An Introduction To Partial Evaluation

Download An Introduction To Partial Evaluation PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get An Introduction To Partial Evaluation book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Partial Evaluation and Automatic Program Generation

Partial evaluation reconciles generality with efficiency by providing automatic specialization and optimization of programs. This book covers the entire field of partial evaluation; provides simple and complete algorithms; and demonstrates that specialization can increase efficiency.
Partial Evaluation and Mixed Computation

The aim of Partial Evaluation and Mixed Computation is to construct, when given a program and some form of restriction on its usage (e.g. knowledge of some but not all of its input parameter values), a more efficient new or ''residual'' program that is equivalent to the original program when used according to the restriction. Compiling and compiler generation are just two of the many applications. It is thus a form of program transformation, but with more emphasis on purely automatic methods than traditional program transformation. This volume collects a variety of examples of current work in the field. The papers demonstrate the vitality of this emerging area with contributions covering many different aspects, such as programming languages, application areas, degrees of automation, degrees of formality, and technical methods.
Foundations of Secure Computation

The final quarter of the 20th century has seen the establishment of a global computational infrastructure. This and the advent of programming languages such as Java, supporting mobile distributed computing, has posed a significant challenge to computer sciences. The infrastructure can support commerce, medicine and government, but only if communications and computing can be secured against catastrophic failure and malicious interference.