Self-interpreter for Prolog by Aseel Alkhelaiwi a Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science University of Rhode Island
نویسندگان
چکیده
The semantics of Prolog programs is usually given in terms of model theoretic semantics. However, this does not adequately characterize the computational behavior of Prolog programs. Prolog implementations typically use a depth-first, left-to-right evaluation strategy based on the textual order of clauses and literals in a program. In this paper we introduce a self-interpreter for Prolog, which is a formalization of the syntax and semantics of Prolog using Prolog. This interpreter is a running program that mimics the depth-first, left-to-right evaluation strategy of Prolog interpreters. This means that, the computational behavior of Prolog is captured by obtaining an operational semantics of Prolog based on the logic + control perspective of Prolog. In addition, this paper explains the important difference between the self-interpretation approach used in this paper and the meta-circular interpretation approach. And how self-interpretation considered a true semantic definition of the object language as it sheds light onto all features of the object language, and does not hide features in the features of the defining language.
منابع مشابه
Thesis Submitted in Partial Fulfillment of the requirement for the Degree of M.A/M. Sc In School consultant
Goal: The aim of this study is assess and compare emotional ability of deaf. Semi _ deaf and hearing students (14 _ 20) in Mashhad. Method: To do this experiment out of studies evidence generally 105 students selecting randomly. From each group, choose the number of normal boys and girls 35, deaf boys and girls and semi deaf boys and girls .this article is useful and explanatory .in this stud...
متن کاملMultimedia Content’s Metadata Management for Pervasive Environments by Fitsum Meshesha a Thesis Submitted to the School of Graduate Studies of Addis Ababa University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Computer Science
.................................................................................................................................................................. V
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملMachine Learning Approaches to siRNA Efficacy Prediction
OF THESIS Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science Computer Science The University of New Mexico Albuquerque, New Mexico May, 2005 Machine Learning Approaches to siRNA Efficacy Prediction by Sahar Abubucker B.E., Madras University, 2000 M.S., Computer Science, University of New Mexico, 2005
متن کاملExact Algorithms for the Reversal Median Problem
OF THESIS Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science Computer Science The University of New Mexico Albuquerque, New Mexico
متن کامل