Pharocheatsheet.Pdf2018-03-14 08:22554 KB

Total Page:16

File Type:pdf, Size:1020Kb

Pharocheatsheet.Pdf2018-03-14 08:22554 KB Files AND StrEAMS • The METHODS PANE LISTS THE METHODS OF THE SELECTED PRotocol; ICONS ARE CLICKABLE AND TRIGGER SPECIAL actions; WORK := FileSystem DISK workingDirECTORY. • The SOURCE CODE PANE SHOWS THE SOURCE CODE OF THE SELECTED STREAM := (work / ’foo.txt’) writeStream. method. STREAM NExtPutAll: ’Hello WORLD’. STREAM close. DefiNING A CLASS STREAM := (work / ’foo.txt’) ReadStream. TO ADD A CLASS OR EDIT A class, EDIT THE PROPOSED template! STREAM contents. ’Hello WORLD’ An INNOvative, open-sourCE Smalltalk-inspirED The FOLLOWING EXPRESSION DEfiNES THE CLASS Counter AS A sub- STREAM close. CLASS OF Object. IT DEfiNES TWO INSTANCE VARIABLES count AND LANGUAGE AND SYSTEM FOR LIVE PROGRAMMING initialValue INSIDE THE PACKAGE MyCounter. Pharo: A Live PrOGRAMMING EnvirONMENT Object subclass: #Counter http://www.pharo.orG instanceVariableNames: ’count initialValue’ PharO COMES WITH AN INTEGRATED DEVELOPMENT ENVIRonment. classVariableNames: ’’ PharO IS BOTH AN object-oriented, dynamically-typed GENERal- PharO IS A LIVE PROGRAMMING ENVIRONMENT: YOU CAN MODIFY YOUR package: ’MyCounter’ PURPOSE LANGUAGE AND ITS OWN PROGRAMMING ENVIRonment. The OBJECTS AND YOUR CODE WHILE YOUR PROGRAM IS EXecuting. All The METHOD initialize IS AUTOMATICALLY INVOKED WHEN A NEW LANGUAGE HAS A SIMPLE AND EXPRESSIVE SYNTAX WHICH CAN BE PharO TOOLS ARE IMPLEMENTED IN Pharo: INSTANCE IS CREATED BY SENDING THE MESSAGE new TO THE CLASS i.e., LEARNED IN A FEW minutes. Concepts IN PharO ARE VERY CONSISTENT: Counter new . • Everything IS AN object: buttons, colors, ARRays, numbers, • A CODE BROWSER WITH Refactorings; Counter >> initialize • A debugger, A workspace, AND inspectors; super initialize. classes, methods. Everything! • THE COMPILER ITSELF AND much, MUCH MORe. count := 0. • A SMALL NUMBER OF rules, NO EXceptions! Code CAN BE INSPECTED AND EVALUATED DIRECTLY IN THE image, Counter >> initialize IS A NOTATION TO INDICATE THAT THE Main WEB Sites USING SIMPLE KEY COMBINATIONS AND MENUS (open THE CONTEXTUAL FOLLOWING TEXT IS THE CONTENT OF THE METHOD initialize IN THE MENU ON ANY SELECTED TEXT TO SEE AVAILABLE options). CLASS Counter. Code HOSTING http://smalltalkhub.com Questions http://discord.gg/Sj2rhxn Methods Blog http://pharOWEEKLY.worDPRess.com The 5 Panes PharO Code BrOWSER Methods ARE PUBLIC AND virtual. TheY ARE ALWAYS LOOKED UP IN THE Contributors http://pharo.org/about CLASS OF THE Receiver. By DEFAULT A METHOD RETURNS self. Class TOPICS http://topics.pharo.orG METHODS FOLLOW THE SAME DYNAMIC LOOKUP AS INSTANCE methods. Consortium http://consortium.pharo.orG Methods factorial Packages Classes Protocols Method DEfiNED IN CLASS Integer. Association http://association.pharo.orG Integer >> factorial "Answer the factorial of the receiver." PharoBooks self = 0 ifTrue: [^ 1]. PharO BOOKS ARE AVAILABLE at: http://books.pharo.orG self > 0 ifTrue: [^ self * (self - 1) factorial]. PharO By Example, Deep INTO Pharo, Enterprise Pharo: A WEB Unit TESTING Perspective, Numerical Methods IN Pharo, TinyBlog Tutorial, Code pane Dynamic WEB DeVELOPMENT IN Seaside (http://book.seaside.st) A TEST MUST BE IMPLEMENTED IN A METHOD WHOSE NAME STARTS WITH test AND IN A CLASS THAT INHERITS FROM TestCase. MorE BOOKS http://stephane.ducasse.free.fr/FreeBooks OrderedCollectionTest >> testAdd | added| Minimal Syntax • The PACKAGES PANE SHOWS ALL THE PACKAGES OF THE system. added := collection add: ’foo’. • The CLASSES PANE SHOWS THE CLASS HIERARCHY OF THE SELECTED self assert: (collection includes: ’foo’). Six RESERVED WORDS ONLY package; THE CLASS SIDE CHECKBOX ALLOWS FOR GETTING THE meth- The SECOND LINE DECLARES THE VARIABLE added. The MESSAGE nil THE UNDEfiNED OBJECT ODS OF THE metaclass. assert: EXPECTS A TRUE value. true,false THE BOOLEAN OBJECTS • The PROTOCOLS PANE GROUPS THE METHODS OF THE SELECTED CLASS self THE RECEIVER OF THE CURRENT MESSAGE TO EASE navigation. When A PROTOCOL NAME STARTS WITH A *, super THE RECEIVER BUT FOR ACCESSING OVERRIDDEN METHODS OF THIS PROTOCOL BELONG TO A DIffERENT PACKAGE (e.g., A simple, UNIFORM AND POWERFUL MODEL METHODS THE *Fuel PROTOCOL GROUPS METHODS THAT BELONG TO THE Fuel PharO HAS A SIMPLE dynamically-typed OBJECT model: thisContext THE CURRENT METHOD OR BLOCK ACTIVATION package); ..................................................................................................................................................................... ..................................................................................................................................................................... ..................................................................................................................................................................... 2=2 Minimal Syntax (II) 3+4 7 FROM ) WITH A BLOCK AS ARgument. Because THE BOOLEAN IS true ’Hello’ , ’ WORLD’ ’Hello WORLD’ , THE BLOCK IS EXECUTED AND AN EXCEPTION IS signaled. Object CONSTRUCTORS & RESERVED SYNTACTIC CONSTRUCTS #(’Hello World’ $!) + 3 4 "COMMENT" The MESSAGE IS SENT TO THE OBJECT WITH AS ARgument. do: [ :e| Transcript show:e] ’Hello’ , ’STRING’ SEQUENCE OF CHARACTERS The STRING RECEIVES THE MESSAGE (comma) WITH do: ’ World’ Send THE MESSAGE TO AN ARRAY. This EXECUTES THE BLOCK #symbol UNIQUE STRING AS THE ARgument. ONCE FOR EACH element, PASSING IT VIA THE e PARameter. As A $a, CharACTER SPACE TWO WAYS TO CREATE CHARACTERS A KEYWORD MESSAGE CAN TAKE ONE OR MORE ARGUMENTS THAT ARE Result, Hello World! IS printed. 12 2r1100 16rC TWELVE (decimal, BINARY, HExa) INSERTED IN THE MESSAGE name. 3.14 1.2e3 floating-point NUMBERS Common Constructs #(abc 123) LITERAL ARRAY WITH THE SYMBOL ’PharO’ allButFirst:2. ’ARO’ #abc AND THE NUMBER 123 [ :x | X + 2 ] value: 7 9 Conditionals {foo.3+2} DYNAMIC ARRAY BUILT FROM 2 Ex- 3 to: 10 By:2. (3 to: 10 By: 2) CONDITION IF (condition) PRESSIONS The SECOND LINE EXECUTES A block. The THIRD EXAMPLE SENDS ifTrue: [ ACTION ] { action(); } #[123 21 255] BYTE ARRAY to:by: TO 3, WITH ARGUMENTS 10 AND 2; THIS RETURNS AN INTERVAL ifFalse: [ anotherAction ] ELSE { anotherAction(); } | foo bar| DECLARATION OF TWO TEMPORARY CONTAINING 3, 5, 7, AND 9. [ CONDITION ] whileTrue: WHILE (condition) { action(); VARIABLES Message PrECEDENCE [ action. anotherAction ] anotherAction(); } var := expr ASSIGNMENT exp1. exp2 > > > PERIOD - STATEMENT SEPARATOR ParENTHESES UNARY BINARY KEYWORd, AND fiNALLY FROM LEFT Loops/ITERATORS ; SEMICOLON - MESSAGE CASCADE TO right. 1 to: 11 do: [ :i | for(int i=1; i<11; i++){ [:p| EXPR ] CODE BLOCK WITH A PARAMETER (15 between:1 and:2+4*3) NOT FALSE TRANSCRIPT SHOw: I ; CR ] System.out.println(i); } <unary> METHOD ANNOTATION <key:’any’ wrd:#lit > WITH ANY LITERAL ARGUMENTS Messages + AND * ARE SENT first, THEN between:and: IS sent, | NAMES | String [] NAMES ={"A", "B", "C"}; ^ expr CARET - Return/answer A RESULT AND not. The RULE SUffERS NO EXception: OPERATORS ARE JUST NAMES := #(’A’’B’’C’). for( String NAME : NAMES ) { FROM A METHOD BINARY MESSAGES WITH NO NOTION OF MATHEMATICAL PRECEDENCE. NAMES do: [ :each | System.out.print( NAME ); 2+4*3 READS left-to-right AND GIVES 18, NOT 14! TRANSCRIPT SHOw: each, ’ , ’ ] System.out.print(","); } Message Sending aCol at:i Cascade: Sending Muliple Messages TO THE Same Object Collections START AT 1. ACCESSES ELEMENT AT I AND aCol at:i put:value i value When WE SEND A MESSAGE TO AN OBJECT (the RECEIVER), THE cor- SETS ELEMENT AT TO . Using ; (a cascade) MULTIPLE MESSAGES ARE SENT TO THE RESULT OF RESPONDING METHOD IS SELECTED AND EXecuted, AND THE METHOD THE SAME EXPRession. HerE ; ARRIVES AFTER Add: 1, SO MESSAGES Collections ANSWERS AN object. Message SYNTAX MIMICS NATURAL languages, add: 2 AND add: 3 ARE SENT TO add: 1’S Receiver: A collection. WITH A subject, A verb, AND complements. OrderedCollection new #(4 2 1) at: 3 1 add:1; #(4 2 1) COPY at: 3 put: 6 #(4 2 6) PharO Java add:2; {4 . 2 . 1} at: 3 put: 6 #(4 2 6) add:3. aColor r: 0.2 g: 0.3 b: 0 aColor.setRGB(0.2,0.3,0) (ArrAY NEw: 2) add: 4; add: 2 ; YOURSELF #(4 2) D at: ’1’ put: ’Chocolate’. d.put("1", "Chocolate"); The WHOLE MESSAGE CASCADE VALUE IS THE VALUE OF THE LAST mes- Set NEW add: 4; add: 4 ; YOURSELF aSet(4) SAGE SENT (HERE 3). TO RETURN THE RECEIVER OF THE MESSAGE cas- Dictionary NEW ThrEE TYPES OF Messages: Unary, Binary, AND KeYWORD yourself CADE INSTEAD (i.e., THE collection), SEND AS THE LAST at: #a put: ’Alpha’ ; YOURSELF A Dictionary(#a- A UNARY MESSAGE HAS NO ARguments. MESSAGE OF THE cascade. >’Alpha’) Blocks ArrAY NEW. anArrAY #(4 2 1) size. 3 Blocks ARE OBJECTS CONTAINING CODE THAT IS EXECUTED ON demand. new TheY ARE THE BASIS FOR CONTROL STRUCTURes: CONDITIONALS & loops. IS AN UNARY MESSAGE SENT TO CLASSES (classes ARE objects). 2=2 A BINARY MESSAGE TAKES ONLY ONE ARGUMENT AND IS NAMED BY ifTrue: [ Error signal: ’Help’]. + - * = < > ONE OR MORE SYMBOL CHARACTERS FROM , , , , , , ... Send THE MESSAGE ifTrue: TO THE BOOLEAN true (computed ..................................................................................................................................................................... ..................................................................................................................................................................... ......................................................................................................................................................................
Recommended publications
  • CS 61A Streams Summer 2019 1 Streams
    CS 61A Streams Summer 2019 Discussion 10: August 6, 2019 1 Streams In Python, we can use iterators to represent infinite sequences (for example, the generator for all natural numbers). However, Scheme does not support iterators. Let's see what happens when we try to use a Scheme list to represent an infinite sequence of natural numbers: scm> (define (naturals n) (cons n (naturals (+ n 1)))) naturals scm> (naturals 0) Error: maximum recursion depth exceeded Because cons is a regular procedure and both its operands must be evaluted before the pair is constructed, we cannot create an infinite sequence of integers using a Scheme list. Instead, our Scheme interpreter supports streams, which are lazy Scheme lists. The first element is represented explicitly, but the rest of the stream's elements are computed only when needed. Computing a value only when it's needed is also known as lazy evaluation. scm> (define (naturals n) (cons-stream n (naturals (+ n 1)))) naturals scm> (define nat (naturals 0)) nat scm> (car nat) 0 scm> (cdr nat) #[promise (not forced)] scm> (car (cdr-stream nat)) 1 scm> (car (cdr-stream (cdr-stream nat))) 2 We use the special form cons-stream to create a stream: (cons-stream <operand1> <operand2>) cons-stream is a special form because the second operand is not evaluated when evaluating the expression. To evaluate this expression, Scheme does the following: 1. Evaluate the first operand. 2. Construct a promise containing the second operand. 3. Return a pair containing the value of the first operand and the promise. 2 Streams To actually get the rest of the stream, we must call cdr-stream on it to force the promise to be evaluated.
    [Show full text]
  • Chapter 2 Basics of Scanning And
    Chapter 2 Basics of Scanning and Conventional Programming in Java In this chapter, we will introduce you to an initial set of Java features, the equivalent of which you should have seen in your CS-1 class; the separation of problem, representation, algorithm and program – four concepts you have probably seen in your CS-1 class; style rules with which you are probably familiar, and scanning - a general class of problems we see in both computer science and other fields. Each chapter is associated with an animating recorded PowerPoint presentation and a YouTube video created from the presentation. It is meant to be a transcript of the associated presentation that contains little graphics and thus can be read even on a small device. You should refer to the associated material if you feel the need for a different instruction medium. Also associated with each chapter is hyperlinked code examples presented here. References to previously presented code modules are links that can be traversed to remind you of the details. The resources for this chapter are: PowerPoint Presentation YouTube Video Code Examples Algorithms and Representation Four concepts we explicitly or implicitly encounter while programming are problems, representations, algorithms and programs. Programs, of course, are instructions executed by the computer. Problems are what we try to solve when we write programs. Usually we do not go directly from problems to programs. Two intermediate steps are creating algorithms and identifying representations. Algorithms are sequences of steps to solve problems. So are programs. Thus, all programs are algorithms but the reverse is not true.
    [Show full text]
  • File I/O Stream Byte Stream
    File I/O In Java, we can read data from files and also write data in files. We do this using streams. Java has many input and output streams that are used to read and write data. Same as a continuous flow of water is called water stream, in the same way input and output flow of data is called stream. Stream Java provides many input and output stream classes which are used to read and write. Streams are of two types. Byte Stream Character Stream Let's look at the two streams one by one. Byte Stream It is used in the input and output of byte. We do this with the help of different Byte stream classes. Two most commonly used Byte stream classes are FileInputStream and FileOutputStream. Some of the Byte stream classes are listed below. Byte Stream Description BufferedInputStream handles buffered input stream BufferedOutputStrea handles buffered output stream m FileInputStream used to read from a file FileOutputStream used to write to a file InputStream Abstract class that describe input stream OutputStream Abstract class that describe output stream Byte Stream Classes are in divided in two groups - InputStream Classes - These classes are subclasses of an abstract class, InputStream and they are used to read bytes from a source(file, memory or console). OutputStream Classes - These classes are subclasses of an abstract class, OutputStream and they are used to write bytes to a destination(file, memory or console). InputStream InputStream class is a base class of all the classes that are used to read bytes from a file, memory or console.
    [Show full text]
  • C++ Input/Output: Streams 4
    C++ Input/Output: Streams 4. Input/Output 1 The basic data type for I/O in C++ is the stream. C++ incorporates a complex hierarchy of stream types. The most basic stream types are the standard input/output streams: istream cin built-in input stream variable; by default hooked to keyboard ostream cout built-in output stream variable; by default hooked to console header file: <iostream> C++ also supports all the input/output mechanisms that the C language included. However, C++ streams provide all the input/output capabilities of C, with substantial improvements. We will exclusively use streams for input and output of data. Computer Science Dept Va Tech August, 2001 Intro Programming in C++ ©1995-2001 Barnette ND & McQuain WD C++ Streams are Objects 4. Input/Output 2 The input and output streams, cin and cout are actually C++ objects. Briefly: class: a C++ construct that allows a collection of variables, constants, and functions to be grouped together logically under a single name object: a variable of a type that is a class (also often called an instance of the class) For example, istream is actually a type name for a class. cin is the name of a variable of type istream. So, we would say that cin is an instance or an object of the class istream. An instance of a class will usually have a number of associated functions (called member functions) that you can use to perform operations on that object or to obtain information about it. The following slides will present a few of the basic stream member functions, and show how to go about using member functions.
    [Show full text]
  • Subtyping, Declaratively an Exercise in Mixed Induction and Coinduction
    Subtyping, Declaratively An Exercise in Mixed Induction and Coinduction Nils Anders Danielsson and Thorsten Altenkirch University of Nottingham Abstract. It is natural to present subtyping for recursive types coin- ductively. However, Gapeyev, Levin and Pierce have noted that there is a problem with coinductive definitions of non-trivial transitive inference systems: they cannot be \declarative"|as opposed to \algorithmic" or syntax-directed|because coinductive inference systems with an explicit rule of transitivity are trivial. We propose a solution to this problem. By using mixed induction and coinduction we define an inference system for subtyping which combines the advantages of coinduction with the convenience of an explicit rule of transitivity. The definition uses coinduction for the structural rules, and induction for the rule of transitivity. We also discuss under what condi- tions this technique can be used when defining other inference systems. The developments presented in the paper have been mechanised using Agda, a dependently typed programming language and proof assistant. 1 Introduction Coinduction and corecursion are useful techniques for defining and reasoning about things which are potentially infinite, including streams and other (poten- tially) infinite data types (Coquand 1994; Gim´enez1996; Turner 2004), process congruences (Milner 1990), congruences for functional programs (Gordon 1999), closures (Milner and Tofte 1991), semantics for divergence of programs (Cousot and Cousot 1992; Hughes and Moran 1995; Leroy and Grall 2009; Nakata and Uustalu 2009), and subtyping relations for recursive types (Brandt and Henglein 1998; Gapeyev et al. 2002). However, the use of coinduction can lead to values which are \too infinite”. For instance, a non-trivial binary relation defined as a coinductive inference sys- tem cannot include the rule of transitivity, because a coinductive reading of transitivity would imply that every element is related to every other (to see this, build an infinite derivation consisting solely of uses of transitivity).
