untoward happens to it. I
have a surprisingly large collection of historical Scheme interpreters for
pretty much these exact reasons...
- d
On Sun, 26 Jun 2022 at 19:19, Lynn Winebarger wrote:
> On Sun, Jun 26, 2022, 2:09 PM Lynn Winebarger wrote:
>
>> On Sun, Jun 26, 2022, 1:37 PM David
So...I've been running Larceny 1.3 for quite a while now, and I use it
regularly, if in admittedly casual circumstances (a lot of music theory
calculation and occasional serious algorithmic prototyping). Today, I found
some outright bugs in the SRFI-1 implementations of the lset-* algorithms
and I
Hi y'all -
I'm running larceny 0.98, for which I have written a number of logfile
analysis programs, but I can't seem to get started on my latest (and
largest) log file.
drr@dubl-jessie-00:~/git/reorg/MarginMan/Bin/Log$ ls -l
total 8320968
-rwxr-xr-x 1 drr drr 8266904911 Mar 10 17:31
i meant to include larceny-users in my earlier reply (which went only
to will, sorry)
On 19 March 2012 14:57, w...@ccs.neu.edu wrote:
David Rush wrote:
It appears the my hosting provider has upgraded my hardware to run an
x86_64 architecture Linux Kernel 2.6.32.45. Now I have a version
It appears the my hosting provider has upgraded my hardware to run an
x86_64 architecture Linux Kernel 2.6.32.45. Now I have a version of
Larceny 0.96 fluoridation that I built back before the change, but
it seems that the FFI is totally non-functional at this point (not a
great surprise).
On 4 April 2011 16:19, Steve Graham jsgraha...@yahoo.com wrote:
I am interested in developing Windows GUI programs with typical elements
such as drop down lists, radio buttons, text areas and text fields. Is that
possible with Larceny? Are there any tips on how to proceed?
Working with
On 28 February 2011 01:11, w...@ccs.neu.edu wrote:
The portable way to write text to a (standard-output-port) or
(standard-error-port) is to use the transcoded-port procedure
to obtain a textual output port, as in the following example:
(define p (transcoded-port (standard-error-port)
So is Common Larceny code callable from within other CLR programs yet?
I haven't really noticed much development in that area lately
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
___
Larceny-users mailing list
Hello all -
I'm looking at doing quite a bit of language protoyping with what are
basically Schemely semantics, and I was wondering just how difficult it is
to generate my own closures that will play correctly with the rest of the
Larceny run-time. Actually, I'm wondering even more if there is a
Hi there,
In working with this foreign function definition:
(define rtaudio-open-stream
(foreign-procedure RTAWOpenStream
'(void*
; DAC object
(maybe void*)
; output params
(maybe void*)
;
what I expected :) Or rather, the
high-level syntax problem doesn't have an obviously nice solution,
so I do sympathize.
In the meantime, I have filed this as Ticket #660.
Great, thank you.
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
2009/12/13 Philippos Apolinarius phi50...@yahoo.ca
There is no secret or difficulty in using a MinGW dll from larceny
Well it's pretty clear that I was suffering from some kind of a brain fart.
After rebuilding everything in my DLL and working with the lowest levels of
the larceny FFI
I can't get larceny.bin to even start up. The system appears to crash right
after printing the banner. Subsequently, u$oft tries to invoke the VS
debugger.
Any suggestions? This is a moderately pressing issue for deploying a small
piece of server infrastructure...
david
--
GPG Public key at
2009/11/12 Felix Klock felixlu...@pnkfx.org
On Nov 12, 2009, at 6:33 AM, Felix Klock wrote:
David (cc'ing larceny-users)-
On Nov 12, 2009, at 6:13 AM, David Rush wrote:
I can't get larceny.bin to even start up. The system appears to crash
right after printing the banner. Subsequently, u
a pernicious minor change, if it
is.
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
___
Larceny-users mailing list
Larceny-users@lists.ccs.neu.edu
https://lists.ccs.neu.edu/bin/listinfo/larceny-users
have missed the bit that says they are already there in R5RS
mode.
Sorry for wasting everyone's time.
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
___
Larceny-users mailing list
Larceny-users@lists.ccs.neu.edu
https
of those things where
the explicit use of a continuation function is both conceptually
cleaner and easier to use than the built-in solution (CALL_WITH_VALUES
? !! ick...)
DISCLAIMER: I am part of the multiple-values is evil camp
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public
2009/6/4 Abdulaziz Ghuloum aghul...@gmail.com:
On Jun 4, 2009, at 10:32 AM, David Rush wrote:
This is one of those things where
the explicit use of a continuation function is both conceptually
cleaner and easier to use than the built-in solution
This is self-contradictory.
