Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Define compiler? What are the various compiler construction tools describe in detail?

(b) Why intermediate code generation is not included in front end or back end?

(c) Consider the following grammar.

S     XaYb
X    bXc | b
Y    dYa | d

Determine the first set for each non-terminal of the given grammar.

problem 2)(a) Construct a Syntax-Directed Translation scheme that takes strings of a’s, b’s and c’s as input and produces as output the number of substrings in the input string that correspond to the pattern a(a|b)*c+(a|b)*b. For instance the translation of the input string “abbcabcababc” is “3”.

Your solution must include:

1. A context-free grammar that generates all strings of a’s, b’s and c’s

2. Semantic attributes for the grammar symbols

(b) What is Abstract Stack machine. Describe in detail with the help of appropriate exs?

problem 3)(a) Define lexical analysis? Also describe roles of lexical analyzer in detail.

(b) What is Input Buffer? Describe in detail?

problem 4)(a) Define Parser. Elaborate Top down parser in detail with the help of appropriate exs.

(b) Convert the following regular expression into NFA using Thompson’s construction.

a(a|b)*c+(a|b)*b

problem 5)(a) Convert NFA into DFA of the following:

i. (a | b)*

ii. (a* | b*)*

problem 6)(a) Define Type Checking. prepare down the difference between Static and Dynamic Type checking?

(b) What is the Specification of a simple Type Checker?

problem 7) Describe unification algorithm in detail with the help of appropriate exs.

problem 8)(a) Describe Back patching in detail with the help of suitable exs.

(b) describe Procedure Call with the appropriate ex.

problem 9) Convert the following LR grammar to right recursive grammar:

E → E + T / E – T / T
T → T x F / T / F / F
F → (E) / Numbers
Numbers → 0/1/2………………/9.

problem 10) prepare a brief notes on the following topics:

(a) Peephole optimization

(b) Loops in flow graphs

(c) Iterative solution of data-flow equations.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95961

Have any Question? 


Related Questions in Computer Engineering

1 why is pki so vital in modern communications2 discuss the

1. Why is PKI so vital in modern communications? 2. Discuss the role of digital signatures in modern communication. 3. Some say that with the development of systems such as IPSec, the role the CAs play in modern communic ...

Term paper crowdsourcingcrowdsourcing in the field of

Term Paper: Crowdsourcing Crowdsourcing in the field of interface design takes tasks traditionally performed by specific individuals and spreads them out among a group of people or a community. These assignments are usua ...

1 does the rapid development of computer technology put any

1. Does the rapid development of computer technology put any strain on the existing criteria for updates? 2. Study and compare TCSEC, ITSEC, and CC assurance levels. 3. Trace the evolution of the security evaluation crit ...

1 describe the tracking methodology used in hcc and discuss

1. Describe the tracking methodology used in HCC and discuss each method to provide a basis for choosing one of them for a particular application. 2. Describe the tracking methodology used in fuzzy logic control and comp ...

Programming assignment linker you are to implement a

Programming Assignment: Linker You are to implement a two-pass linker and submit the source code, which we will compile and run. Submit your source code together with a Makefile as a ZIP file with directory through NYU C ...

1 which law was specifically created to deal with

1. Which law was specifically created to deal with encryption policy in the United States? 2. What is privacy in an information security context? 3. What is another name for the Kennedy-Kassebaum Act (1996), and why is i ...

1 using rfc 1939 assume a pop3 client is in the

1. Using RFC 1939, assume a POP3 client is in the download-and-keep mode. Show the transaction between the client and the server if the client has only two messages of 192 and 300 bytes to download from the server. 2. Us ...

1 modify the previous program to get its input from a file2

1. Modify the previous program to get its input from a file. 2. Heating and cooling degree-days are measures used by utility companies to estimate energy requirements. If the average temperature for a day is below 60, th ...

Java questionallow the user to input two values a character

Java question: Allow the user to input two values: a character to be used for printing a triangle and the size of the peak for the triangle. Test the input for valid characters. The size of the triangle should not be lar ...

1 if you were setting up an encryption-based network what

1. If you were setting up an encryption-based network, what size key would you choose and why? 2. What is the average key size of a strong encryption system in use today?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro