Proceedings of the 14th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages - POPL '87 1987
DOI: 10.1145/41625.41654
|View full text |Cite
|
Sign up to set email alerts
|

A calculus for assignments in higher-order languages

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

1987
1987
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(43 citation statements)
references
References 8 publications
0
43
0
Order By: Relevance
“…The implementation 1 and complete formal semantics 2 are publicly available. The interpreter is modeled after a CESK machine [3], extended with a value register named v for storing the value of the last expression that was evaluated. Execution of a program therefore proceeds through following a set of CESK state transitions.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The implementation 1 and complete formal semantics 2 are publicly available. The interpreter is modeled after a CESK machine [3], extended with a value register named v for storing the value of the last expression that was evaluated. Execution of a program therefore proceeds through following a set of CESK state transitions.…”
Section: Discussionmentioning
confidence: 99%
“…Interpreters may implement these as they wish, allowing for maximal decoupling between the tracer and the interpreter. To give a concrete example however, when using a CESK machine as an interpreter [3], the program state would be the CESK state while a restartpoint may simply be the control component of this state. In this case, the restart function could then be implemented as a function that takes this control component and merges it with the rest of the CESK state, i.e., the environment, store and continuation stack.…”
Section: Tracing Interfacementioning
confidence: 99%
“…This machine is just the CESK machine of Felleisen & Friedman (1987). From here, we further exploit the store to allocate continuations, which corresponds to a well-known implementation technique used in functional language compilers (Shao & Appel, 1994).…”
Section: From Cek To the Abstract Ceskmentioning
confidence: 99%
“…We start with an operational abstract machine that extends a control-store machine [16,17] with a remote procedure call mechanism. This abstract machine then generates structural and scoping constraints on event sequences, and so "bootstraps" the game semantics.…”
Section: Contract Expressivenessmentioning
confidence: 99%
“…This machine includes both code (C) and a store (S), and so in part functions much like Felleisen's C, S machine [16,17]. The [CALL] rule performs standard β-reduction within an evaluation context E. The rule [PRIM] leverages an auxiliary δ function to define the semantics of primitives.…”
Section: Semantics Of Modulesmentioning
confidence: 99%