Scheme general
1
Name:
Anonymous
2013-04-20 5:34
Can anyone recommend me some algorithms to implement, as i cant find anything to write, and the allmighty Scheme must be fed with code! Also, how does call-cc work?
2
Name:
Anonymous
2013-04-20 5:44
smoke weed erryday
3
Name:
Anonymous
2013-04-20 5:53
Implement a CPS code transformer. Here is an example in Common Lisp
(defun cps-progn-rec (l k)
(let ((sym (gensym)))
(if l
`(lambda (,sym) ,(cps (car l) (cps-progn-rec (cdr l) k)))
k)))
(defun cps-progn (l k)
(if (consp l)
(caddr (cps-progn-rec l k))
(cps nil k)))
(defun cps (expr k)
(cond
((atom expr) `(,k ,expr))
((eql (first expr) 'quote) `(,k ,expr))
((eql (first expr) 'lambda)
`(lambda ,(second expr) ,(cps-progn (cddr expr) k)))
((eql (first expr) 'if)
(let ((test (gensym)))
(cps (second expr)
`(lambda (,test)
(if ,test
,(cps (third expr) k)
,(cps (fourth expr) k))))))
(t
(let* ((args (rest expr))
(syms (mapcar (lambda (x) (if (atom x) x (gensym))) args))
(result `(,(first expr) ,@syms ,k)))
(loop
as sym in (reverse syms)
as arg in (reverse args)
do (if (not (atom arg))
(setf result (cps arg `(lambda (,sym) ,result)))))
result))))
4
Name:
Anonymous
2013-04-20 5:55
Write a bitcoin miner that uses the timestamps in the bounce messages given by invalid email to do the calculations.
5
Name:
Anonymous
2013-04-20 17:04
Not shitposting related.
Sage this shit.
6
Name:
Anonymous
2013-04-20 18:46
7
Name:
Anonymous
2013-04-20 19:06
1. Everything on rosettacode.
2. (call/cc call/cc)
8
Name:
Anonymous
2013-04-20 23:40
Searching for legit Microsoft Product keys, Windows 8,7,Studio,Server etc.?
Mail me at jeremiahgoldstein@hotmail.com
25$ a pop
Searching for legit Microsoft Product keys, Windows 8,7,Studio,Server etc.?
Mail me at jeremiahgoldstein@hotmail.com
25$ a pop
Searching for legit Microsoft Product keys, Windows 8,7,Studio,Server etc.?
Mail me at jeremiahgoldstein@hotmail.com
25$ a pop
Newer Posts