    [Show full text]
  • Data-Trace Types for Distributed Stream Processing Systems
    Data-Trace Types for Distributed Stream Processing Systems Konstantinos Mamouras Caleb Stanford Rajeev Alur Rice University, USA University of Pennsylvania, USA University of Pennsylvania, USA [email protected] [email protected] [email protected] Zachary G. Ives Val Tannen University of Pennsylvania, USA University of Pennsylvania, USA [email protected] [email protected] Abstract guaranteeing correct deployment, and (2) the throughput of Distributed architectures for efficient processing of stream- the automatically compiled distributed code is comparable ing data are increasingly critical to modern information pro- to that of hand-crafted distributed implementations. cessing systems. The goal of this paper is to develop type- CCS Concepts • Information systems → Data streams; based programming abstractions that facilitate correct and Stream management; • Theory of computation → Stream- efficient deployment of a logical specification of the desired ing models; • Software and its engineering → General computation on such architectures. In the proposed model, programming languages. each communication link has an associated type specifying tagged data items along with a dependency relation over tags Keywords distributed data stream processing, types that captures the logical partial ordering constraints over data items. The semantics of a (distributed) stream process- ACM Reference Format: ing system is then a function from input data traces to output Konstantinos Mamouras, Caleb Stanford, Rajeev Alur, Zachary data traces, where a data trace is an equivalence class of se- G. Ives, and Val Tannen. 2019. Data-Trace Types for Distributed quences of data items induced by the dependency relation. Stream Processing Systems. In Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation This data-trace transduction model generalizes both acyclic (PLDI ’19), June 22–26, 2019, Phoenix, AZ, USA.
    [Show full text]
  • Stream Computing Based Synchrophasor Application for Power Grids
    Stream Computing Based Synchrophasor Application For Power Grids Jagabondhu Hazra Kaushik Das Deva P. Seetharam IBM Research, India IBM Research, India IBM Research, India [email protected] [email protected] [email protected] Amith Singhee IBM T J Watson Research Center, USA [email protected] ABSTRACT grid monitoring to identify and deal with faults before they develop This paper proposes an application of stream computing analytics into wide-spread disturbances. framework to high speed synchrophasor data for real time moni- In recent years, electric grids are undergoing dramatic changes toring and control of electric grid. High volume streaming syn- in the area of grid monitoring and control. Key factors behind chrophasor data from geographically distributed grid sensors (namely, such transformation includes tremendous progress in the areas of Phasor Measurement Units) are collected, synchronized, aggregated power electronics, sensing, control, computation and communi- when required and analyzed using a stream computing platform to cation technologies. For instant, conventional sensors (e.g. Re- estimate the grid stability in real time. This real time stability mon- mote Terminal Units) provide one measurement or sample per 4- itoring scheme will help the grid operators to take preventive or 10 seconds whereas new sensors like Phasor Measurement Units corrective measures ahead of time to mitigate any disturbance be- (PMUs) could provide upto 120 measurements or samples per sec- fore they develop into wide-spread. A protptype of the scheme is ond. Moreover, PMUs provide more precise measurements with demonstrated on a benchmark 3 machines 9 bus system and the time stamp having microsecond accuracy [2].
