Get Concurrent Programming in ML PDF

By John H. Reppy

ISBN-10: 0511574967

ISBN-13: 9780511574962

ISBN-10: 0521480892

ISBN-13: 9780521480895

ISBN-10: 0521714729

ISBN-13: 9780521714723

Concurrent Programming ML (CML), incorporated as a part of the SML of recent Jersey (SML/NJ) distribution, combines the easiest positive factors of concurrent programming and useful programming. This sensible, "how-to" booklet makes a speciality of using concurrency to enforce clearly concurrent purposes. as well as an instructional creation to programming in CML, the booklet offers 3 prolonged examples utilizing CML for sensible platforms programming: a parallel software program construct procedure, an easy concurrent window supervisor, and an implementation of allotted tuple areas. This booklet additionally illustrates complicated SML programming suggestions, and incorporates a bankruptcy at the implementation of concurrency utilizing positive factors supplied by way of the SML/NJ approach. it will likely be of curiosity to programmers, scholars, researchers operating in computing device language improvement.

Show description

Read or Download Concurrent Programming in ML PDF

Best software design & engineering books

Jim Highsmith's Agile Software Development Ecosystems PDF

It truly is no ask yourself "agile" software program improvement equipment are swiftly rising in popularity: they promise builders extra appreciate and not more paperwork, extra pace and not more aggravation, a better probability of undertaking luck, and no more probability of going stark raving bonkers alongside the way in which. yet which agile method (if any) is correct in your association?

Download e-book for kindle: Distributed Services with OpenAFS for Enterprise and by Franco Milicchio

This ebook exhibits intimately the right way to construct enterprise-level safe, redundant, and hugely scalable prone from scratch on most sensible of the open resource Linux working procedure, appropriate for small businesses in addition to great universities. The middle structure offered relies on Kerberos, LDAP, AFS, and Samba. assurance indicates the best way to combine net, message similar, info base and different providers with this spine.

Read e-book online Architecting the Telecommunication Evolution: Toward PDF

Service-oriented structure (SOA) makes use of prone because the baseline for constructing new architectures and functions, as networks are outfitted particularly to meet carrier requisites. such a lot providers are at present dealt with over diverse networks, yet more moderen companies will quickly require cross-network aid.

Get Software Defined Networks: A Comprehensive Approach PDF

Software program outlined Networks: A entire technique, moment version offers in-depth insurance of the applied sciences jointly referred to as software program outlined Networking (SDN). The ebook indicates how one can clarify to company decision-makers the advantages and hazards in moving elements of a community to the SDN version, while to combine SDN applied sciences in a community, and the way to boost or gather SDN functions.

Additional info for Concurrent Programming in ML

Sample text

This use of a function as an argument is a standard technique to delay a computation in a call-by-value language. The newly created thread is called the child, and its creator is the parent. The return value of spawn is a thread ID that uniquely identifies the child thread. 2 The child thread will run until the evaluation of the function application is complete, at which time it terminates. CML does not attach any semantics to the parent-child relationship. For example, the termination of the parent thread does not affect the child — once created, the child thread is an independent agent.

As we saw above, when the operations on a shared value consist of a sequence of statements, concurrent execution of the operations by two or more threads can result in indeterminate results. To avoid this, the operations must be executed atomically. For example, if the assignment statements in the above example are atomic, then the answer will always be 3. Mutual exclusion synchronization is used to ensure that processes execute the critical regions atomically. The other situation arises when the state of the shared object determines which operations are enabled.

2 Mutex locks and condition variables The term mutex lock is essentially another name for a binary semaphore (it is a contraction of “mutual exclusion”). A mutex lock has two states: locked or unlocked. One of the advantages of mutex locks is that they are supported naturally by the test-and-set instruction found on many multiprocessors. Mutex locks are meant to be used to control access to shared data. The idea is that each piece of shared data has an associated lock, which a process must acquire before it can access the data.

Download PDF sample

Concurrent Programming in ML by John H. Reppy

by Richard

Rated 4.15 of 5 – based on 36 votes