exploits from examples in Baranoff papers (no surviving link). Apparently
the Forth I had then had the same type of CREATE DOES> that with
DOES> exploits could produce words with multiple CFAs.
I decided to do the same in TOAD, a FigForth derivative, which
<BUILD DOES> have CFA followed by a vector. The result was
words with multiple vectors and helpers that used ENTER instead of
EXECUTE. But then I found QUAN could be easily built without
exploits. It reduced to a simple VALUE with the same TO but only
without any type checks (could be added). However, I think the point
of the Baranoff papers was not so much about what it takes to build
QUAN but how DOES> exploits work and how they might be used which
I did find informative and interesting.
In a nut shell, DOES> exploits add small words that begin with DOES>
followed by a small silver of code:
: FOO does> ... ;
When executed in a defining word, they provide alternate execution
paths available for helper words (these paths are not compiled into the
the defining words but are taken from these exploit words directly).
Also, the defining word has access to the defined word's CFA therefore
a link to the defined word's data field address, DFA , if needed.
Those DOES> exploit words remind me of mRNA bringing in component material >for functioning of the DNA in building proteins (which used to be
a good thing).
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 475 |
Nodes: | 16 (2 / 14) |
Uptime: | 20:17:10 |
Calls: | 9,487 |
Calls today: | 6 |
Files: | 13,617 |
Messages: | 6,121,093 |