Changeset 98da9e8


Ignore:
Timestamp:
Mar 22, 2026, 9:31:28 PM (9 hours ago)
Author:
Peter A. Buhr <pabuhr@…>
Branches:
master
Parents:
8d764d4f
Message:

final proofread of conclusion

File:
1 edited

Legend:

Unmodified
Added
Removed
  • doc/theses/mike_brooks_MMath/conclusion.tex

    r8d764d4f r98da9e8  
    66Accomplishing this goal in C is difficult because these features are poorly designed.
    77In contrast, \CFA's advanced type system and language features plus my critical design choices made it possible to provide better support with significant safety.
    8 The result is application code that is easier to write, understand, maintain, and safer from hacker attach-vectors.
     8The result is application code that is easier to write, understand, maintain, and significantly safer from hacker attach-vectors.
     9Finally, the performance sections for each container demonstrated that safety does not have to reduce performance, \ie rolling-your-own container is now an excuse not a reason.
    910
    10 \section{Lists}
    11 
    12 The key takeaway for lists is that intrusive lists can be made easy to use, performant by eliminating implicit memory allocation, and able to simulate wrapped lists, whereas wrapped lists cannot simulate intrusive lists.
    1311
    1412\section{Arrays}
     
    1816Array overruns are no longer possible because all subscripting is checked, as in other modern languages.
    1917Subscript checking can be implicitly elided when the compiler is given sufficient information to determine the subscript variable is always in bounds, giving performant execution.
     18Indirectly, simple and complex VLA's reduce heap allocation resulting in better performance (up to an order of magnitude in comparisons with @std::vector@) and no contention in concurrent programs.
     19Any reduction of dynamic allocation is always a safety benefit.
     20Finally, language subarray slicing of higher-dimensional arrays is also a powerful and safety critical feature versus programmers attempting it themselves.
    2021
    21 Safe, complex VLA's is another important feature because it replaces unsafe explicit dynamic allocation.
    22 As well, VLA's reduce heap contention in concurrent programs.
    2322
    24 Finally, the ability to slice a higher-dimensional array into subarrays is also a powerful and safety critical feature.
     23\section{Lists}
     24
     25The key takeaway for lists is that intrusive lists can be made easy to use, performant by eliminating implicit memory allocation, and able to simulate wrapped lists, whereas wrapped lists cannot simulate intrusive lists.
     26As well, the \CFA list-API eliminates many frustrating and error-prone requirements with \CC STL lists, \eg, a node can be returned and removed in a single operation (no 2-step @front@/@pop@), and an arbitrary node can be added/removed without the need for an iterator.
     27As for \CC, the \CFA list API is powerful enough to reduce almost all common C list errors, substantially increasing program safety.
    2528
    2629
    2730\section{Strings}
    2831
    29 The key takeaway for strings is that providing powerful and safe block operations for manipulating strings is more important than ultra-level performance.
     32The key takeaway for strings is that providing powerful and safe block-operations for manipulating strings is more important than ultra-level performance.
    3033Manipulating strings is always going to be expensive because of their dynamic variable sizing, as the hardware rarely has string-level operations, possibly only move and compare.
    31 This work designs an expressive set of safe string operations for composing, comparing, and decomposing arbitrary length strings, include complex reading and printing operations.
    32 
    33 Creating bespoke storage management for strings has the advantage of faster, more compact storage management due to string sharing, at the cost of additional external fragmentation between the string and general heaps.
     34The new \CFA string API is a very expressive set of safe string operations for composing, comparing, and decomposing arbitrary length strings, include complex reading and printing operations.
     35All low-level mechanisms for working with string, in any programming language, are error-prone in correctness and safety (back to working with arrays).
     36Providing string lengths is also a significant safety improvement, while still working with compiler null-terminate string constants (as for \CC).
     37As well, overloading C string operations to work with \CFA strings provides a safe vector for updating existing C programs manipulating strings.
     38Finally, creating bespoke storage management for strings has the advantage of faster, more compact storage management due to string sharing, at the cost of additional external fragmentation between the string and general heap.
    3439With the large amounts of available memory, this approach is a viable tradeoff.
    35 
    3640
    3741
     
    4044All three forms of containers presented in this work are in their nascence, both in design and implementation.
    4145This work provides the foundation for future \CFA students to add more functionality along with robust and performant implementations.
    42 
     46Completing the syntax change from @array@ to C-style for dimensions and subscripts is possibly the most important first step to fit with C-programmer expectation resulting in faster adoption.
     47Also, adding a panoply of additional intrusive lists, \eg stack, queue, dequeue, \etc, is needed to complement the @list@ structure.
     48I left all the infrastructure to accomplish these task, they just need time to complete.
Note: See TracChangeset for help on using the changeset viewer.