    [Show full text]
  • Preprocessing C++ : Meta-Class Aspects
    Preprocessing C++ : Meta-Class Aspects Edward D. Willink Racal Research Limited, Worton Drive, Reading, England +44 118 923 8278 [email protected] Vyacheslav B. Muchnick Department of Computing, University of Surrey, Guildford, England +44 1483 300800 x2206 [email protected] ABSTRACT C++ satisfies the previously conflicting goals of Object-Orientation and run-time efficiency within an industrial strength language. Run-time efficiency is achieved by ignoring the meta-level aspects of Object-Orientation. In a companion paper [15] we show how extensions that replace the traditional preprocessor lexical substitution by an Object-Oriented meta-level substitution fit naturally into C++. In this paper, we place those extensions in the context of a compile-time meta-level, in which application meta-programs can execute to browse, check or create program declarations. An extended example identifies the marshalling aspect as a programming concern that can be fully separated and automatically generated by an application meta-program. Keywords Object-Oriented Language; Preprocessor; C++; Meta-Level; Composition; Weaving; Aspect-Oriented Programming; Pattern Implementation 1 INTRODUCTION Prior to C++, Object Orientation, as exemplified by Smalltalk, was perceived to be inherently inefficient because of the run-time costs associated with message dispatch. C++ introduced a more restrictive Object Model that enabled most of the run-time costs to be resolved by compile-time computation. As a result Object Orientation in C++ is efficient and widely used. C++ requires that the layout of objects be frozen at compile-time, and that the type of the recipient of any message is known. The layout constraint enables a single contiguous memory allocation for each object.
    [Show full text]
  • Stream Fusion from Lists to Streams to Nothing at All
    Stream Fusion From Lists to Streams to Nothing at All Duncan Coutts1 Roman Leshchinskiy2 Don Stewart2 1 Programming Tools Group 2 Computer Science & Engineering Oxford University Computing Laboratory University of New South Wales [email protected] {rl,dons}@cse.unsw.edu.au Abstract No previously implemented short-cut fusion system eliminates all This paper presents an automatic deforestation system, stream fu- the lists in this example. The fusion system presented in this paper sion, based on equational transformations, that fuses a wider range does. With this system, the Glasgow Haskell Compiler (The GHC Team 2007) applies all the fusion transformations and is able to of functions than existing short-cut fusion systems. In particular, 0 stream fusion is able to fuse zips, left folds and functions over generate an efficient “worker” function f that uses only unboxed nested lists, including list comprehensions. A distinguishing fea- integers (Int#) and runs in constant space: ture of the framework is its simplicity: by transforming list func- f 0 :: Int# → Int# tions to expose their structure, intermediate values are eliminated f 0 n = by general purpose compiler optimisations. let go :: Int# → Int# → Int# We have reimplemented the Haskell standard List library on top go z k = of our framework, providing stream fusion for Haskell lists. By al- case k > n of lowing a wider range of functions to fuse, we see an increase in the False → case 1 > k of number of occurrences of fusion in typical Haskell programs. We False → to (z + k) k (k + 1) 2 True → go z (k + 1) present benchmarks documenting time and space improvements.
    [Show full text]
  • Protocols What Are Protocols?
    Protocols What are Protocols? • A protocol is a set of possibly interacting functions. • Example: (defgeneric read-bytes (stream n)) (defgeneric read-byte (stream)) Possible Interactions • (defgeneric read-bytes (stream n)) (defgeneric read-byte (stream)) • Option 1: (defmethod read-bytes (stream n) (let ((array (make-array n))) (loop for i below n do (setf (aref array i) (read-byte stream))) array)) Possible Interactions • (defgeneric read-bytes (stream n)) (defgeneric read-byte (stream)) • Option 2: (defmethod read-byte (stream) (let ((array (read-bytes 1))) (aref array 0))) Possible Interactions • (defgeneric read-bytes (stream n)) (defgeneric read-byte (stream)) • Option 3: No interactions. (The two generic functions are independent.) • Why does it matter? You have to know what you can override and what effects overriding has. Protocols in CLOS • CLOS defines some protocols for its operators. make-instance • (defmethod make-instance (class &rest initargs) ... (let ((instance (apply #’allocate-instance class initargs))) (apply #’initialize-instance instance initargs) instance)) initialize-instance • (defmethod initialize-instance ((instance standard-object) &rest initargs) (apply #’shared-initialize instance t initargs)) Initialization Protocol • make-instance calls allocate-instance and then initialize-instance. • allocate-instance allocates storage. • initialize-instance calls shared-initialize. • shared-initialize assigns the slots. change-class • change-class modifies the object to be an instance of a different class and then calls update-instance-for-different-class. • update-instance-for-different-class calls shared-initialize. reinitialize-instance • reinitialize-instance calls shared-initialize. Class Redefinition • When a class is redefined, make-instances-obsolete may be called. • make-instances-obsolete ensures that update-instance-for-redefined-class is called for each instance.
