CS 314 Principles of Programming Languages Lecture 12
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Chapter 5 Names, Bindings, and Scopes
Chapter 5 Names, Bindings, and Scopes 5.1 Introduction 198 5.2 Names 199 5.3 Variables 200 5.4 The Concept of Binding 203 5.5 Scope 211 5.6 Scope and Lifetime 222 5.7 Referencing Environments 223 5.8 Named Constants 224 Summary • Review Questions • Problem Set • Programming Exercises 227 CMPS401 Class Notes (Chap05) Page 1 / 20 Dr. Kuo-pao Yang Chapter 5 Names, Bindings, and Scopes 5.1 Introduction 198 Imperative languages are abstractions of von Neumann architecture – Memory: stores both instructions and data – Processor: provides operations for modifying the contents of memory Variables are characterized by a collection of properties or attributes – The most important of which is type, a fundamental concept in programming languages – To design a type, must consider scope, lifetime, type checking, initialization, and type compatibility 5.2 Names 199 5.2.1 Design issues The following are the primary design issues for names: – Maximum length? – Are names case sensitive? – Are special words reserved words or keywords? 5.2.2 Name Forms A name is a string of characters used to identify some entity in a program. Length – If too short, they cannot be connotative – Language examples: . FORTRAN I: maximum 6 . COBOL: maximum 30 . C99: no limit but only the first 63 are significant; also, external names are limited to a maximum of 31 . C# and Java: no limit, and all characters are significant . C++: no limit, but implementers often impose a length limitation because they do not want the symbol table in which identifiers are stored during compilation to be too large and also to simplify the maintenance of that table. -
7. Functions in PHP – II
7. Functions in PHP – II Scope of variables in Function Scope of variable is the part of PHP script where the variable can be accessed or used. PHP supports three different scopes for a variable. These scopes are 1. Local 2. Global 3. Static A variable declared within the function has local scope. That means this variable is only used within the function body. This variable is not used outside the function. To demonstrate the concept, let us take an example. // local variable scope function localscope() { $var = 5; //local scope echo '<br> The value of $var inside the function is: '. $var; } localscope(); // call the function // using $var outside the function will generate an error echo '<br> The value of $var inside the function is: '. $var; The output will be: The value of $var inside the function is: 5 ( ! ) Notice: Undefined variable: var in H:\wamp\www\PathshalaWAD\function\function localscope demo.php on line 12 Call Stack # Time Memory Function Location 1 0.0003 240416 {main}( ) ..\function localscope demo.php:0 The value of $var inside the function is: Page 1 of 7 If a variable is defined outside of the function, then the variable scope is global. By default, a global scope variable is only available to code that runs at global level. That means, it is not available inside a function. Following example demonstrate it. <?php //variable scope is global $globalscope = 20; // local variable scope function localscope() { echo '<br> The value of global scope variable is :'.$globalscope; } localscope(); // call the function // using $var outside the function will generate an error echo '<br> The value of $globalscope outside the function is: '. -
Object Lifetimes In
Object Lifetimes in Tcl - Uses, Misuses, Limitations By Phil Brooks - Mentor – A Siemens Corporation Presented at the 25 nd annual Tcl/Tk conference, Houston Texas, November 2018 Mentor – A Siemens Corporation 8005 Boeckman Road Wilsonville, Oregon 97070 [email protected] Abstract: The management of the lifetime of an object in Tcl presents a number of unique challenges. In the C++ world, the technique of Resource Allocation is Initialization (RAII) is commonly used to control the lifetime of certain objects. With this technique, an object on the call stack is used to insure proper cleanup of a resource. When the object goes out of scope, the resource is released. It presents a low overhead mechanism for a garbage collection like facility without the complication of more complete garbage collection systems. Tcl doesn't have a similar direct capability, and the need for it has resulted in two techniques that are commonly used to substitute for the capability. The techniques are: 1) Use of the trace command to catch unset of a variable. 2) Mis-use of the lifetime of a Tcl_Obj created with Tcl_NewObj. Each of these techniques has drawbacks. The primary issue with the trace technique is that it requires the user of an object to arrange for explicit destruction of the object. This makes the interface more error prone. The mis-use of lifetime of a Tcl_Obj is subject to premature cleanup of the resource if the object is shimmered to a string for any reason. This paper surveys these lifetime management patterns and demonstrates the use of a new user level technique for lifetime management. -
Declare Function Inside a Function Python
