<--- Back to Details
First PageDocument Content
Software engineering / Computer programming / Computing / Control flow / Procedural programming languages / Eval / Scheme / Anonymous function / Infinite loop / Assignment / Conditional / Meta-circular evaluator
Date: 2005-12-02 09:25:33
Software engineering
Computer programming
Computing
Control flow
Procedural programming languages
Eval
Scheme
Anonymous function
Infinite loop
Assignment
Conditional
Meta-circular evaluator

Project 5 - The Meta-Circular Evaluator

Add to Reading List

Source URL: sicp.csail.mit.edu

Download Document from Source Website

File Size: 60,08 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / QUAD / Quadratic form / Digital signature / Quadratic function / XSL attack

HMFEv - An Efficient Multivariate Signature Scheme Albrecht Petzoldt1(B) , Ming-Shing Chen2 , Jintai Ding3 , and Bo-Yin Yang2 1 National Institute for Standards and Technology, Gaithersburg, MD, USA

DocID: 1xVxV - View Document

Software engineering / Computer programming / Computing / Programming languages / Object-oriented programming languages / Functional programming / Procedural programming languages / Subroutines / Scheme / Parameter / Lisp / Anonymous function

Keyword and Optional Arguments in PLT Scheme Matthew Flatt Eli Barzilay University of Utah and PLT

DocID: 1xVfP - View Document

Cryptography / Multivariate cryptography / Equations / Post-quantum cryptography / Quadratic / RSA / QUAD / Algebraic geometry / Algebraic equation / Elliptic Curve Digital Signature Algorithm / Polynomial

A More Secure and Efficacious TTS Signature Scheme   Jiun-Ming Chen and Bo-Yin Yang

DocID: 1xV6f - View Document

Finance / Money / Economy / Funds / Investment / SICAV / Specialized investment fund / Umbrella fund / Investment fund

NET ASSET VALUE (€) - LOCALLY-BASED COLLECTIVE INVESTMENT SCHEMES JUNE 2015 Scheme Name Sub-Fund Name

DocID: 1xUOy - View Document

Quantum information science / Theoretical computer science / Quantum mechanics / Quantum cryptography / Cryptography / Quantum computing / BB84 / Qubit / Quantum key distribution / Quantum information / Controlled NOT gate / Quantum money

Lecture 8, Thurs Feb 9: More on Quantum Money, BB84 QKD Guest Lecture by Supartha Podder Continuation of Quantum Money Last time we discussed how classical money is copyable and described a scheme for making money uncopy

DocID: 1xUoL - View Document