Continuation-Based Multiprocessing Revisited

نویسنده

  • Mitchell Wand
چکیده

In the spring of 1979, I had seen a number of papers on implementing Scheme directly on VLSI chips. This led me to ask what were the minimal extensions to Scheme necessary to build an operating system for such a chip. It appeared that three facilities were necessary: data protection, process saving, and elementary exclusion. Although exclusion clearly required support from the underlying machine, data protection could be performed easily by hiding data in closures. The main contribution of the paper was to point out that process-saving, like data protection, required no new extensions; it could be accomplished using the technology of continuations. The model I adopted would now be called multithreading: the management of multiple threads of execution in a shared address space. This model seems to have been adopted in many Scheme implementations; it is somewhat harder to determine whether the underlying implementations are based on call/cc but it appears that at least some are. The programs were written in SCHEME 3.1, a Scheme implementation I had been working on at the time. Unlike Sussman and Steele's original implementation, this version translated the input Scheme code into a byte-code-like abstract machine code, thus forcing a clear separation between Scheme code and Lisp code. Except for reindentation, I have kept the original code intact. (catch x e) would now be written (call/cc (lambda (x) e)); block is now called begin, asetq is now called set!, and labels is now called letrec. In addition, I used a syntax for define whose meaning should be self-evident; de is a syntax for definition in the underlying Lisp. Likewise, except for fixing a few typographical errors, the text has been left unchanged, including a number of parenthetical remarks that I now find annoying and a number of occurrences of " which " that I would now change to " that. " A few clarifications and afterwords have been added as endnotes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

{16 () Continuation-based Multiprocessing *

Any multiprocessing facility must include three features: elementary exclusion, data protection, and process saving. While elementary exclusion must rest on some hardware facility (e.g., a test-and-set instruction), the other two requirements are fulllled by features already present in applicative languages. Data protection may be obtained through the use of procedures (closures or funargs), an...

متن کامل

Reliability of Microprocessor–based Protective Devices –– Revisited

The article is a continuation of a set of the author’s previous publications about the reliability of the microprocessorbased protective devices. The statistical data introduced by the author coincide with data of other authors and confirm higher reliability of electromechanical relays in comparison with microprocessor-based. The inadequacy of the criterion for estimating the reliability of the...

متن کامل

Interval Methods Revisited

This paper presents a branch & cut algorithm to nd all isolated solutions of a system of polynomial constraints. Our ndings show that fairly straightforward reenements of interval methods inspired by AI constraint propagation techniques result in a multivariate root nding algorithm that is competitive with continuation methods on most benchmarks and which can solve a variety of systems that are...

متن کامل

ACD Estimation of the S-parameter Revisited

The analytic continuation by duality (ACD) technique has been used to estimate the electroweak S parameter in technicolor models. In this letter, we investigate the reliability of this method by applying it to some toy models with known spectra. We find that in most instances the technique cannot be trusted to give a reliable result. UCTP–3/97 VPI–IPPAP–97–3 hep–ph/9702440 February 1997

متن کامل

Rough Relation Algebras Revisited

Rough relation algebras arise from Pawlak’s information systems by considering as object ordered pairs on a fixed set X . Thus, the subsets to be approximated are binary relations over X , and hence, we have at our disposal not only the set theoretic operations, but also the relational operators ; , ̆ , and the identity relation 1′. In the present paper, which is a continuation of [6], we furth...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Higher-Order and Symbolic Computation

دوره 12  شماره 

صفحات  -

تاریخ انتشار 1999