are not necessarily all components, one common distribution system is used, e.g. accessible by the same distribution protocol (such as either DCE [2], CORBA [3], RMI [4], or DCOM [5]. CORBA, DCOM, RMI and DCE). Their concurrent nature and potentially long duration of service execution Megamodules differ from these kind of components in necessitates asynchronous invocation and collection of various aspects. Since they are larger, and marketed as results. Novel needs and opportunities for optimization services by autonomous providers, we must assume that arise when composing megamodules. In order to meet megamodules not only encapsulate data and procedures, these challenges, we have defined a purely compositional they encapsulate data, behavior, knowledge, concurrency language called CHAIMS, and are now developing the and ontology [6].
    [Show full text]
  • A Little Language for Testing
    A Little Language for Testing Alex Groce and Jervis Pinto School of Electrical Engineering and Computer Science Oregon State University, Corvallis, OR Abstract. The difficulty of writing test harnesses is a major obstacle to the adoption of automated testing and model checking. Languages designed for harness definition are usually tied to a particular tool and unfamiliar to programmers; moreover, such languages can limit expres- siveness. Writing a harness directly in the language of the software under test (SUT) makes it hard to change testing algorithms, offers no support for the common testing idioms, and tends to produce repetitive, hard- to-read code. This makes harness generation a natural fit for the use of an unusual kind of domain-specific language (DSL). This paper defines a template scripting testing language, TSTL, and shows how it can be used to produce succinct, readable definitions of state spaces. The concepts underlying TSTL are demonstrated in Python but are not tied to it. 1 Introduction Building a test harness is an often irksome task many users of formal methods or automated testing face from time to time [18,12]. The difficulty of harness gen- eration is one reason for the limited adoption of sophisticated testing and model checking by the typical developer who writes unit tests. This is unfortunate, as even simple random testing can often uncover subtle faults. The \natural" way to write a test harness is as code in the language of the Software Under Test (SUT). This is obviously how most unit tests are written, as witnessed by the proliferation of tools like JUnit [3] and its imitators (e.g., PyUnit, HUnit, etc.).
    [Show full text]
  • XP: Taking the Psychology of Programming to the Extreme
    In E. Dunican & T.R.G. Green (Eds). Proc. PPIG 16 Pages 121-132 XP: Taking the psychology of programming to the eXtreme Sallyann Bryant IDEAS Laboratory University of Sussex [email protected] Keywords: Extreme Programming, XP, pair programming, metaphor, external representation Abstract Extreme Programming (XP) is a software development methodology which is growing in popularity and commercial use. Despite a number of published experience reports and a small number of studies, predominantly in an academic environment, our knowledge about how and why some aspects of it work is still in its infancy. One major limitation of many of these studies is a failure to question why the practices of XP appear to work or fail. This paper reviews the research on Extreme Programming and suggests further work is required in order to ascertain how these practices fit into the framework of existing knowledge on the psychological aspects of programming. Introduction Much progress has been made in terms of our knowledge and understanding of the manner in which computer systems are both produced and used. Studies of subjects ranging from the use of metaphor in user interface design (Marcus, 1997) to the implications of collaborative systems (Crabtree, 2003) and from debugging Java programs (Romero et al. 2002) to using external representations in systems design (Petre, 2003) have allowed researchers to start to uncover the psychological aspects and processes underlying our behaviours when working on or with IT. Relatively recently, Extreme Programming has been introduced as a new way of approaching the production of software. Extreme Programming is a form of ‘agile development’, defined by the Agile Alliance Manifesto (2004) as valuing: Individuals and interactions over processes and tools Working software over comprehensive documentation Customer collaboration over contract negotiation Responding to change over following a plan.
    [Show full text]
  • UC Irvine ICS Technical Reports
    UC Irvine ICS Technical Reports Title Domain engineering for software reuse Permalink https://escholarship.org/uc/item/2h12m682 Author Arango, Guillermo F. Publication Date 1988 Peer reviewed eScholarship.org Powered by the California Digital Library University of California RTP086 UNIVERSITY OF CALIFORNIA Irvine Domain Engineering for Software Reuse Technical Report 88-27 A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Information and Computer Science by Guillermo F. Arango -~' -~ r'"~·. Notice: This Material Committee in charge: may be protected. Professor Peter Freeman, Chair by Copyright Law Professor Richard Selby (Title 17 U.S.C.) Professor Peter Woodruff 1988 @1988 GUILLERMO F. ARANGO ALL RIGHTS RESERVED Contents 1 Introduction 1 1.1 Background-reusable software engineering 1 1.2 The technological components of reuse . 3 1.3 Problem definition . 4 1. 3 .1 The domain engineering process 4 1.3.2 Practical domain analysis 5 1.4 Thesis ............. 6 1.5 Results . 8 1.6 Outline of the dissertation ... 10 2 A Context for Domain Analysis 13 2.1 An historical sketch . 13 2.2 Domain-specific reuse ..... 15 2.2.1 Power versus Generality . 15 2.2.2 Extensible languages .. .i6 2.2.3 Domain networks and local formalisms .. 17 2.3 Case studies in domain-specific reuse . 19 2.3.1 The development of the CORE graphics standard . 20 2.3.2 Draco--An application gene~ator generator . 20 2.3.3 "Little languages" and application generators . 21 2.3.4 Libraries of domain-specific components .... 22 2.3.5 Specification acquisition in KATE .
    [Show full text]
  • Semantic Component Composition
    Semantic Component Composition Joseph R. Kiniry Department of Computer Science California Institute of Technology Mailstop 256-80 Pasadena, CA 91125 [email protected] ABSTRACT General Terms Building complex software systems necessitates the use of specification languages, formal methods, kind theory, reuse, component-based architectures. In theory, of the set of com- glue-code generation, automatic programming, domain-specific ponents needed for a design, only some small portion of languages them are “custom”; the rest are reused or refactored existing pieces of software. Unfortunately, this is an idealized situ- 1. INTRODUCTION ation. Just because two components should work together Modern software systems are increasingly complicated. Com- does not mean that they will work together. bine new technologies, complex architectures, and incredi- ble amounts of legacy code, and you have systems that no The “glue” that holds components together is not just tech- one can even partially comprehend. As complexity rises, nology. The contracts that bind complex systems together code quality drops and system reliability suffers. implicitly define more than their explicit type. These “con- ceptual contracts” describe essential aspects of extra-system Building reliable complex systems necessitates the use of semantics: e.g., object models, type systems, data represen- excellent software engineering practices and tools. But even tation, interface action semantics, legal and contractual obli- with this bag of tricks, the modern software engineer is of- gations, and more. ten overwhelmed with the technological problems inherent in building such complex systems. Most projects have to Designers and developers spend inordinate amounts of time support multiple programming languages and models, deal technologically duct-taping systems to fulfill these concep- with several different architectures (both hardware and soft- tual contracts because system-wide semantics have not been ware), have distributed and concurrent subsystems, and must rigorously characterized or codified.
    [Show full text]
  • “Let COVID-19 Not Stop Learning”
    “Let COVID-19 Not Stop Learning” Name of the Department – PG Department of Computer Science Class – BCA 1 Section Teacher’s Subject Name of the Topic Web Link/ PDF Link/Any other Material Supplied Name A Prof. Fundamentals of Web Hosting https://www.slideshare.net/Cloudbells/web-hosting-cloudbellscom Sukhwinder Web Programming Java Script Events https://drive.google.com/open?id=1JUPZTYCpdEun- FrSQxHHkJvhZZk2jl-T Important question with answers https://drive.google.com/open?id=1aVRZHyqVacKzbfRzkYqZFqdn on HTML gS7trnko DHTML Short Question https://drive.google.com/open?id=1NWY14EMFfhtmQD2SzKFgWg m-n7GbqWqF Domain Name & Web Hosting https://drive.google.com/open?id=1B_PlqkVt8oX8bEI0tCiOOZG6Q Mh6rv2J Web Terminologies https://drive.google.com/open?id=19nUuwrELZe_7SGSOthpZqwGw Q1xTLvKt Previous year qus paper https://drive.google.com/open?id=14h35AJQuiameufKJi7Kl_BhBtD VPgNZu Web Designing qus ans https://drive.google.com/open?id=1ZMNsd55PCMstViki0U92EsPiO Jj-nEVW Revision Basic HTML https://youtu.be/x9bTBcron78 CSS https://youtu.be/3Fd11f00zOs Form Validation https://youtu.be/ROWiB4LNfYw A Prof. Aman C++ Polymorphism https://drive.google.com/file/d/1Ln5072SgcSimPyDZ4KmCYAu- f3bur2FG/view?usp=sharing Inheritance https://drive.google.com/file/d/1M3tHf9tWaUFZwukqdQIsfPXG240 yoPrl/view?usp=sharing https://drive.google.com/file/d/1M4Yon7XG9OzLlUsPXHrANXU3c mH5asJq/view?usp=sharing File Handling https://youtu.be/-hlASALk6gA File opening modes https://youtu.be/zh67WGJKKhE Default Arguments https://drive.google.com/file/d/1rFPHTgE11SbZ- qnnX7HrdD6NGU1i1491/view?usp=sharing Open() in Files C++ https://youtu.be/zh67WGJKKhE File Pointers https://youtu.be/iZnrqwWTyGw Exception Handling https://youtu.be/Lk4M_aEVk90 Operator Overloading https://youtu.be/qR-oCkHBBiw Revision Operator Overloading https://youtu.be/7pQEvX5F6jU A Prof. Navdeep Computer Flip Flops and their working https://drive.google.com/open?id=1MqCjWc7_X6Q1cxfxoEEPq3ru Organization AUeIoR7B Booth’s Algorithm https://www.youtube.com/watch?v=DIp4GqSCZho B Prof.
    [Show full text]
  • A Domain Analysis of Data Structure and Algorithm Explanations in the Wild
    A Domain Analysis of Data Structure and Algorithm Explanations in the Wild Jeffrey Young Eric Walkingshaw Oregon State University Oregon State University School of EECS School of EECS Corvallis, Oregon, USA Corvallis, Oregon, USA ABSTRACT figures. Explanation artifacts for algorithms are interesting because Explanations of data structures and algorithms are complex interac- they typically present a complex interaction among many different tions of several notations, including natural language, mathematics, notations, including natural language, mathematics, pseudocode, pseudocode, and diagrams. Currently, such explanations are cre- executable code, various kinds of diagrams, animations, and more. ated ad hoc using a variety of tools and the resulting artifacts are Currently, explanation artifacts for algorithms are created ad static, reducing explanatory value. We envision a domain-specific hoc using a variety of tools and techniques, and the resulting ex- language for developing rich, interactive explanations of data struc- planations tend to be static, reducing their explanatory value. Al- tures and algorithms. In this paper, we analyze this domain to though there has been a substantial amount of work on algorithm sketch requirements for our language. We perform a grounded the- visualization [8, 9, 11–13, 19], and tools exist for creating these ory analysis to generate a qualitative coding system for explanation kinds of supporting artifacts, there is no good solution for creat- artifacts collected online. This coding system implies a common ing integrated, multi-notational explanations as a whole. Similarly, structure among explanations of algorithms and data structures. although some algorithm visualization tools provide a means for We believe this structure can be reused as the semantic basis of the student to tweak the parameters or inputs to an algorithm to a domain-specific language for creating interactive explanation generate new visualizations, they do not support creating cohesive artifacts.
    [Show full text]