    [Show full text]
  • Understanding IEEE 1722 AVB Transport Protocol-AVBTP
    Understanding IEEE 1722 AVB Transport Protocol - AVBTP Robert Boatright Chair, IEEE 1722 [email protected] 9 March 2009 What is the purpose of the AVB Transport Protocol? IEEE 1722 enables interoperable streaming by defining: Media formats and encapsulations Raw & compressed audio/video formats Bridging IEEE 1394 LANs over AVB networks Media synchronization mechanisms Media clock reconstruction/synchronization Latency normalization and optimization Multicast address assignment Assigning AVB Stream ID Media clock master 9 March 2009 IEEE 802.1 Plenary Vancouver, BC Where does the transport protocol fit? 9 March 2009 IEEE 802.1 Plenary Vancouver, BC AVBTP packet components Ethernet header plus Common frame header Control frames Common control frame header Protocol-specific headers & payload or Streaming frames Common stream data header Streaming data headers & payload 9 March 2009 IEEE 802.1 Plenary Vancouver, BC AVBTP packets encapsulated within Ethernet header transmitted last 9 March 2009 IEEE 802.1 Plenary Vancouver, BC AVBTP frame common header fields cd : control or data packet subtype : protocol type sv : stream_id valid version : revision of p1722 standard subtype_data1/2 : protocol specific info stream_id : IEEE 802.1Qat stream ID 9 March 2009 IEEE 802.1 Plenary Vancouver, BC Command/control packet header (cd=1) 0 1 2 3 01234567890123456789012345678901 00 cd subtype sv version control_data1status control_frame_length (bytes) 04 stream_id 08 1722 Command/Control Header 12 Control frame additional header(s) and payload
    [Show full text]
  • Data Stream Algorithms Lecture Notes
    Data Stream Algorithms Lecture Notes Amit Chakrabarti Dartmouth College Latest Update: July 2, 2020 DRAFT Preface This book grew out of lecture notes for offerings of a course on data stream algorithms at Dartmouth, beginning with a first offering in Fall 2009. It’s primary goal is to be a resource for students and other teachers of this material. The choice of topics reflects this: the focus is on foundational algorithms for space-efficient processing of massive data streams. I have emphasized algorithms that are simple enough to permit a clean and fairly complete presentation in a classroom, assuming not much more background than an advanced undergraduate student would have. Where appropriate, I have provided pointers to more advanced research results that achieve improved bounds using heavier technical machinery. I would like to thank the many Dartmouth students who took various editions of my course, as well as researchers around the world who told me that they had found my course notes useful. Their feedback inspired me to make a book out of this material. I thank Suman Kalyan Bera, Sagar Kale, and Jelani Nelson for numerous comments and contributions. Of special note are the 2009 students whose scribing efforts got this book started: Radhika Bhasin, Andrew Cherne, Robin Chhetri, Joe Cooley, Jon Denning, Alina Djamankulova, Ryan Kingston, Ranganath Kondapally, Adrian Kostrubiak, Konstantin Kutzkow, Aarathi Prasad, Priya Natarajan, and Zhenghui Wang. Amit Chakrabarti April 2020 DRAFT Contents 0 Preliminaries: The Data Stream Model6 0.1
    [Show full text]