String Searching LanguageTable of Contents An Introduction to SSL3BackgrouBackgroundVoila – SSL!Where would this be useful?Goals of the LanguageQuick StartupPowerfulProductivePortablePerformance-OrientedSummaryTutorialHello World in SSLCompiling a Program in SSLMore Interesting ExamplesLanguage Reference ManualIntroductionLexical conventionsCommentsKeywordsWhite SpaceSeparatorsBlock IdentifiersInteger constantsCharacter constantsString constantsIdentifiersString IdentifiersFile IdentifiersDirectory IdentifiersAdditional Language SpecificationsModel of ComputationStorage ClassesType ConversionOperatorsStatementsScopeString OperationsFindReplaceSSL Compiler ArchitectureAssignments and ApproachRolesProject PlanTesting StrategyLessons LearnedCaveats and DefectsAppendix A: End to End Test CasesString Searching Language SSL: String Searching Language Authors: Meera Ganesan ([email protected]) Dennis Kim ([email protected]) Sandy MacDonald ([email protected]) Satheesha Rangegowda ([email protected]) SSL Page 1 05/12/2003String Searching Language Table of Contents An Introduction to SSL....................................................................................................... 3 Background..................................................................................................................... 3 Voila – SSL! ................................................................................................................... 3 Where would this be useful?........................................................................................... 4 Goals of the Language .................................................................................................... 4 Quick Startup .............................................................................................................. 4 Powerful...................................................................................................................... 5 Productive ................................................................................................................... 5 Portable ....................................................................................................................... 5 Performance-Oriented................................................................................................. 5 Summary.........................................................................................................................5 Tutorial................................................................................................................................ 6 Hello World in SSL ........................................................................................................ 6 Compiling a Program in SSL.......................................................................................... 6 More Examples ............................................................................................................... 6 Language Reference Manual .............................................................................................. 8 Introduction .................................................................................................................... 8 Lexical conventions ........................................................................................................ 8 Comments ................................................................................................................... 8 Keywords .................................................................................................................... 8 White Space ................................................................................................................ 9 Separators.................................................................................................................... 9 Block Identifiers.......................................................................................................... 9 Identifiers .................................................................................................................. 10 Additional Language Specifications............................................................................. 11 Model of Computation.............................................................................................. 11 Storage Classes ......................................................................................................... 11 Type Conversion....................................................................................................... 11 Operators................................................................................................................... 11 Statements................................................................................................................. 11 Scope......................................................................................................................... 12 String Operations .......................................................................................................... 12 Find ........................................................................................................................... 14 Replace...................................................................................................................... 16 SSL Compiler Architecture............................................................................................... 19 Assignments and Approach .............................................................................................. 21 Roles ............................................................................................................................. 21 Project Plan ................................................................................................................... 21 Testing Strategy ................................................................................................................ 22 Lessons Learned................................................................................................................ 22 Caveats and Defects.......................................................................................................... 22 Appendix A: End to End Test Cases................................................................................. 23 SSL Page 2 05/12/2003String Searching
View Full Document