source: doc/theses/mike_brooks_MMath/conclusion.tex@ d2e6f84

Last change on this file since d2e6f84 was 8a5aeac, checked in by Peter A. Buhr <pabuhr@…>, 5 weeks ago

more proofreading of conclusion

  • Property mode set to 100644
File size: 3.0 KB
Line 
1\chapter{Conclusion}
2
3This thesis performed a detailed examination of the three most important high-level containers in many programming languages: array, linked-list, and string.
4The goal of the work is to make containers easier to use, performant and safer.
5Since some subset of these three containers are used in almost every program in every programming language, this is a laudable goal.
6Accomplishing this goal in C is difficult because these features are poorly designed.
7In contrast, \CFA's advanced type system and language features plus my critical design choices made it possible to provide better support with significant safety.
8The result is application code that is easier to write, understand, maintain, and safer from hacker attach-vectors.
9
10\section{Lists}
11
12The key takeaway for lists is that intrusive lists can be made easy to use, performant by eliminating implicit memory allocation, and able to simulate wrapped lists, whereas wrapped lists cannot simulate intrusive lists.
13
14\section{Arrays}
15
16The key takeaway for arrays is that the type system must be extended to properly manage array bounds (dimensions) to safely pass arrays to (polymorphic) functions.
17By adding a special kind of template constant to \CFA, @[N]@, the type system understands array bounds and implicitly associates these bounds with array instances, statically and dynamically, throughout the programming language.
18Array overruns are no longer possible because all subscripting is checked, as in other modern languages.
19Subscript checking can be implicitly elided when the compiler is given sufficient information to determine the subscript variable is always in bounds, giving performant execution.
20
21Safe, complex VLA's is another important feature because it replaces unsafe explicit dynamic allocation.
22As well, VLA's reduce heap contention in concurrent programs.
23
24Finally, the ability to slice a higher-dimensional array into subarrays is also a powerful and safety critical feature.
25
26
27\section{Strings}
28
29The key takeaway for strings is that providing powerful and safe block operations for manipulating strings is more important than ultra-level performance.
30Manipulating strings is always going to be expensive because of their dynamic variable sizing, as the hardware rarely has string-level operations, possibly only move and compare.
31This work designs an expressive set of safe string operations for composing, comparing, and decomposing arbitrary length strings, include complex reading and printing operations.
32
33Creating bespoke storage management for strings has the advantage of faster, more compact storage management due to string sharing, at the cost of additional external fragmentation between the string and general heaps.
34With the large amounts of available memory, this approach is a viable tradeoff.
35
36
37
38\section{Future Work}
39
40All three forms of containers presented in this work are in their nascence, both in design and implementation.
41This work provides the foundation for future \CFA students to add more functionality along with robust and performant implementations.
42
Note: See TracBrowser for help on using the repository browser.