Declare Function Inside A Function Python Transisthmian and praetorian Wye never ensphere helter-skelter when Shawn lord his nightshade. Larboard Hal rumors her dizziesacapnia very so encouragingly actinally. that Colbert aurifies very inferentially. Kenyan Tad reframes her botts so irefully that Etienne Closures prove to it efficient way something we took few functions in our code. Hope you have any mutable object. Calling Functions from Other Files Problem Solving with Python. What embassy your website look like? Then you can declare any result of a million developers have been loaded? The coach who asked this gas has marked it as solved. We focus group functions together can a Python module see modules and it this way lead our. What are Lambda Functions and How to Use Them? It working so art the result variable is only accessible inside the function in. Variables inside python node, learn more detail, regardless of instances of a program demonstrates it. The python function inside another, which start here, and beginners start out. Get code examples like python define a function within a function instantly right anytime your google search results with the Grepper Chrome. The function by replacing it contains one function start here are discussed: how do not provide extremely cost efficient as their name? How to the page helpful for case it requires you can declare python data science. Each item from the python function has arbitrary length arguments must first, but are only the output is simply the function to. We declare their perfomance varies with the gathered arguments using a wrapped the arguments does the computed fahrenheit to declare function inside a function python? List of python can declare a function inside a million other functions we declare function inside a function python. -
Constrained Polymorphic Types for a Calculus with Name Variables∗
Constrained Polymorphic Types for a Calculus with Name Variables∗ Davide Ancona1, Paola Giannini†2, and Elena Zucca3 1 DIBRIS, Università di Genova, via Dodecaneso 35, Genova, Italy [email protected] 2 DISIT, Università del Piemonte Orientale, via Teresa Michel 11, Alessandria, Italy [email protected] 3 DIBRIS, Università di Genova, via Dodecaneso 35, Genova, Italy [email protected] Abstract We extend the simply-typed lambda-calculus with a mechanism for dynamic rebinding of code based on parametric nominal interfaces. That is, we introduce values which represent single fragments, or families of named fragments, of open code, where free variables are associated with names which do not obey α-equivalence. In this way, code fragments can be passed as function arguments and manipulated, through their nominal interface, by operators such as rebinding, overriding and renaming. Moreover, by using name variables, it is possible to write terms which are parametric in their nominal interface and/or in the way it is adapted, greatly enhancing expressivity. However, in order to prevent conflicts when instantiating name variables, the name- polymorphic types of such terms need to be equipped with simple inequality constraints. We show soundness of the type system. 1998 ACM Subject Classification D.3.1 Programming Languages: Formal Definitions and The- ory, D.3.3 Programming Languages: Language Constructs and Features Keywords and phrases open code, incremental rebinding, name polymorphism, metaprogram- ming Digital Object Identifier 10.4230/LIPIcs.TYPES.2015.4 1 Introduction We propose an extension of the simply-typed lambda-calculus with a mechanism for dynamic and incremental rebinding of code based on parametric nominal interfaces. -
Chapter 5. Using Tcl/Tk
The Almagest 5-1 Chapter 5. Using Tcl/Tk Authors: Edward A. Lee Other Contributors: Brian L. Evans Wei-Jen Huang Alan Kamas Kennard White 5.1 Introduction Tcl is an interpreted “tool command language” designed by John Ousterhout while at UC Berkeley. Tk is an associated X window toolkit. Both have been integrated into Ptolemy. Parts of the graphical user interface and all of the textual interpreter ptcl are designed using them. Several of the stars in the standard star library also use Tcl/Tk. This chapter explains how to use the most basic of these stars, TclScript, as well how to design such stars from scratch. It is possible to define very sophisticated, totally customized user interfaces using this mechanism. In this chapter, we assume the reader is familiar with the Tcl language. Documentation is provided along with the Ptolemy distribution in the $PTOLEMY/tcltk/itcl/man direc- tory in Unix man page format. HTML format documentation is available from the other.src tar file in $PTOLEMY/src/tcltk. Up-to-date documentation and software releases are available by on the SunScript web page at http://www.sunscript.com. There is also a newsgroup called comp.lang.tcl. This news group accumulates a list of frequently asked questions about Tcl which is available http://www.teraform.com/%7Elvirden/tcl-faq/. The principal use of Tcl/Tk in Ptolemy is to customize the user interface. Stars can be created that interact with the user in specialized ways, by creating customized displays or by soliciting graphical inputs. 5.2 Writing Tcl/Tk scripts for the TclScript star Several of the domains in Ptolemy have a star called TclScript. -
Coding 101: Learn Ruby in 15 Minutes Visit
Coding 101: Learn Ruby in 15 minutes Visit www.makers.tech 1 Contents 2 Contents 10 Challenge 3 3 About us 11 Defining Methods 4 Installing Ruby 12 Challenge 4 4 Checking you’ve got Ruby 12 Challenge 5 5 Method calls 12 Challenge 6 5 Variables 13 Arrays 6 Truth and Falsehood 14 Hashes 7 Strings, objects and Methods 14 Challenge 7 8 Challenge 1 15 Iterations 8 Challenge 2 16 Challenge 8 9 Method Chaining 16 Challenge 9 10 Conditionals 18 Extra Challenges 2 About Us At Makers, we are creating a new generation of tech talent who are skilled and ready for the changing world of work. We are inspired by the idea of discovering and unlocking potential in people for the benefit of 21st century business and society. We believe in alternative ways to learn how to code, how to be ready for work and how to be of value to an organisation. At our core, Makers combines tech education with employment possibilities that transform lives. Our intensive four-month program (which includes a month-long PreCourse) sets you up to become a high quality professional software engineer. Makers is the only coding bootcamp with 5 years experience training software developers remotely. Your virtual experience will be exactly the same as Makers on-site, just delivered differently. If you’d like to learn more, check out www.makers.tech. 3 Installing Checking Ruby you’ve got Ruby You’ll be happy to know that Ruby comes preinstalled on all Apple computers. However we can’t simply use the system defaults - just in case we mess something up! Open the terminal on your computer and then type in If you’ve got your laptop set up already you can skip this section. -
4500/6500 Programming Languages Name, Binding and Scope Binding
Name, Binding and Scope !! A name is exactly what you think it is CSCI: 4500/6500 Programming »! Most names are identifiers Languages »! symbols (like '+') can also be names !! A binding is an association between two things, such as a name and the thing it names Names, Scopes (review) and Binding »! Example: the association of Reflecting on the Concepts –! values with identifiers !! The scope of a binding is the part of the program (textually) in which the binding is active 1 Maria Hybinette, UGA Maria Hybinette, UGA 2 Binding Time Bind Time: Language System View !! When the “binding” is created or, more !! language design time generally, the point at which any »! bind operator symbols (e.g., * + …) to operations implementation decision is made (multiplication, addition, …) »! Set of primitive types »! language design time »! language implementation time !! language implementation time »! bind data type, such as int in C to the range of »! program writing time possible values (determined by number of bits and »! compile time affect the precision) »! link time –! Considerations: arithmetic overflow, precision of fundamental type, coupling of I/O to the OS’ notion of »! load time files »! run time Maria Hybinette, UGA 3 Maria Hybinette, UGA 4 Bind Time: User View Bind Time: User View !! program writing time !! run time (dynamically) »! Programmers choose algorithms, data structures »! value/variable bindings, sizes of strings and names. »! subsumes !! compile time –! program start-up time »! plan for data layout (bind a variable to a data type in –! module entry time Java or C) –! elaboration time (point a which a declaration is first "seen") !! link time –! procedure entry time »! layout of whole program in memory (names of –! block entry time separate modules (libraries) are finalized. -
Function Components and Arguments Passing in Cpp
FUNCTION COMPONENTS AND ARGUMENTS PASSING IN CPP The General Form of a Function The general form of a function is ret-type function-name(parameter list) { body of the function } The ret-type specifies the type of data that the function returns.Afunction may return any type of data except an array. The parameter list is a comma-separated list of variable names and their associated types that receive the values of the arguments when the function is called.Afunction may be without parameters, in which case the parameter list is empty. However, even if there are no parameters, the parentheses are still required. In variable declarations, you can declare many variables to be of a common type by using a comma- separated list of variable names. In contrast, all function parameters must be declared individually, each including both the type and name. That is, the parameter declaration list for a function takes this general form: f(type varname1, type varname2, . , type varnameN) For example, here are correct and incorrect function parameter declarations: f(int i, int k, int j) /* correct */ f(int i, k, float j) /* incorrect */ Scope Rules of Functions The scope rules of a language are the rules that govern whether a piece of code knows about or has access to another piece of code or data. Each function is a discrete block of code. Afunction's code is private to that function and cannot be accessed by any statement in any other function except through a call to that function. (For instance, you cannot use goto to jump into the middle of another function.) The code that constitutes the body of a function is hidden from the rest of the program and, unless it uses global variables or data, it can neither affect nor be affected by other parts of the program. -
Naming Service Specification
Naming Service Specification Version 1.0 New edition - April 2000 Copyright 1996, AT&T/Lucent Technologies, Inc. Copyright 1995, 1996 AT&T/NCR Copyright 1995, 1996 BNR Europe Limited Copyright 1996, Cooperative Research Centre for Distributed Systems Technology (DSTC Pty Ltd). Copyright 1995, 1996 Digital Equipment Corporation Copyright 1996, Gradient Technologies, Inc. Copyright 1995, 1996 Groupe Bull Copyright 1995, 1996 Hewlett-Packard Company Copyright 1995, 1996 HyperDesk Corporation Copyright 1995, 1996 ICL plc Copyright 1995, 1996 Ing. C. Olivetti & C.Sp Copyright 1995, 1996 International Business Machines Corporation Copyright 1996, International Computers Limited Copyright 1995, 1996 Iona Technologies Ltd. Copyright 1995, 1996 Itasca Systems, Inc. Copyright 1996, Nortel Limited Copyright 1995, 1996 Novell, Inc. Copyright 1995, 1996 02 Technologies Copyright 1995, 1996 Object Design, Inc. Copyright 1999, Object Management Group, Inc. Copyright 1995, 1996 Objectivity, Inc. Copyright 1995, 1996 Ontos, Inc. Copyright 1995, 1996 Oracle Corporation Copyright 1995, 1996 Persistence Software Copyright 1995, 1996 Servio, Corp. Copyright 1995, 1996 Siemens Nixdorf Informationssysteme AG Copyright 1995, 1996 Sun Microsystems, Inc. Copyright 1995, 1996 SunSoft, Inc. Copyright 1996, Sybase, Inc. Copyright 1996, Taligent, Inc. Copyright 1995, 1996 Tandem Computers, Inc. Copyright 1995, 1996 Teknekron Software Systems, Inc. Copyright 1995, 1996 Tivoli Systems, Inc. Copyright 1995, 1996 Transarc Corporation Copyright 1995, 1996 Versant Object -
Subprograms: Local Variables
Subprograms: Local Variables ICS312 Machine-Level and Systems Programming Henri Casanova ([email protected]) Local Variables in Subprograms In all the examples we have seen so far, the subprograms were able to do their work using only registers But sometimes, a subprogram’s needs are beyond the set of available registers and some data must be kept in memory Just think of all subprograms you wrote that used more than 6 local variables (EAX, EBX, ECX, EDX, ESI, EDI) One possibility could be to declare a small .bss segment for each subprogram, to reserve memory space for all local variables Drawback #1: memory waste This reserved memory consumes memory space for the entire duration of the execution even if the subprogram is only active for a tiny fraction of the execution time (or never!) Drawback #2: subprograms are not reentrant Re-entrant subprogram A subprogram is active if it has been called but the RET instruction hasn’t been executed yet A subprogram is reentrant if it can be called from anywhere in the program This implies that the program can call itself, directly or indirectly, which enables recursion e.g., f calls g, which calls h, which calls f At a given time, two or more instances of a subprogram can be active Two or more activation records for this subprogram on the stack If we store the local variables of a subprogram in the .bss segment, then there can only be one activation! Otherwise activation #2 could corrupt the local variables of the activation #1 Therefore, with our current scheme for storing local -
A Language Generic Solution for Name Binding Preservation in Refactorings
A Language Generic Solution for Name Binding Preservation in Refactorings Maartje de Jonge Eelco Visser Delft University of Technology Delft University of Technology Delft, Netherlands Delft, Netherlands [email protected] [email protected] ABSTRACT particular problem, since these languages are often devel- The implementation of refactorings for new languages re- oped with fewer resources than general purpose languages. quires considerable effort from the language developer. We Language workbenches aim at reducing that effort by fa- aim at reducing that effort by using language generic tech- cilitating efficient development of IDE support for software niques. This paper focuses on behavior preservation, in languages [18]. Notable examples include MontiCore [27], particular the preservation of static name bindings. To de- EMFText [22], MPS [25], TMF [7], Xtext [14], and our own tect name binding violations, we implement a technique that Spoofax [26]. The Spoofax language workbench generates reuses the name analysis defined in the compiler front end. a complete implementation of an editor plugin with com- Some languages offer the possibility to access variables us- mon syntactic services based on the syntax definition of a ing qualified names. As a refinement to violation detection, language in SDF [35]. Services that require semantic analy- we show that name analysis can be defined as a reusable sis and/or transformation are implemented in the Stratego traversal strategy that can be applied to restore name bind- transformation language [12]. Especially challenging is the ings by creating qualified names. These techniques offer an implementation of refactorings, which are transformations efficient and reliable solution; the semantics of the language that improve the internal structure of a program while pre- is implemented only once, with the compiler being the single serving its behavior.