Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Inferno Programming with Limbo

Buy

Inferno Programming with Limbo is the first complete developer’s guide to programming for the Inferno operating system. Developed at Lucent's Bell Labs, Inferno enables cross-platform, portable, distributed application development that is well suited for networked applications on resource constrained, embedded systems. Limbo is its programming language.

This book will provide you with an introduction to Inferno, and everything you need to know about building applications with Limbo.

The book focuses on the pragmatic aspects of developing Inferno applications with the Limbo language. It includes complete source code for several application examples, ranging from a text editor, file servers and network servers, to graphical applications such as games. Common programming pitfalls are revealed and in-depth analysis of complete sample applications are given.

Also covered in the text are sections on:

  • Accessing Inferno system facilities from Limbo programs
  • Building multi-threaded applications with Limbo
  • Implementing user level file servers in Limbo
  • Networking in Inferno and constructing networked applications in Limbo
  • Graphical applications in Inferno
  • Augmenting Limbo applications with modules written in the C programming language
  • Cryptographic facilities provided by Inferno
  • Tools for verification of concurrent multi-threaded programs, such as model checkers
  • Relevant manual pages and Limbo module definitions
About the Author

Phillip Stanley-Marbell is a Ph.D. student at Carnegie Mellon University, and maintains the Inferno/Limbo FAQ. He has been an Inferno user since its original release, and has worked on two commercial products that used Inferno.
(HTML tags aren't allowed.)

Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond

Mobile computing skills are becoming standard in the IT industry

Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond is the ultimate reference for mobile computing. Certified Wireless Network Expert Robert J. Bartz guides IT and networking professionals through...

Love as Always, Mum xxx_ The true and terrible story of surviving a childhood with Fred and Rose West-Seven Dials
Love as Always, Mum xxx_ The true and terrible story of surviving a childhood with Fred and Rose West-Seven Dials
I want you to feel that you can talk to me about anything. You must feel awful sometimes and I know you feel very isolated at times. I know I miss you so much sometimes that I feel angry. It must be really rotten for you when you need a family member to talk to or you need mum to sound off to . . . I love you and I want to do...
Analysis and Synthesis for Discrete-Time Switched Systems: A Quasi-Time-Dependent Method (Studies in Systems, Decision and Control)
Analysis and Synthesis for Discrete-Time Switched Systems: A Quasi-Time-Dependent Method (Studies in Systems, Decision and Control)

This book presents recent theoretical advances in the analysis and synthesis of discrete-time switched systems under the time-dependent switching scheme, including stability and disturbance attenuation performance analysis, control and filtering, asynchronous switching, finite-time analysis and synthesis, and reachable set...


Professional Windows DNA: Building Distributed Web Applications with VB, COM+, MSMQ, SOAP, and ASP
Professional Windows DNA: Building Distributed Web Applications with VB, COM+, MSMQ, SOAP, and ASP
Building distributed web applications is a wide-ranging topic, covering a variety of technologies and techniques. Windows DNA is the name given to the combination of traditional n-tier architecture with the intrinsic Windows 2000 services, including COM+, MSMQ, and Active Directory. Using this architecture, you can design and build scalable...
Security for Multihop Wireless Networks
Security for Multihop Wireless Networks

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area...

Graph Analysis and Visualization: Discovering Business Opportunity in Linked Data
Graph Analysis and Visualization: Discovering Business Opportunity in Linked Data

Wring more out of the data with a scientific approach to analysis

Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy