Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Define compiler? What are the various compiler construction tools describe in detail?

(b) Why intermediate code generation is not included in front end or back end?

(c) Consider the following grammar.

S     XaYb
X    bXc | b
Y    dYa | d

Determine the first set for each non-terminal of the given grammar.

problem 2)(a) Construct a Syntax-Directed Translation scheme that takes strings of a’s, b’s and c’s as input and produces as output the number of substrings in the input string that correspond to the pattern a(a|b)*c+(a|b)*b. For instance the translation of the input string “abbcabcababc” is “3”.

Your solution must include:

1. A context-free grammar that generates all strings of a’s, b’s and c’s

2. Semantic attributes for the grammar symbols

(b) What is Abstract Stack machine. Describe in detail with the help of appropriate exs?

problem 3)(a) Define lexical analysis? Also describe roles of lexical analyzer in detail.

(b) What is Input Buffer? Describe in detail?

problem 4)(a) Define Parser. Elaborate Top down parser in detail with the help of appropriate exs.

(b) Convert the following regular expression into NFA using Thompson’s construction.

a(a|b)*c+(a|b)*b

problem 5)(a) Convert NFA into DFA of the following:

i. (a | b)*

ii. (a* | b*)*

problem 6)(a) Define Type Checking. prepare down the difference between Static and Dynamic Type checking?

(b) What is the Specification of a simple Type Checker?

problem 7) Describe unification algorithm in detail with the help of appropriate exs.

problem 8)(a) Describe Back patching in detail with the help of suitable exs.

(b) describe Procedure Call with the appropriate ex.

problem 9) Convert the following LR grammar to right recursive grammar:

E → E + T / E – T / T
T → T x F / T / F / F
F → (E) / Numbers
Numbers → 0/1/2………………/9.

problem 10) prepare a brief notes on the following topics:

(a) Peephole optimization

(b) Loops in flow graphs

(c) Iterative solution of data-flow equations.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95961

Have any Question? 


Related Questions in Computer Engineering

Why is arrows impossibility theorem relevant for social

Why is Arrow's Impossibility Theorem relevant for social choice but not for individual choice? What role does cost-benefit analysis play in resolving the tension between Arrow's Impossibility Theorem and the need to make ...

Suppose we have market baskets that satisfy the following

Suppose we have market baskets that satisfy the following assumptions: 1. The support threshold is 10,000. 2. There are one million items, represented by the integers 0, 1, . . . , 999999. 3. There are N frequent items, ...

Generalize the result of problem 111 to the case in which a

Generalize the result of Problem 11.1 to the case in which a program refers to n devices. Problem 11.1 Consider a program that accesses a single I/O device and compare unbuffered I/O to the use of a buffer. Show that the ...

It is stated in the chapter that the three ways of getting

It is stated in the chapter that the three ways of getting employees to implement change are: Tell them what to do; Sell them on what must be done; and Involve them in determining the substance and direction of the chang ...

Describe the step process what are the main components of

Describe the STEP process. What are the main components of this process? 16.6 What are the major areas of Deming's PDCA process? Describe the TMM process.

Write the code to call a function whose name is sendnumber

Write the code to call a function whose name is send_number. There is one argument for this function, which is an int. Send 5 as an argument to the function.

What are the benefits of using wds over traditional imaging

What are the benefits of using WDS over traditional imaging process? What are the requirements for implementing WDS?

A what is a trigger how can triggers be used to enforce

a. What is a trigger? How can triggers be used to enforce required children? b. Explain why the enforcement of M-M relationships is particularly difficult. c. Explain the need for each of the design decisions in Figure 6 ...

Consider the visual navigation of a dom tree section 77

Consider the visual navigation of a DOM tree (Section 7.7). Take Ex: DomNav and add a tree display of the table. As the user navigates the table, also show the current position on the DOM tree display.

Describe a polynomial-time algorithm to determine whether

Describe a polynomial-time algorithm to determine whether an instance of CIRCUIT SAT is a "yes" instance when the circuit in question consists of a layer of AND gates followed by a layer of OR gates. Inputs are connected ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate