Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1)a) Define compiler? What are the various compiler construction tools describe in detail?

(b) Why intermediate code generation is not included in front end or back end?

(c) Consider the following grammar.

S     XaYb
X    bXc | b
Y    dYa | d

Determine the first set for each non-terminal of the given grammar.

problem 2)(a) Construct a Syntax-Directed Translation scheme that takes strings of a’s, b’s and c’s as input and produces as output the number of substrings in the input string that correspond to the pattern a(a|b)*c+(a|b)*b. For instance the translation of the input string “abbcabcababc” is “3”.

Your solution must include:

1. A context-free grammar that generates all strings of a’s, b’s and c’s

2. Semantic attributes for the grammar symbols

(b) What is Abstract Stack machine. Describe in detail with the help of appropriate exs?

problem 3)(a) Define lexical analysis? Also describe roles of lexical analyzer in detail.

(b) What is Input Buffer? Describe in detail?

problem 4)(a) Define Parser. Elaborate Top down parser in detail with the help of appropriate exs.

(b) Convert the following regular expression into NFA using Thompson’s construction.

a(a|b)*c+(a|b)*b

problem 5)(a) Convert NFA into DFA of the following:

i. (a | b)*

ii. (a* | b*)*

problem 6)(a) Define Type Checking. prepare down the difference between Static and Dynamic Type checking?

(b) What is the Specification of a simple Type Checker?

problem 7) Describe unification algorithm in detail with the help of appropriate exs.

problem 8)(a) Describe Back patching in detail with the help of suitable exs.

(b) describe Procedure Call with the appropriate ex.

problem 9) Convert the following LR grammar to right recursive grammar:

E → E + T / E – T / T
T → T x F / T / F / F
F → (E) / Numbers
Numbers → 0/1/2………………/9.

problem 10) prepare a brief notes on the following topics:

(a) Peephole optimization

(b) Loops in flow graphs

(c) Iterative solution of data-flow equations.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95961

Have any Question? 


Related Questions in Computer Engineering

1 list the devices that can be used in a wireless network

1. List the devices that can be used in a wireless network. How are they connected to form a wireless network? 2. Infrared devices exchange beams of light to communicate. Is this the method used in wireless communication ...

1 the nrl classification scheme has three axes genesis time

1. The NRL classification scheme has three axes: genesis, time of introduction, and location. Name two other axes that would be of interest to an analyst. Justify your answer. 2. In the NRL classification scheme for the ...

1 if one-time pads are provably secure why are they so

1. If one-time pads are provably secure, why are they so rarely used in practice? 2. Prove that the DES key consisting of all 0-bits and the DES key consisting of all 1-bits are both weak keys. What are the other two wea ...

1 what is the difference between a compiler and an

1. What is the difference between a compiler and an interpreter? 2. What are the advantages of (a) a compiler over an interpreter (b) an interpreter over a compiler? 3. What advantages are there to a language-processing ...

1 the issue of binding assurance requirements to functional

1: The issue of binding assurance requirements to functional requirements versus treating them as mutually exclusive sets has been debated over the years. Which approach do you think is preferable, and why? 2: What are t ...

1 some have described social engineering as being

1. Some have described social engineering as being perpetuated by our internal fears. Discuss those fears. 2. What is the role of software security testing in the process of finding solutions to system vulnerabilities?

1 does the rapid development of computer technology put any

1. Does the rapid development of computer technology put any strain on the existing criteria for updates? 2. Study and compare TCSEC, ITSEC, and CC assurance levels. 3. Trace the evolution of the security evaluation crit ...

Design and implement an algorithm that will convert a

Design and implement an algorithm that will convert a general multiway tree (each node may have more than two successors) to the corresponding ordered binary tree.

Understanding the functionality of groups cyclic groups and

Understanding the functionality of groups, cyclic groups and subgroups is important for the use of public-key cryptosystems based on the discrete logarithm problem. That's why we are going to practice some arithmetic in ...

1 study the history of the development of computer products

1. Study the history of the development of computer products security evaluation and suggest the reasons that led to the development of ISO-based CC. 2. Study and give the effects of ISO on a criterion. Does ISO affiliat ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro