Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Define compiler? What are the various compiler construction tools describe in detail?

(b) Why intermediate code generation is not included in front end or back end?

(c) Consider the following grammar.

S     XaYb
X    bXc | b
Y    dYa | d

Determine the first set for each non-terminal of the given grammar.

problem 2)(a) Construct a Syntax-Directed Translation scheme that takes strings of a’s, b’s and c’s as input and produces as output the number of substrings in the input string that correspond to the pattern a(a|b)*c+(a|b)*b. For instance the translation of the input string “abbcabcababc” is “3”.

Your solution must include:

1. A context-free grammar that generates all strings of a’s, b’s and c’s

2. Semantic attributes for the grammar symbols

(b) What is Abstract Stack machine. Describe in detail with the help of appropriate exs?

problem 3)(a) Define lexical analysis? Also describe roles of lexical analyzer in detail.

(b) What is Input Buffer? Describe in detail?

problem 4)(a) Define Parser. Elaborate Top down parser in detail with the help of appropriate exs.

(b) Convert the following regular expression into NFA using Thompson’s construction.

a(a|b)*c+(a|b)*b

problem 5)(a) Convert NFA into DFA of the following:

i. (a | b)*

ii. (a* | b*)*

problem 6)(a) Define Type Checking. prepare down the difference between Static and Dynamic Type checking?

(b) What is the Specification of a simple Type Checker?

problem 7) Describe unification algorithm in detail with the help of appropriate exs.

problem 8)(a) Describe Back patching in detail with the help of suitable exs.

(b) describe Procedure Call with the appropriate ex.

problem 9) Convert the following LR grammar to right recursive grammar:

E → E + T / E – T / T
T → T x F / T / F / F
F → (E) / Numbers
Numbers → 0/1/2………………/9.

problem 10) prepare a brief notes on the following topics:

(a) Peephole optimization

(b) Loops in flow graphs

(c) Iterative solution of data-flow equations.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95961

Have any Question? 


Related Questions in Computer Engineering

Given is a dhke algorithm the modulus p has 1024 bit and

Given is a DHKE algorithm. The modulus p has 1024 bit and α is a generator of a subgroup where ord(α) ≈ 2160. 1. What is the maximum value that the private keys should have? 2. How long does the computation of the sessio ...

Iris called the company security hotline the hotline was an

Iris called the company security hotline. The hotline was an anonymous way to report any suspicious activity or abuse of company policy, although Iris chose to identify herself. The next morning, she was called to a meet ...

Describe the concepts of confidentiality integrity and

Describe the concepts of confidentiality, integrity, and availability (C-I-A), and explain each of the seven domains of a typical IT infrastructure. Summarize the threat triad, and explain how security personnel can main ...

Using a risk assessment and business impact analysiswrite a

Using a risk assessment and business impact analysis. Write a draft memo to the president of the university explaining the need for a business continuity plan. Be sure to include your recommendations on how you would imp ...

1 what is the clock cycle time in a pipelined and

1. What is the clock cycle time in a pipelined and non-pipelined processor? 2. What is the total latency of an LW instruction in a pipelined and non-pipelined processor? 3. If we can split one stage of the pipelined data ...

Discuss the impact of threaded binary tree on the tree

Discuss the impact of threaded binary tree on the tree traversal procedure. g. Obtain the optimal Huffman codes for the messages (M1,...,M7) with relative frequencies (q1,...,q7)=(4,5,7,8,10,12,20). Draw the decode tree ...

Discussion questionpersonal factors such as anger revenge

Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate security ...

1 convert the following c function to the corresponding

1. Convert the following C function to the corresponding MIPS assembly procedure:  int count(int Model[], Color[], Year[], int n, intx,y,z) {   int res = 0;                 inti = 0;  for(i = 0; i != n; i++)              ...

Assignmentgame scissors rock paper write a program that

Assignment (Game: scissors, rock, paper) Write a program that plays the popular scissor-rock-paper game. (A scissor can cut a paper, a rock can knock a scissor, and a paper can wrap a rock.) The program randomly generate ...

Computerized analysis of yahoos annual reports and

Computerized Analysis of Yahoo's Annual Reports and Financial Statements Section 1: Accounting for decision making Name five stakeholders that are relevant to Yahoo Briefly explain how specific accounting information cou ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen