Coresim: a Simulator for Evaluating LISP Mapping Systems
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Application Description PROCONTROL P 87TS01-E/R1313 Coupling Module
Application Description PROCONTROL P Communication Coupling Module Time Master Publication No. D KWL 6316 96 E, Edition 10/96 Replacing D KWL 6316 96 E, Edition 05/96 87TS01-E/R1313 Application Every 59th second, a DCF77 time receiver coupled to the 87TS01-E/ R1313 module through an RS232c interface, conĆ forming to the prescribed time data format and transfer protoĆ Within the PROCONTROL system, module 87TS01-E/R1313col, sends the complete time telegram of the following full minĆ functions as a master clock which is set by a radioute clock and, (over in the 60th second, sends a synchronization characĆ a serial interface; reception is from the DCF77 timeter. transmitĆ This synchronization character is evaluated, and the interĆ ter), and which needs to be synchronized. The timenal received clock in module 87TS01-E/R1313 is synchronized. from the radio clock is made available to the entire PROCONĆ TROL system and is used as system time. It isThe transmitted master clock follows a 5-msec-rhythm and is synchroĆ cyclically in the form of time telegrams. nized to the DCF77 time receiver every 60 sec. Disturbance signals are generated if the time receiver or the internal clock The time telegrams containing the system time mayshould be reĆ fail. If synchronization takes place every 60 sec, the ceived and processed by modules specifically designedmaster for clock tends to go slow by < 5 msec. In the event of a this purpose. failure of the time receiver, the typical inaccuracy of the internal master clock is 3.4 sec/24 hrs. If an inaccuracy of a maximum of ± 1 sec is detected, the master clock is immediately switched over to the time received from the DCF77 time receiver. -
GPS170PEX User Manual
Technical Information Operating Instructions GPS170PEX Contact Information Meinberg Funkuhren GmbH & Co. KG Lange Wand 9 D-31812 Bad Pyrmont Phone: ++49 52 81 - 9309-0 Fax: ++49 52 81 - 9309-30 Internet: http://www.meinberg.de Email: [email protected] September 16, 2009 Table of Contents Contact Information............................................................................. 2 Content of the USB stick ..................................................................... 5 General information............................................................................. 6 PCI Express (PCIe) .............................................................................. 7 Block diagram GPS170PEX ................................................................ 8 GPS170PEX features ........................................................................... 9 Time zone and daylight saving .................................................. 9 Asynchronous serial ports ........................................................ 10 Time capture inputs.................................................................. 10 Pulse and frequency outputs .................................................... 10 DCF77 emulation ..................................................................... 12 Connectors and LEDs in the rear slot cover ...................................... 13 Installing the GPS170PEX in your computer.................................... 14 Configuring the 9 pin connector .............................................. 14 Mounting the -
Towards a Portable and Mobile Scheme Interpreter
Towards a Portable and Mobile Scheme Interpreter Adrien Pi´erard Marc Feeley Universit´eParis 6 Universit´ede Montr´eal [email protected] [email protected] Abstract guage. Because Mobit implements R4RS Scheme [6], we must also The transfer of program data between the nodes of a distributed address the serialization of continuations. Our main contribution is system is a fundamental operation. It usually requires some form the demonstration of how this can be done while preserving the in- of data serialization. For a functional language such as Scheme it is terpreter’s maintainability and with local changes to the original in- clearly desirable to also allow the unrestricted transfer of functions terpreter’s structure, mainly through the use of unhygienic macros. between nodes. With the goal of developing a portable implemen- We start by giving an overview of the pertinent features of the tation of the Termite system we have designed the Mobit Scheme Termite dialect of Scheme. In Section 3 we explain the structure interpreter which supports unrestricted serialization of Scheme ob- of the interpreter on which Mobit is based. Object serialization is jects, including procedures and continuations. Mobit is derived discussed in Section 4. Section 5 compares Mobit’s performance from an existing Scheme in Scheme fast interpreter. We demon- with other interpreters. We conclude with related and future work. strate how macros were valuable in transforming the interpreter while preserving its structure and maintainability. Our performance 2. Termite evaluation shows that the run time speed of Mobit is comparable to Termite is a Scheme adaptation of the Erlang concurrency model. -
7502.9039-MANUAL-Montgomery-MIPROM-21.Pdf
This is Your Software Security Access Key: DO NOT LOSE IT ! DO NOT PLUG THE SECURITY KEY INTO ANY ELEVATOR INTERFACE PORT This security device must be plugged into the notebook computer’s PRINTER port whenever the FREEDOM Tool Software is to be run. List of Trademarks Microsoft Windows, Windows 95, and MS-DOS are registered trademarks/products of Microsoft Corporation. Megatech and MIPROM 21 are trademarks of the Montgomery-Kone Elevator Corporation. IBM and PS/2 are registered trademarks of International Business Machines Corporation WORLD electronics, the WORLD electronics logo, FREEDOM Tool and FREEDOMWare are registered trademarks of WORLD electronics Sales and Service, Inc. All other trademarks mentioned in this manual are the sole property of their respective manufacturers. Copyright © 1998-2003 by WORLD electronics®. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of WORLD electronics. Further, this publication and features described herein are subject to change without notice from the publisher. WORLD electronics Table of Contents Introduction ................................................................................................ 2 Features ................................................................................................................................ -
Towards a Portable and Mobile Scheme Interpreter
Towards a Portable and Mobile Scheme Interpreter Adrien Pi´erard Marc Feeley Universit´eParis 6 Universit´ede Montr´eal [email protected] [email protected] Abstract guage. Because Mobit implements R4RS Scheme [6], we must also The transfer of program data between the nodes of a distributed address the serialization of continuations. Our main contribution is system is a fundamental operation. It usually requires some form the demonstration of how this can be done while preserving thein- of data serialization. For a functional language such as Scheme it is terpreter’s maintainability and with local changes to the original in- clearly desirable to also allow the unrestricted transfer offunctions terpreter’s structure, mainly through the use of unhygienicmacros. between nodes. With the goal of developing a portable implemen- We start by giving an overview of the pertinent features of the tation of the Termite system we have designed the Mobit Scheme Termite dialect of Scheme. In Section 3 we explain the structure interpreter which supports unrestricted serialization of Scheme ob- of the interpreter on which Mobit is based. Object serialization is jects, including procedures and continuations. Mobit is derived discussed in Section 4. Section 5 compares Mobit’s performance from an existing Scheme in Scheme fast interpreter. We demon- with other interpreters. We conclude with related and futurework. strate how macros were valuable in transforming the interpreter while preserving its structure and maintainability. Our performance 2. Termite evaluation shows that the run time speed of Mobit is comparable to Termite is a Scheme adaptation of the Erlang concurrency model. -
Fully-Parameterized, First-Class Modules with Hygienic Macros
Fully-parameterized, First-class Modules with Hygienic Macros Dissertation der Fakult¨at fur¨ Informations- und Kognitionswissenschaften der Eberhard-Karls-Universit¨at Tubingen¨ zur Erlangung des Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) vorgelegt von Dipl.-Inform. Josef Martin Gasbichler aus Biberach/Riß Tubingen¨ 2006 Tag der mundlichen¨ Qualifikation: 15. 02. 2006 Dekan: Prof. Dr. Michael Diehl 1. Berichterstatter: Prof. Dr. Herbert Klaeren 2. Berichterstatter: Prof. Dr. Peter Thiemann (Universit¨at Freiburg) Abstract It is possible to define a formal semantics for configuration, elaboration, linking, and evaluation of fully-parameterized first-class modules with hygienic macros, independent compilation, and code sharing. This dissertation defines such a semantics making use of explicit substitution to formalize hygienic expansion and linking. In the module system, interfaces define the static semantics of modules and include the definitions of exported macros. This enables full parameterization and independent compilation of modules even in the presence of macros. Thus modules are truly exchangeable components of the program. The basis for the module system is an operational semantics for hygienic macro expansion—computational macros as well as rewriting-based macros. The macro semantics provides deep insight into the nature of hygienic macro expansion through the use of explicit substitutions instead of conventional renaming techniques. The semantics also includes the formal description of Macro Scheme, the meta-language used for evaluating computational macros. Zusammenfassung Es ist m¨oglich, eine formale Semantik anzugeben, welche die Phasen Konfiguration, syntak- tische Analyse mit Makroexpansion, Linken und Auswertung fur¨ ein vollparametrisiertes Mo- dulsystem mit Modulen als Werten erster Klasse, unabh¨angiger Ubersetzung¨ und Code-Sharing beschreibt. -
Conversion from Decimal There Is a Simple Method That Allows Conversions from the Decimal to a Target Number System
