Flylib.com
index_L
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
labels
languages 2nd [See also PASM]
design 2nd
architecture
cognitive/linguistic considerations
cultural influences of
Huffman coding
principle of adaptability
principle of borrowing
principle of context
principle of distinction
principle of DWIM
principle of end weight
principle of freedom
principle of prominence
principle of reuse
principle of simplicity
syntax [See syntax]
waterbed theory of complexity
development
modular design
OO (object-oriented)
optimizing
rules
yacc grammars
LANGUAGES.STATUS file
languages/directory
lazy list context
lcm opcode (PASM)
le (less than or equal) opcode (PASM)
le_num opcode (PASM)
le_str opcode (PASM)
length opcode 2nd
let blocks
lexical scope, closures
lexical variables , PASM 2nd
lexically scoped classes
lexically scoped subroutines
lexing
lib/ directory
linguistic language design considerations
lists
context 2nd
for loops
hyper operators
matching
operators
pairs, named argument passing
parameters
ln opcode (PASM)
load_bytecode
loading bytecode 2nd
loadlib opcode (PASM)
.local directive
local labels
.local statement
localtime opcode (PASM)
log10 opcode (PASM)
log2 opcode (PASM)
logical operations, PASM
logical operators
long- term usability
lookback opcode (PASM)
loops
breaking out of
flow control
for
simple
while
lsr opcode (PASM)
lt (less than) opcode (PASM)
lt_num opcode (PASM)
lt_str opcode (PASM)
Lvalue subroutines
Previous page
Table of content
Next page
Perl 6 and Parrot Essentials, Second Edition
ISBN: 059600737X
EAN: 2147483647
Year: 2003
Pages: 116
Authors:
Allison Randal
,
Dan Sugalski
,
Leopold Toetsch
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Phase: Envision
Practice: Process and Practice Tailoring
Speculate Summary
Practice: Daily Interaction with the Customer Team
Explore Summary
SQL Hacks
Hack 16. Search for a String Across Columns
Hack 44. Tunnel into MySQL from Microsoft Access
Hack 67. Lock Implicitly Within Transactions
Hack 77. Fill in Missing Values in a Pivot Table
Hack 96. Create an Audit Trail
Java How to Program (6th Edition) (How to Program (Deitel))
(Optional) GUI and Graphics Case Study: Drawing Arcs
Terminology
Overloading Generic Methods
Generic Classes
Using Menus with Frames
Cisco CallManager Fundamentals (2nd Edition)
Case Studies
MGCP Gateways
Media Processing Overview
Understanding Field Data in CMRs
Appendix C. Protocol Details
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
Partial Page Rendering
Built-in Application Services
Building AJAX Applications with ASP.NET
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Exam Prep Questions
Project Control
Exam Prep Questions
Project Closing
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies