Flylib.com
index_D
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
data members [See attributes]
data structures, PMCs
debug opcode (PASM)
debugging bits (Parrot)
dec opcode (PASM)
declarations
classes, PASM
objects, classes
private/public methods
siglets
subroutines
anonymous
curried
Lvalue
multiple
signatures
stubs
wrapped
decodelocaltime opcode (PASM)
decodetime opcode (PASM)
default values, parameters
deferred matches, rules
defined opcode (PASM)
definitions
anonymous classes
blocks
files, class declarations
private/public methods
roles
delegation, objects
delete opcode 2nd
delimiters, grouping
delprop opcode (PASM)
depth opcode (PASM)
deref opcode (PASM)
dereferencing
design 2nd
bytecode loader
compiler module
continuations
coroutines
cycles
events
garbage collection
I/O
interpreter module 2nd
languages 2nd 3rd
architecture
cognitive/linguistic considerations
cultural influences of
Huffman coding
principle of adaptability
principle of borrowing
principle of context
principle of distinction
principle of DWIM
principle of end weight
principle of freedom
principle of prominence
principle of reuse
principle of simplicity
syntax [See syntax]
waterbed theory of complexity
modular
multimethod dispatching
objects
optimizer module
parser module
PIR 2nd 3rd 4th 5th
signals
threads
destination registers
destruction, objects
development
cycles 2nd 3rd
internals
languages
p61 mailing list, joining
Parrot
die_hard opcode (PASM)
diff -u command
directories
dispatches, subroutines
distinction, principle of
div opcode (PASM)
division (/) operator
dlfunc opcode 2nd
dlvar opcode (PASM)
docs/ directory
does opcode (PASM)
Dominus, Mark-Jason
double underscore (_ _)
downcase opcode (PASM)
.dump method
DWIM, principle of
dynamic languages 2nd [See also languages]
Previous page
Table of content
Next page
Perl 6 and Parrot Essentials, Second Edition
ISBN: 059600737X
EAN: 2147483647
Year: 2003
Pages: 116
Authors:
Allison Randal
,
Dan Sugalski
,
Leopold Toetsch
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
Appendix B Algorithms Provided by the Bouncy Castle Provider
Visual C# 2005 How to Program (2nd Edition)
Decision Making: Equality and Relational Operators
Self-Review Exercises
Declaring a Method with a Parameter
Case Study: Random-Number Generation
Web Resources
Ruby Cookbook (Cookbooks (OReilly))
Stopping an Iteration
Managing Instance Data
Finding the Number of Rows Returned by a Query
Displaying Templates with Render
Writing Unit Tests
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA 5540 Model
Configuration Steps
Public Key Infrastructure (PKI)
Configuring IPSec Site-to-Site Tunnels Using Certificates
System Monitoring
PMP Practice Questions Exam Cram 2
Answers and Explanations
Project PlanningFacilitating Processes
Exam Prep Questions
Project Control
Answers and Explanations
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Microwave
Internet Addressing and Address Resolution
Whats Next on the Internet
HANs
Antennas
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies