The Mechanical Evaluation of Expressions – Peter J

Total Page:16

File Type:pdf, Size:1020Kb

The Mechanical Evaluation of Expressions – Peter J Thierry Vilmart The mechanical evaluation Emil Karlén of expressions - 1964 by Peter J. Landin ● Peter Landin is a British computer scientist. ● He invented the SECD machine. ● He was one of the first to realize that the lambda calculus could be used to model a programming language. ● Essential to development of both functional programming and denotational semantics. Plan 1. The importance of the SECD machine 2. SECD – an abstract machine 3. Applicative Expressions (AEs) 4. The SECD machine rules and examples 5. Round up The importance of the SECD machine ● SECD stands for « Stack, Environment, Control, Dump » ● SECD machine was the first attempt to make a computer use lambda- calculus in order to compute arithmetical expressions. ● Two years after this article, in 1966, Landin presented ISWIM, an abstract computer programming language. The operational semantics of ISWIM is defined using Landin's SECD machine and it uses call-by- value. ● Although not implemented, ISWIM has been proved very influential in the development of programming languages, especially functional programming languages such as SASL, Miranda, ML, Haskell and their successors. Goal: evaluation of complex expressions Expressions are converted in a form equivalent to Lambda Calculus Concepts of programming languages can be expressed in Lambda Calculus ● Functions: λ abstractions ● Auxiliary definitions: λ abstractions and applications ● Recursion: the fix operator Applicative Expressions - AEs AEs are lambda calculus extended with some features that are easy to represent by computer hardware (lists, strings, decimal numbers, primitive functions). ● There are three kinds of AEs: – Identifier – Lambda expression – Operator / Operand ● Applicative Expression ::= Identifier I lamb(Identifier, Applicative Expression) I comb(Applicative Expression, Applicative Expression) Recursive definition of val E X ● val E X = value of X given the environment E ● E contains the bindings of identifiers to their respective values ● In lambda-calculus, there is no explicit environment E. Introduction to the SECD machine ● A state transition machine that computes val E X ● State: (Stack,Environment,Control,Dump) ● Transition: like small-step evaluation with 7 evaluation rules: (S,E,C,D) ® (S',E',C',D') ● Transitivity will lead you to val E X: ([],E,[X],[]) ®* ([val E X],E,[],[]) ● Avoids the problem of collision of variable names (that can occur during evaluation by variable substitution) ● Implementation does not use recursion The S, E, C and D The states of the SECD machine consist of four components, all exhibiting stack behavior. ● S for Stack Stores partial results (values) awaiting subsequent use. (value: decimal number, primitive function, λ abstraction (almost)) ● E for Environment A mapping from identifiers to values. ● C for Control A stack of AEs yet to be evaluated plus a special symbol @ meaning that an application should be performed. ● D for Dump A stack of complete states corresponding to evaluations in progress but suspended while other AEs are evaluated. Introduction to the Evaluation Rules Control State following (S,E,C,D) 1 [] Restore from Dump = (S',E',C',D') hd S:S© E© C© D© Push onto new Stack: hd of old Stack (hd of old Stack is the result of an application) 2a Ident x:tC Push onto Stack: lookup E x lookup E x:S E tC D 2b λx.ae:tC Push onto Stack: Closure x ae E Closure x ae E:S E tC D 2c @:tC See other table. 2d Comb f a:tC Push onto Control: [argument, function, @] S E a:f:@:tC D Stack Closure = @:C© State following (S,E,C,D) 2c1 Closure x ae E©:v:tS Store S,E,C,D on Dump, and replace [] (x,v):E© [ae] (tS,E,tC,D) S, C, D. 2c2 PrimFun f:v:tS Push onto Stack: result of application f v:tS E tC D Evaluation of an Identifier Stack Environment Control No Rule Where ... Evaluate: x [] [(ºxº,1)] [Ident ºxº] 1 in the environment x ® 1 [1] [(ºxº,1)] [] 2 2a 1 = lookup E ”x” Control State following (S,E,C,D) 1 [] Restore from Dump = (S',E',C',D') hd S:S© E© C© D© Push onto new Stack: hd of old Stack (hd of old Stack is the result of an application) 2a Ident x:tC Push onto Stack: lookup E x lookup E x:S E tC D 2b λx.ae:tC Push onto Stack: Closure x ae E Closure x ae E:S E tC D 2c @:tC See other table. 2d Comb f a:tC Push onto Control: [argument, function, @] S E a:f:@:tC D Stack Closure = @:C© State following (S,E,C,D) 2c1 Closure x ae E©:v:tS Store S,E,C,D on Dump, and replace [] (x,v):E© [ae] (tS,E,tC,D) S, C, D. 2c2 PrimFun f:v:tS Push onto Stack: result of application f v:tS E tC D Two more concepts ● Numerical constants – An Environment may map an identifier to a numerical constant: lookup E x = 1 – A numerical constant is a value ● Primitive functions – A function with predefined computation: acos(1) = 0 – A primitive function is a value Evaluation of Function Application Stack Environment Control No Rule Where ... Evaluate: f x [] E0 [Comb (Ident ªfº) (Ident ºxº)] 1 [] E0 [Ident ºxº,Ident ºfº,@] 2 in the environment E0: 2d x ® 1 [1] E0 [Ident ºfº,@] 3 2a 1 = lookup E0 ”x” f ® acos (a primitive function) [acos,1] E0 [@] 4 2a acos = lookup E0 ”f” [0] E0 [] 5 2c2 0 = acos(1) Control State following (S,E,C,D) 1 [] Restore from Dump = (S',E',C',D') hd S:S© E© C© D© Push onto new Stack: hd of old Stack (hd of old Stack is the result of an application) 2a Ident x:tC Push onto Stack: lookup E x lookup E x:S E tC D 2b λx.ae:tC Push onto Stack: Closure x ae E Closure x ae E:S E tC D 2c @:tC See other table. 2d Comb f a:tC Push onto Control: [argument, function, @] S E a:f:@:tC D Stack Closure = @:C© State following (S,E,C,D) 2c1 Closure x ae E©:v:tS Store S,E,C,D on Dump, and replace [] (x,v):E© [ae] (tS,E,tC,D) S, C, D. 2c2 PrimFun f:v:tS Push onto Stack: result of application f v:tS E tC D One more concept ● Closure – Represents a lambda abstraction (λv.X) in a fixed environment (E): Closure v X E – A closure is a value Control State following (S,E,C,D) 1 [] Restore from Dump = (S',E',C',D') hd S:S© E© C© D© Push onto new Stack: hd of old Stack (hd of old Stack is the result of an application) 2a Ident x:tC Push onto Stack: lookup E x lookup E x:S E tC D 2b λx.ae:tC Push onto Stack: Closure x ae E Closure x ae E:S E tC D 2c @:tC See other table. 2d Comb f a:tC Push onto Control: [argument, function, @] S E a:f:@:tC D Stack Closure = @:C© State following (S,E,C,D) 2c1 Closure x ae E©:v:tS Store S,E,C,D on Dump, and replace [] (x,v):E© [ae] (tS,E,tC,D) S, C, D. 2c2 PrimFun f:v:tS Push onto Stack: result of application f v:tS E tC D Evaluation of Abstraction Application Stack Env. Control Dump No Rule [] E0 [(λy.y) x] [] 1 Evaluate: (λy.y) x [] [x,(λy.y),@] 2 2d in the environment E0: [1] [(λy.y),@] 3 2a x ® 1 [Closure y y E0,1] [@] 4 2b [] (ºyº,1):E0 [y] ([],E0,[],[]) 5 2c1 [1] [] 6 2a [1] E0 [] [] 7 1 Control State following (S,E,C,D) 1 [] Restore from Dump = (S',E',C',D') hd S:S© E© C© D© Push onto new Stack: hd of old Stack (hd of old Stack is the result of an application) 2a Ident x:tC Push onto Stack: lookup E x lookup E x:S E tC D 2b λx.ae:tC Push onto Stack: Closure x ae E Closure x ae E:S E tC D 2c @:tC See other table. 2d Comb f a:tC Push onto Control: [argument, function, @] S E a:f:@:tC D Stack Closure = @:C© State following (S,E,C,D) 2c1 Closure x ae E©:v:tS Store S,E,C,D on Dump, and replace [] (x,v):E© [ae] (tS,E,tC,D) S, C, D. 2c2 PrimFun f:v:tS Push onto Stack: result of application f v:tS E tC D Mechanical evaluation Transitions between configurations: Landin has no types but a general procedure for all identifiers. Using types simplifies greatly the implementation (con and var) transform cfg(S,E,C,D) = ( E(head(C) = val E X ) 1. if head(C) is a constant then cfg([head(C) l S], E, tail(C), D) 2. else if headC) is a variable then cfg(E(head(C)) l S], E, tail(C), D) 3. else if head(C) is an application (Rator Rand) then cfg(S, E, (Rator, Rand @ l tail(C)], D) 4. else if head(C) is a lambda abstraction, Lambda V. B then cfg([closure(V,B,E)| S], E, tail(C), D) 5. else if head(C) = @ and head(tail((S)) is a predefined function f then cfg([f(head(S)) l tail(tail(S))], E, tail(C), D) 6. else if head(C) = @ and head(tail(S)) = closure(V,B,E1) then cfg([ ], {V --> head(S) }E1, [B], cfg(tail(tail(S)),E,tail(C),D)) 7. else if C=[ ] then cfg([head(S)lS1], E1, C1, D1) where D = cfg(S1,E1,C1,D1) Run of SECD in Prolog Example: evaluation of « minus 5 2 » ?- interpret(cfg([ ], nil, [comb(con(minus), con([5,2]))], nil), Result).
Recommended publications
  • Biorthogonality, Step-Indexing and Compiler Correctness
    Biorthogonality, Step-Indexing and Compiler Correctness Nick Benton Chung-Kil Hur Microsoft Research University of Cambridge [email protected] [email protected] Abstract to a deeper semantic one (‘does the observable behaviour of the We define logical relations between the denotational semantics of code satisfy this desirable property?’). In previous work (Benton a simply typed functional language with recursion and the opera- 2006; Benton and Zarfaty 2007; Benton and Tabareau 2009), we tional behaviour of low-level programs in a variant SECD machine. have looked at establishing type-safety in the latter, more semantic, The relations, which are defined using biorthogonality and step- sense. Our key notion is that a high-level type translates to a low- indexing, capture what it means for a piece of low-level code to level specification that should be satisfied by any code compiled implement a mathematical, domain-theoretic function and are used from a source language phrase of that type. These specifications are to prove correctness of a simple compiler. The results have been inherently relational, in the usual style of PER semantics, capturing formalized in the Coq proof assistant. the meaning of a type A as a predicate on low-level heaps, values or code fragments together with a notion of A-equality thereon. These Categories and Subject Descriptors F.3.1 [Logics and Mean- relations express what it means for a source-level abstractions (e.g. ings of Programs]: Specifying and Verifying and Reasoning about functions of type A ! B) to be respected by low-level code (e.g. Programs—Mechanical verification, Specification techniques; F.3.2 ‘taking A-equal arguments to B-equal results’).
    [Show full text]
  • Forms of Semantic Speci Cation
    THE LOGIC IN COMPUTER SCIENCE COLUMN by Yuri GUREVICH Electrical Engineering and Computer Science Department University of Michigan Ann Arb or MI USA Forms of Semantic Sp ecication Carl A Gunter UniversityofPennsylvania The way to sp ecify a programming language has b een a topic of heated debate for some decades and at present there is no consensus on how this is b est done Real languages are almost always sp ecied informally nevertheless precision is often enough lacking that more formal approaches could b enet b oth programmers and language implementors My purp ose in this column is to lo ok at a few of these formal approaches in hop e of establishing some distinctions or at least stirring some discussion Perhaps the crudest form of semantics for a programming language could b e given by providing a compiler for the language on a sp ecic physical machine If the machine archi tecture is easy to understand then this could b e viewed as a way of explaining the meaning of a program in terms of a translation into a simple mo del This view has the advantage that every higherlevel programming language of any use has a compiler for at least one machine and this sp ecication is entirely formal Moreover the sp ecication makes it known to the programmer how eciency is b est achieved when writing programs in the language and compiling on that machine On the other hand there are several problems with this technique and I do not knowofany programming language that is really sp ecied in this way although Im told that such sp ecications do exist
    [Show full text]
  • A Rational Deconstruction of Landin's SECD Machine
    A Rational Deconstruction of Landin’s SECD Machine Olivier Danvy BRICS, Department of Computer Science, University of Aarhus, IT-parken, Aabogade 34, DK-8200 Aarhus N, Denmark [email protected] Abstract. Landin’s SECD machine was the first abstract machine for the λ-calculus viewed as a programming language. Both theoretically as a model of computation and practically as an idealized implementation, it has set the tone for the subsequent development of abstract machines for functional programming languages. However, and even though variants of the SECD machine have been presented, derived, and invented, the precise rationale for its architecture and modus operandi has remained elusive. In this article, we deconstruct the SECD machine into a λ- interpreter, i.e., an evaluation function, and we reconstruct λ-interpreters into a variety of SECD-like machines. The deconstruction and reconstruc- tions are transformational: they are based on equational reasoning and on a combination of simple program transformations—mainly closure conversion, transformation into continuation-passing style, and defunc- tionalization. The evaluation function underlying the SECD machine provides a precise rationale for its architecture: it is an environment-based eval- apply evaluator with a callee-save strategy for the environment, a data stack of intermediate results, and a control delimiter. Each of the com- ponents of the SECD machine (stack, environment, control, and dump) is therefore rationalized and so are its transitions. The deconstruction and reconstruction method also applies to other abstract machines and other evaluation functions. 1 Introduction Forty years ago, Peter Landin wrote a profoundly influencial article, “The Me- chanical Evaluation of Expressions” [27], where, in retrospect, he outlined a substantial part of the functional-programming research programme for the fol- lowing decades.
    [Show full text]
  • From Interpreter to Compiler and Virtual Machine: a Functional Derivation Basic Research in Computer Science
    BRICS Basic Research in Computer Science BRICS RS-03-14 Ager et al.: From Interpreter to Compiler and Virtual Machine: A Functional Derivation From Interpreter to Compiler and Virtual Machine: A Functional Derivation Mads Sig Ager Dariusz Biernacki Olivier Danvy Jan Midtgaard BRICS Report Series RS-03-14 ISSN 0909-0878 March 2003 Copyright c 2003, Mads Sig Ager & Dariusz Biernacki & Olivier Danvy & Jan Midtgaard. BRICS, Department of Computer Science University of Aarhus. All rights reserved. Reproduction of all or part of this work is permitted for educational or research use on condition that this copyright notice is included in any copy. See back inner page for a list of recent BRICS Report Series publications. Copies may be obtained by contacting: BRICS Department of Computer Science University of Aarhus Ny Munkegade, building 540 DK–8000 Aarhus C Denmark Telephone: +45 8942 3360 Telefax: +45 8942 3255 Internet: [email protected] BRICS publications are in general accessible through the World Wide Web and anonymous FTP through these URLs: http://www.brics.dk ftp://ftp.brics.dk This document in subdirectory RS/03/14/ From Interpreter to Compiler and Virtual Machine: a Functional Derivation Mads Sig Ager, Dariusz Biernacki, Olivier Danvy, and Jan Midtgaard BRICS∗ Department of Computer Science University of Aarhusy March 2003 Abstract We show how to derive a compiler and a virtual machine from a com- positional interpreter. We first illustrate the derivation with two eval- uation functions and two normalization functions. We obtain Krivine's machine, Felleisen et al.'s CEK machine, and a generalization of these machines performing strong normalization, which is new.