APPENDICES A Number Systems This appendix introduces background material on various number systems and representations. We start the appendix with a discussion of various number systems, including the binary and hexadecimal systems. When we use multiple number systems, we need to convert numbers from system to another We present details on how such number conversions are done. We then give details on integer representations. We cover both unsigned and signed integer representations. We close the appendix with a discussion of the floating-point numbers. Positional Number Systems The number systems that we discuss here are based on positional number systems. The decimal number system that we are already familiar with is an example of a positional number system. In contrast, the Roman numeral system is not a positional number system. Every positional number system has a radix or base, and an alphabet. The base is a positive number. For example, the decimal system is a base-10 system. The number of symbols in the alphabet is equal to the base of the number system. The alphabet of the decimal system is 0 through 9, a total of 10 symbols or digits. In this appendix, we discuss four number systems that are relevant in the context of computer systems and programming. These are the decimal (base-10), binary (base-2), octal (base-8), and hexadecimal (base-16) number systems. Our intention in including the familiar decimal system is to use it to explain some fundamental concepts of positional number systems. Computers internally use the binary system. The remaining two number systems—octal and hexadecimal—are used mainly for convenience to write a binary number even though they are number systems on their own. -
Agent Builder Troubleshooting Guide Chapter 1
IBM Agent Builder Version 6.3.1 Troubleshooting Guide IBM Agent Builder Version 6.3.1 Troubleshooting Guide ii Agent Builder Troubleshooting Guide Chapter 1. Gathering product information for IBM Software Support Gather certain product information before you contact IBM® Software Support. About this task Gather the product information that is detailed in: Table 1. Procedure Gather the following information before you contact IBM Software Support: Table 1. Information to gather before you contact IBM Software Support Information type Description Log files Collect trace log files from failing systems. Most logs are in a logs subdirectory on the host computer. See Chapter 2, “Agent Builder Trace logging,” on page 3 for lists of all trace log files and their locations. Operating system Operating system version number and patch level Messages Messages and other information that is displayed on the screen Version numbers for an IBM Tivoli® Monitoring environment Version number of the following members of the monitoring environment v Tivoli Monitoring. Also, provide the patch level, if available. v Tivoli Monitoring: Windows OS Agent v Tivoli Monitoring: UNIX OS Agent v Tivoli Monitoring: Linux OS Agent Version numbers for an IBM Performance Management Version number of the following members of the environment monitoring environment v Operating System agent installed on the monitored system. v Monitoring Infrastructure Node (if installed on your premises). Tip: If you are using IBM Performance Management (SaaS), you do not install the Monitoring Infrastructure Node on your premises. Instead, a version hosted in the cloud is used. In this case, you do not need to provide the version number for this component. -
A Tractable Scheme Implementation
LISP AND SYMBOLIC COMPUTATION:An International Journal, 7, 315-335 (1994) © 1994 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. A Tractable Scheme Implementation RICHARD A. KELSEY [email protected] NEC Research Institute JONATHAN A. REES [email protected] M1T and Cornell University Abstract. Scheme 48 is an implementation of the Scheme programming language constructed with tractability and reliability as its primary design goals. It has the structural properties of large, compiler-based Lisp implementations: it is written entirely in Scheme, is bootstrapped via its compiler, and provides numerous language extensions. It controls the complexity that ordinarily attends such large Lisp implementations through clear articulation of internal modularity and by the exclusion of features, optimizations, and generalizations that are of only marginal value. Keywords: byte-code interpreters, virtual machines, modularity, Scheme, partial evaluation, layered design 1. Introduction Scheme 48 is an implementation of the Scheme programming language constructed with tractability and reliability as its primary design goals. By tractability we mean the ease with which the system can be understood and changed. Although Lisp dialects, including Scheme, are relatively simple languages, implementation tractability is often threatened by the demands of providing high performance and extended functionality. The Scheme 48 project was initiated in order to experiment with techniques for main- taining implementation tractability in the face of countervailing pressures and to find out what tradeoffs were involved in doing so. (The project was originally an experiment to see if a Scheme implementation could be written in a single weekend; the 48 refers to forty-eight hours.) Small Lisp implementations are usually tractable merely by virtue of being small; it is usually possible for an experienced programmer to read and understand the entire source program in a few days. -
Digital Alarm Communicator/Transmitters 411/411UD Manual
Digital Alarm Communicator/Transmitters 411/411UD Manual Document LS10105-000GE-E 1/29/2014 Rev: A P/N LS10105-000GE-E:A ECN 13-875 Fire Alarm & Emergency Communication System Limitations While a life safety system may lower insurance rates, it is not a substitute for life and property insurance! An automatic fire alarm system—typically made up of smoke (caused by escaping gas, improper storage of flammable materi- detectors, heat detectors, manual pull stations, audible warning als, etc.). devices, and a fire alarm control panel (FACP) with remote notifi- Heat detectors do not sense particles of combustion and alarm cation capability—can provide early warning of a developing fire. only when heat on their sensors increases at a predetermined Such a system, however, does not assure protection against rate or reaches a predetermined level. Rate-of-rise heat detec- property damage or loss of life resulting from a fire. tors may be subject to reduced sensitivity over time. For this An emergency communication system—typically made up of reason, the rate-of-rise feature of each detector should be tested an automatic fire alarm system (as described above) and a life at least once per year by a qualified fire protection specialist. safety communication system that may include an autonomous Heat detectors are designed to protect property, not life. control unit (ACU), local operating console (LOC), voice commu- IMPORTANT! Smoke detectors must be installed in the same nication, and other various interoperable communication meth- room as the control panel and in rooms used by the system for ods—can broadcast a mass notification message. -
The Incomplete Scheme 48 Reference Manual for Release 1.8
The Incomplete Scheme 48 Reference Manual for release 1.8 Richard Kelsey Jonathan Rees Mike Sperber A line may take us hours, yet if it does not seem a moment’s thought All our stitching and unstitching has been as nought. Yeats Adam’s Curse ii Acknowledgements Thanks to Scheme 48’s users for their suggestions, bug reports, and forbearance. Thanks also to Deborah Tatar for providing the Yeats quotation. iii Contents Contents iv 1 Introduction 1 2 User’s guide 2 2.1 Command line arguments . 2 2.2 Command processor . 3 2.3 Editing . 3 2.4 Performance . 3 2.5 Disassembler . 4 2.6 Module system . 4 2.7 Library . 6 3 Command processor 7 3.1 Current focus value and ## ..................... 7 3.2 Command levels . 8 3.3 Logistical commands . 9 3.4 Module commands . 9 3.5 Debugging commands . 9 3.6 Settings . 11 3.7 Inspection mode . 13 3.8 Command programs . 14 3.9 Building images . 15 3.10 Resource query and control . 15 3.11 Threads . 16 3.12 Quite obscure . 17 4 Module system 18 4.1 Introduction . 18 4.2 The configuration language . 19 4.3 Interfaces . 21 4.4 Macros . 22 4.5 Higher-order modules . 23 4.6 Compiling and linking . 23 iv 4.7 Semantics of configuration mutation . 23 4.8 Command processor support . 24 4.9 Configuration packages . 27 4.10 Discussion . 28 5 Libraries 30 5.1 General utilities . 30 5.2 Pretty-printing . 32 5.3 Bitwise integer operations . 32 5.4 Byte vectors . -
Embedded Systems Programming with the Microchip PIC16F877 Microcontroller
EMBEDDED SYSTEMS PROGRAMMING WITH THE PIC16F877 Second Edition By Timothy D. Green Copyright 2008 by Timothy D. Green All Rights Reserved. Table of Contents Preface …………………………………………………………………. 5 List of Figures …………………………………………………………. 6 Abbreviations and Acronyms …………………………………………. 7 Trademarks ……………………………………………………………. 10 Chapter 1 Introduction to ESP and the PIC …………………………. 11 Chapter 2 Microcontrollers and the PIC16F877 ……………………. 15 Section 2.0 Chapter Summary ……………………………….. 15 Section 2.1 Memory and Memory Organization ……………. 15 Section 2.2 The PIC16F877 …………………………………. 16 Section 2.3 Programming the PIC …………………………… 17 Chapter 3 Simple PIC Hardware & Software (“Hello World”) …….. 20 Section 3.0 Chapter Summary ……………………………….. 20 Section 3.1 A Simple Example System ……………………… 20 Section 3.2 Summary of Instructions and Concepts …………. 25 Chapter 4 The PIC Instruction Set (Part I) ………………………….. 27 Section 4.0 Chapter Summary ………………………………. 27 Section 4.1 The PIC16F877 Instruction Set ………………… 27 Section 4.2 Summary of Instructions and Concepts …………. 33 Chapter 5 The PIC Instruction Set (Part II) …………………………. 34 Section 5.0 Chapter Summary ……………………………….. 34 Section 5.1 Introduction ……………………………………… 34 Section 5.2 Keypad and Display Interface …………………… 35 Section 5.3 The STATUS Register and Flag Bits ……………. 39 Section 5.4 The Keypad Software ……………………………. 40 Section 5.5 The LED Display Software ……………………… 43 Section 5.6 Improved Display and Indirect Addressing ……… 46 Section 5.7 Odds & Ends …………………………………….. 50 Section 5.8 Using KEY_SCAN and DISPLAY Together ……. 54 Section 5.9 A Last Look at the Advanced Security System ….. 56 Section 5.10 Summary of Instructions and Concepts ………… 57 Chapter 6 Fundamental ESP Techniques ……………………………. 59 Section 6.0 Chapter Summary ………………………………… 59 Section 6.1 Introduction ………………………………………. 59 Section 6.2 Software Readability …………………………… 59 Section 6.3 Software Maintainability ………………………….