Skip to main content

Program transformation in Programming Languages


Automatic program transformation and generative programming aimed at increasing programmer productivity by automating the programming tasks using some sort of automatic program generation or transformation, such as code generation from a domain-specific language, aspect weaving, optimization, specialization or a generic program in a specific context. Key to achieving this goal is the construction of tools to automate transformations do. If generative programming has become a staple part of the process of software engineering, the construction of generative instrument themselves become automated as possible. It requires an infrastructure with support for common tasks in the construction of the transformation of the system. The top is actually changing systems such as compilers and language extensions, static analysis tools, and aspect weavers. These functions are implemented as tool compositions from the lower layers expanded to include part of the implementation of certain transformation in question.
Syntactic transformation is the syntactic transformation that provides addresses displayed address to be generated at runtime consists of a list of symbols. Transformation is designed to provide the program code as a new symbol is added to the front of the list, when the stack is expanded to change. This transformation has two main parts: First, change every function definition so that the function takes one argument, the address. Secondly, every function application to change the current address is extended with a unique symbol (syntactic) application recognized within the program and gives it as an argument changed address is used as the function.
·        The development program is largely responsible that the development offers the prospect of semantics-based program manipulation instrument change its data as may be considered and thus automatically manipulated. Progresses have been made in some areas, such as slightly evaluation and unfold / fold transformation and application procedures such as program slicing and staging transformations. But we must push state-of-the-art so-semantic-based transformation tools can play a full role the process of software development.
·        Program transformations are used algorithm design integration program development. This will lead to a better understanding of some known algorithms and the discovery of new algorithms. The next step is to program transformation technology will gradually develop good execution of the known data structures.
·        Program transformations allow us to replace some of the other programs. For these healthy it is important to maintain transformations semantics of the original program. We also need strategies to have directed the application of the rule changes to achieve goals such as efficiency improvements, higher levels of parallelism, better modularity etc.
·        Traditionally, the program transformations used to improve the efficiency of the programs on a single machine. When the program complex parallel and distributed systems, we need tools for automated mapping program architecture. Sophisticated transformations are required to improve the performance of the entire system; there may even be such transformations must be dynamic by which to apply the adjustment program a constantly changing environment.

Comments

Popular posts from this blog

How to set up a passkey for your Apple account

  Passkeys are a new and more secure way to sign in to your Apple account. They are similar to passwords, but they are stored on your device and are not shared with Apple. This makes them more resistant to phishing attacks and other security threats. Passkeys are currently not available for Apple accounts. However, they are expected to be available in a future software update. Set up a passkey for Apple account When passkeys are available, you will be able to set up a passkey for your Apple account by following these steps: 1.     Go to the Settings app on your Apple device. 2.     Tap on your name at the top of the screen. 3.     Tap on "Password & Security." 4.     Tap on "Passkeys." 5.     Tap on "Set Up Passkey." 6.     Follow the on-screen instructions to create a passkey. Once you have created a passkey, you will be able to use it to sign in to your Apple account on...

Requirement for connecting to the Internet

The basic requirements for connecting to the Internet are a computer device. In addition,   you need the following things, to connect to the Internet: (i)           Modem (ii)          Telephone wire (iii)         Internet Service Provider (ISP) (iv)        Internet connection (v)         Web-browsing software Modem (modulator-demodulator) A modem is a device that enables a computer to transmit data over telephone or cable lines. Computer stored information digitally; information transmitted over telephone lines in the form of analog waves. A modem converts between these two forms. A modem can be either internal or external. The internal modem is attached to a slot on the motherboard. The external modem can be placed anywhere outside the system unit and connected to the ...

Approaches of comparative education

  Apollo (1986) identified eight approaches to the study of Comparative Education. They are: 1. Problem Approach or Thematic approach 2. Case study approach 3. Area study approach 4. Historical approach 5. Descriptive approach  6. Philosophical approach  7. International approach and 8.  Gastronomic approach 1. Problem approach or thematic approach —   In this approach the investigator will first of all identify a particular educational problem in his own country. Then, he will begin to look for another country that has the same problem . —   The researcher will also study the education problem of another country in relation to their culture. The researcher will not only study the educational problem of another country but he will also examine the solution applied to such problem by the affected country . 2. Case study approach   —   In this approach, an education comparativist from Nigeria can go to Iraq to study the...