Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Define compiler? What are the various compiler construction tools describe in detail?

(b) Why intermediate code generation is not included in front end or back end?

(c) Consider the following grammar.

S     XaYb
X    bXc | b
Y    dYa | d

Determine the first set for each non-terminal of the given grammar.

problem 2)(a) Construct a Syntax-Directed Translation scheme that takes strings of a’s, b’s and c’s as input and produces as output the number of substrings in the input string that correspond to the pattern a(a|b)*c+(a|b)*b. For instance the translation of the input string “abbcabcababc” is “3”.

Your solution must include:

1. A context-free grammar that generates all strings of a’s, b’s and c’s

2. Semantic attributes for the grammar symbols

(b) What is Abstract Stack machine. Describe in detail with the help of appropriate exs?

problem 3)(a) Define lexical analysis? Also describe roles of lexical analyzer in detail.

(b) What is Input Buffer? Describe in detail?

problem 4)(a) Define Parser. Elaborate Top down parser in detail with the help of appropriate exs.

(b) Convert the following regular expression into NFA using Thompson’s construction.

a(a|b)*c+(a|b)*b

problem 5)(a) Convert NFA into DFA of the following:

i. (a | b)*

ii. (a* | b*)*

problem 6)(a) Define Type Checking. prepare down the difference between Static and Dynamic Type checking?

(b) What is the Specification of a simple Type Checker?

problem 7) Describe unification algorithm in detail with the help of appropriate exs.

problem 8)(a) Describe Back patching in detail with the help of suitable exs.

(b) describe Procedure Call with the appropriate ex.

problem 9) Convert the following LR grammar to right recursive grammar:

E → E + T / E – T / T
T → T x F / T / F / F
F → (E) / Numbers
Numbers → 0/1/2………………/9.

problem 10) prepare a brief notes on the following topics:

(a) Peephole optimization

(b) Loops in flow graphs

(c) Iterative solution of data-flow equations.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95961

Have any Question? 


Related Questions in Computer Engineering

1 provide to string and equals methods for the question and

1. Provide to String and equals methods for the Question and Choice Question classes of How To 10.1. 2. Implement a subclass Square that extends the Rectangle class. In the constructor, accept the x- and y-positions of t ...

Application jurisdictional aspects of cybercrimeyou are

Application: Jurisdictional Aspects of Cybercrime You are using your wireless device to locate a restaurant. Suddenly, a large flashing skull-and-crossbones appears on your screen and a menacing laugh plays. Seconds late ...

Let m and c be random variables that take values from the

Let M and C be random variables that take values from the set of possible plaintexts and the set of possible ciphertexts for some cryptosystem. Prove that the cryptosystem provides perfect secrecy if and only if p(M | C) ...

1 list the possible values of c and d for an implementation

1. List the possible values of C and D for an implementation that ensures both consistency assumptions on page 470. 2. List at least one more possible pair of values for C and D if such assumptions are not maintained. 3. ...

Why are system safety principles not used by all safety

Why are system safety principles not used by all safety professionals? Suggest some ways to overcome the obstacles to wider adoption of system safety. Your response must be at least 75 words in length

What functions does the internal security consultant

What functions does the internal security consultant perform, and what are the key qualifications and requirements for the position? What is the rationale for acquiring professional credentials? List and describe the cer ...

In practice the short exponents e 3 17 and 216 1 are

In practice the short exponents e = 3, 17 and 216 +1 are widely used. 1. Why can't we use these three short exponents as values for the exponent d in applications where we want to accelerate decryption? 2. Suggest a mini ...

The power of marketingmarketers cannot create demand or

The Power of Marketing Marketers cannot create demand or make people buy things that they don't want or need. However marketing is designed to persuade, inform, and remind people about the availability, choices, features ...

Building one model from another related to exploration 15

Building one model from another Related to exploration 15, more generally, another way to build a model of a phenomenon you wish to model is to take a model that you already have that uses a similar mechanism to the mode ...

1 what is a vulnerability scanner how is it used to improve

1. What is a vulnerability scanner? How is it used to improve security? 2. What is the difference between active and passive vulnerability scanners? 3. What kind of data and information can be found using a packet sniffe ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen