Concepts+Techniques+and+Models+of+Computer+Programming_Part32

Concepts+Techniques+and+Models+of+Computer+Programming_Part32

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
888 INDEX as component, 420 basic operations, 57 importance, 55 order, 180 tail-recursive, 74 procedure value (closure), 54 , 66–67 , 795 anonymous, 54 common limitation, 182, 558 distributed lexical scoping, 728 encoding as an object, 547 higher-order programming, 180 relation to inner class, 558 process concurrent program design, 372 CSP, 629 distributed system, 713 Erlang, 357, 397 large program design, 454 operating system, 259 producer and consumer, 730 runtime error, 97 small program design, 221 processor, 241 cluster computing, 717 dataflow machine, 343, 473 parallel functional programming, 337 shared-memory multiprocessor, 716 producer, 262 profiling, 180 , 455 program design, see software develop- ment program point, 448 programming, xxix ,3 component-based, 420 concurrent, 581 constraint, 45 data-centered, 584 declarative, 31 , 415 descriptive, 117 need for algorithms, 119 programmable, 117 Erlang, 395 flow-based, 261 functional, 415 future developments, 464 good style, xxxv Haskell, 327 higher-order, 116, 126, 180–197 introduction, 15 relation to object-oriented, 544 imperative, 31, 415 Java, 558, 625 kernel language approach, xxx logic, 45, 102, 145, 415, 644 multi-agent, 420, 584 multiparadigm, xxviii, xl event manager, 573 object-based, 21, 543 object-oriented, 21, 421 open, 107 , 205 paradigm, xxvii, xxx, xxxi, 32, see computation model Prolog, 676 real-time, 309 relational, 633 stateful, 31 stateless, 31 synchronous, 271 techniques not covered in this book, xli programming model, xxvii, 31 Prolog, 673–684 proof engineering, 119 proof rule, 447 propagate-and-search, 641 property liveness, 611 object, 502 safety, 611 propositional logic, 644 protected scope, 514 C++ sense, 515 Java sense, 574 protection boundary, 205 protector, 326 protocol, 361 by-need, 287 communication, 721 consistency, 718 DHCP, 209 distributed binding, 739 distributed unification, 739 eager copy, 739 eager immediate copy, 740 Copyright c ± 2001-3 by P. Van Roy and S. Haridi. All rights reserved.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
INDEX 889 interaction (in GUI), 693 invalidation, 739 IP, 209 lazy copy, 739 meta-object, 522 mobile state, 739 negotiation, 384 short-circuit, 567 stationary state, 738 TCP, 718, 745, 746 timer, 376 pseudorandom numbers, 477 Psion Series 3 palmtop computer, 385 public scope, 513 pure object-oriented language, 549 quadratic equation, 181 quantifier, 445, 448 , 645, 657 existential (in Prolog), 684 quantum (in thread scheduling), 257 query database, 668 logic programming, 646 queue, 149 amortized ephemeral, 150 amortized persistent, 303 breadth-first traversal, 159 concurrent, 387, 592 priority, 614, 623 worst-case ephemeral, 151 worst-case persistent, 304 race condition, 22 , 238 raise statement, 94 , 803 random number generation, 476 Raymond, Eric, 466 reachable memory, 75 real-time computing garbage collection, 78 hard, 177, 257, 259, 309 soft, 309 reasoning algebraic, 114, 118, 324 atomic action, 588 causal, 361, 583 lift control system, 381 logical, xxxiii, 114, 644
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 08/10/2011.

Page1 / 9

Concepts+Techniques+and+Models+of+Computer+Programming_Part32

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online