    [Show full text]
  • An Introduction to Landin's “A Generalization of Jumps and Labels”
    Higher-Order and Symbolic Computation, 11, 117–123 (1998) c 1998 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. An Introduction to Landin’s “A Generalization of Jumps and Labels” HAYO THIELECKE [email protected] qmw, University of London Abstract. This note introduces Peter Landin’s 1965 technical report “A Generalization of Jumps and Labels”, which is reprinted in this volume. Its aim is to make that historic paper more accessible to the reader and to help reading it in context. To this end, we explain Landin’s control operator J in more contemporary terms, and we recall Burge’s solution to a technical problem in Landin’s original account. Keywords: J-operator, secd-machine, call/cc, goto, history of programming languages 1. Introduction In the mid-60’s, Peter Landin was investigating functional programming with “Applicative Expressions”, which he used to provide an account of Algol 60 [10]. To explicate goto, he introduced the operator J (for jump), in effect extending functional programming with control. This general control operator was powerful enough to have independent interest quite beyond the application to Algol: Landin documented the new paradigm in a series of technical reports [11, 12, 13]. The most significant of these reports is “A Generalization of Jumps and Labels” (reprinted in this volume on pages 9–27), as it presents and investigates the J-operator in its own right. The generalization is a radical one: it introduces first-class control into programming languages for the first time. Control is first-class in that the generalized labels given by the J-operator can be passed as arguments to and returned from procedures.
    [Show full text]
  • Foundations of Functional Programming
    Foundations of Functional Programming Computer Science Tripos Part IB Easter Term Lawrence C Paulson Computer Laboratory University of Cambridge [email protected] Copyright © 2021 by Lawrence C. Paulson Contents 1 Introduction 1 2 Equality and Normalization 6 3 Encoding Data in the λ-Calculus 11 4 Writing Recursive Functions in the λ-calculus 16 5 The λ-Calculus and Computation Theory 23 6 ISWIM: The λ-calculus as a Programming Language 29 7 Lazy Evaluation via Combinators 39 8 Compiling Methods Using Combinators 45 i ii 1 1 Introduction This course is concerned with the λ-calculus and its close relative, combinatory logic. The λ-calculus is important to functional programming and to computer science generally: 1. Variable binding and scoping in block-structured languages can be mod- elled. 2. Several function calling mechanisms — call-by-name, call-by-value, and call-by-need — can be modelled. The latter two are also known as strict evaluation and lazy evaluation. 3. The λ-calculus is Turing universal, and is probably the most natural model of computation. Church’s Thesis asserts that the ‘computable’ functions are precisely those that can be represented in the λ-calculus. 4. All the usual data structures of functional programming, including infinite lists, can be represented. Computation on infinite objects can be defined formally in the λ-calculus. 5. Its notions of confluence (Church-Rosser property), termination, and nor- mal form apply generally in rewriting theory. 6. Lisp, one of the first major programming languages, was inspired by the λ-calculus. Many functional languages, such as ML, consist of little more than the λ-calculus with additional syntax.
    [Show full text]
  • Simplification of Abstract Machine for Functional Language and Its Theoretical Investigation
    Journal of Software Simplification of Abstract Machine for Functional Language and Its Theoretical Investigation Shin-Ya Nishizaki*, Kensuke Narita, Tomoyuki Ueda Department of Computer Science, Tokyo Institute of Technology, Ookayama, Meguro, Tokyo, Japan. * Corresponding author. Tel.: +81-3-5734-2772; email: [email protected] Manuscript submitted February 18, 2015; accepted March 4, 2015. doi: 10.17706/jsw.10.10.1148-1159 Abstract: Many researchers have studied abstract machines in order to give operational semantics to various kinds of programming languages. For example, Landin's SECD machine and Curien's Categorical Abstract Machine are proposed for functional programming languages and useful not only for theoretical studies but also implementation of practical language processors. We study simplification of SECD machine and design a new abstract machine, called Simple Abstract Machine. We achieve the simplification of SECD machine by abstracting substitutions for variables. In Simple Abstract Machine, we can formalize first-class continuations more simply and intelligibly than SECD machine. Key words: Programming language theory, lambda calculus, first-class continuation, abstract machine. 1. Introduction Many researchers have proposed abstract machines in order to give operational semantics to various kinds of programming languages, such as Landin's SECD machine [1], [2] and Curien's Categorical Abstract machine [3], [4]. From the theoretical viewpoint, there are many kinds of researches of abstract machines. Graham formalized and verified implementation of SECD machine using the HOL prover [5]. Hardin et al. formulated abstract machines for functional languages in the framework of explicit substitutes [6]. Ohori studied abstract machines from the proof-theoretic approach [7]. Curien et al.
    [Show full text]
  • Abstract Λ-Calculus Machines
    Abstract λ-Calculus Machines Werner E. Kluge Department of Computer Science University of Kiel D–24105 Kiel, Germany E–mail: [email protected] Abstract. This paper is about fully normalizing λ-calculus machines that permit sym- bolic computations involving free variables. They employ full-fledged β-reductions to pre- serve static binding scopes when substituting and reducing under abstractions. Abstrac- tions and variables thus become truly first class objects: both may be freely substituted for λ-bound variables and returned as abstraction values. This contrasts with implementa- tions of conventional functional languages which realize a weakly normalizing λ-calculus that is capable of computing closed terms (or basic values) only. The two machines described in this paper are descendants of a weakly normalizing secd- machine that supports a nameless λ-calculus which has bound variable occurrences re- placed by binding indices. Full normalization is achieved by a few more state transition rules that η-extend unapplied abstractions to full applications, inserting in ascending order binding indices for missing arguments. Updating these indices in the course of performing β-reductions is accomplished by means of a simple counting mechanism that inflicts very little overhead. Both machines realize a head-order strategy that emphasizes normaliza- tion along the leftmost spine of a λ-expression. The simpler fn secd-machine abides by the concept of saving (and unsaving) on a dump structure machine contexts upon each individual β-reduction. The more sophisticated fn se(m)cd-machine performs what are called β-reductions-in-the-large that head-normalize entire spines in the same contexts.
    [Show full text]
  • Lambda and Pi Calculi, CAM and SECD Machines
    Lambda and pi calculi, CAM and SECD machines Vasco Thudichum Vasconcelos Department of Informatics Faculty of Sciences University of Lisbon February 2001 (revised November 2002, August 2003) Abstract We analyse machines that implement the call-by-value reduction strategy of the λ-calculus: two environment machines—CAM and SECD—and two encodings into the π-calculus—due to Milner and Vasconcelos. To establish the relation between the various machines, we setup a notion of reduction machine and two notions of corre- spondences: operational—in which a reduction step in the source ma- chine is mimicked by a sequence of steps in the target machine—and convergent—where only reduction to normal form is simulated. We show that there are operational correspondences from the λ-calculus into CAM, and from CAM and from SECD into the π-calculus. Plotkin completes the picture by showing that there is a convergent correspon- dence from the λ-calculus into SECD. 1 Introduction The call-by-value reduction strategy of the λ-calculus equips a large number of today’s programming languages. To study the operational aspects of this reduction strategy Plotkin used Landin’s SECD, a stack-based, environment machine [6, 11]. Based on the Categorical Abstract Machine and inspired by the Krivine’s lazy abstract machine, Curien proposed a different environment machine, which we call CAM throughout this paper [4]. From a different community, two interpretations of the call-by-value λ-calculus into the π- calculus are known: one proposed by Milner, and further studied by Pierce 1 and Sangiorgi [7, 8, 9], the other proposed by the author, but lacking, to date a systematic study [13].
    [Show full text]
  • Programming Languages and Lambda Calculi (Utah CS7520 Version)
    Programming Languages and Lambda Calculi (Utah CS7520 Version) Matthias Felleisen Matthew Flatt Draft: March 8, 2006 Copyright c 1989, 2003 Felleisen, Flatt 2 Contents I Models of Languages 7 Chapter 1: Computing with Text 9 1.1 Defining Sets ...................................... 9 1.2 Relations ........................................ 10 1.3 Relations as Evaluation ................................ 11 1.4 Directed Evaluation .................................. 11 1.5 Evaluation in Context ................................. 12 1.6 Evaluation Function .................................. 13 1.7 Notation Summary ................................... 13 Chapter 2: Structural Induction 15 2.1 Detecting the Need for Structural Induction ..................... 15 2.2 Definitions with Ellipses ................................ 17 2.3 Induction on Proof Trees ................................ 17 2.4 Multiple Structures ................................... 18 2.5 More Definitions and More Proofs .......................... 19 Chapter 3: Consistency of Evaluation 21 Chapter 4: The λ-Calculus 25 4.1 Functions in the λ-Calculus .............................. 25 4.2 λ-Calculus Grammar and Reductions ......................... 26 4.3 Encoding Booleans ................................... 28 4.4 Encoding Pairs ..................................... 29 4.5 Encoding Numbers ................................... 30 4.6 Recursion ........................................ 31 4.6.1 Recursion via Self-Application ........................ 32 4.6.2 Lifting Out Self-Application .........................
    [Show full text]
  • Implementing Functional Languages with Abstract Machines
    Implementing functional languages with abstract machines Hayo Thielecke University of Birmingham http://www.cs.bham.ac.uk/~hxt December 9, 2015 Contents Introduction Lambda calculus and programming languages CEK machine CEK machine and control Optimizations and lambda calculus Structure of the module Parsing X I Progression from: Language + Logic, Models of Computation I abstract machines, formal,\mathy" Compiling C with Clang X I Progression from: Computer Systems + Architecture, C/C++ I not so formal, by example, x86 machine code Implementing functional languages I Progression from: functional programming I builds on abstract machines and C stack I the most research-led section, goes beyond Dragon Book Language design There are trade-offs in programming language design and implementation. If you know both C and functional languages, you understand much then just knowing one of them. They are at opposite ends of spectrum of language design. First-class functions and language design trade-offs Can a function be: 1. passed as a parameter to another function? 2. returned as the result of another function? 3. defined inside another function and thereby have access to its variables? I In C, you can do 1 and 2, using function pointers, but not 3. I In Pascal, you can do 1 and 3 but not 2. Needs a \static link" in the stack frame. I In Gnu C, you can do all 3, but can get undefined behaviour from returning functions. I In functional languages, you can do all 3 without restrictions. More powerful, less efficient, as it needs a garbage collector. Big ideas in functional language implementation I Implementing languages like OCaml (or F], or Scheme, or Clojure, .
    [Show full text]
  • Closure (Computer Programming) - Wikipedia, the Free Encyclopedia
    Closure (computer programming) - Wikipedia, the free encyclopedia http://en.wikipedia.org/w/index.php?title=Closure_(computer_programm... From Wikipedia, the free encyclopedia In programming languages, a closure (also lexical closure or function closure) is a function or reference to a function together with a referencing environment—a table storing a reference to each of the non-local variables (also called free variables or upvalues) of that function.[1] A closure—unlike a plain function pointer—allows a function to access those non-local variables even when invoked outside its immediate lexical scope. The concept of closures was developed in the 1960s and was first fully implemented in 1975 as a language feature in the Scheme programming language to support lexically scoped first-class functions. The use of closures is associated with functional programming languages such as Lisp and ML. Traditional imperative languages such as Algol, C and Pascal do not support returning nested functions as results from higher-order functions. Many modern garbage-collected imperative languages support closures, such as Smalltalk (the first object-oriented language to do so),[2] OCaml, Python, Perl, Ruby, JavaScript, Go, Dart, Scala, Swift, C#, Rust, Julia and C++ since C++11. 1 Example 2 History and etymology 3 Implementation and theory 4 Applications 4.1 First-class functions 4.2 State representation 4.3 Other uses 5 Differences in semantics 5.1 Lexical environment 5.2 Closure leaving 6 Closure-like constructs 6.1 Callbacks (C) 6.2 Local classes and Lambda functions (Java) 6.3 Blocks (C, C++, Objective-C 2.0) 6.4 Delegates (C#, D) 6.5 Function objects (C++) 6.6 Inline agents (Eiffel) 7 See also 8 References 9 External links 1 of 15 6/22/2014 1:33 PM Closure (computer programming) - Wikipedia, the free encyclopedia http://en.wikipedia.org/w/index.php?title=Closure_(computer_programm..
    [Show full text]