No it isn't
2009/5/6 Ramana Kumar ramana.ku...@gmail.com:
is there a good argument for set! to return unspecified?
Because Scheme is not C. Or C++ for that matter.
In more obfuscated terms: Mixing the state monad with referentially
transparent expressions is generally a bad idea. Scheme believes
2009/4/27 William D Clinger w...@ccs.neu.edu:
David Rush wrote:
(cos (acos 0))
6.123233995736766e-17
on Larceny. Now it appears that this is an inescapable feature of the
C runtime;
Indeed, it illustrates the inescapable misfeature known as
roundoff error.
Yup. I actually got here
I am currently moderately annoyed that:
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
___
Larceny-users mailing list
Larceny-users@lists.ccs.neu.edu
https://lists.ccs.neu.edu/bin/listinfo/larceny-users
Hi y'all -
What was once merely an annoying invocation has grown to become a
difficult-to-perform ritual. I am of course referring the the
bootstrapping of Larceny in the cases where there is any kind of a
library mismatch from the supported distributions. Specifically, not
only is Larceny
2009/4/21 Marco Maggi marco.maggi-i...@poste.it:
David Rush wrote:
I am of course referring the bootstrapping of
Larceny in the cases where there is any kind
of a library mismatch from the supported
distributions.
So something is preventing you from trying
to boot Larceny using a Larceny
Worthy of notice on the liist, hence forwarded. Thank you Lynn
-- Forwarded message --
From: Lynn Winebarger owine...@gmail.com
Date: 2009/4/21
Subject: Re: [Larceny-users] Bootstrapping...
To: David Rush kumoy...@gmail.com
Hi David,
FWIW, PLT has an undocumented dislike of gcc
I suspect that this is a behavior specified by R6RS, but why isn't
+inf.0 EQ? to itself? It is currently EQV? and EQUAL?, so I'm a little
confused.
david
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
___
Larceny-users mailing list
.0 appears to be a singleton does not mean that it is *in
fact* one. I presume that none of the RnRS series addresses this. I
should elevate that to almost certainly; inexacts have always been
kinda funky.
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
Just off the top of my head this sounds like a classic phasing error.
The macro is actually expanded in an entirely different context from
its apparent definition. I believe that R6RS has language regarding
whether definitions are to be available at expansion-time or at
run-time in the spirit of
to debug the thing and it's turned out
to be staggeringly useful as time has gone on...
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
___
Larceny-users mailing list
Larceny-users@lists.ccs.neu.edu
https://lists.ccs.neu.edu
2008/12/24 Marco Maggi marco.maggi-i...@poste.it:
Can I ask for a word on the status of
the FFI? I do not strictly need the
callbacks right now, but can I trust
the callout mechanism and the raw
pokers and peekers?
Well this falls into the works for me category, but it works for me :)
I
, but I still think that this
half-functional situation is odd. It looks like maybe there is some
interference with the lexer...
Should I report this as a bug?
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
___
Larceny-users
2008/12/8 Marco Maggi [EMAIL PROTECTED]
[EMAIL PROTECTED] wrote:
Marco Maggi wrote:
After hitting C-c, I see that the debugger is here
and I can exit it with q. And I am left with a prompt?
Yes. It isn't a very useful prompt, since nothing is
in scope, but it's a prompt.
Nothing is
development.
Besides, PLT's GUI system makes me crazy :)
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
___
Larceny-users mailing list
Larceny-users@lists.ccs.neu.edu
https://lists.ccs.neu.edu/bin/listinfo/larceny-users
The transcript below says it all. Yes, the macro is erroneous, but I
made this mistake in the middle of a much larger macro definition, and
well...cdr: () is not a pair just isn't very informative, although
now that I know what went wrong I can see how it would arise.
I don't know if this is bad
this code, just pass on a clue, and I
will make it publicly available, either by posting here or on my
web-site.
david rush
--
GPG Public key at http://cyber-rush.org/drr/gpg-public-key.txt
___
Larceny-users mailing list
Larceny-users@lists.ccs.neu.edu
to this in the source tree docs, so a
pointer to my blind spot would also be appreciated)
david rush
--
Once you label me, you negate me
- Soren Kierkegaard
___
Larceny-users mailing list
Larceny-users@lists.ccs.neu.edu
https://lists.ccs.neu.edu/bin/listinfo
On Dec 31, 2007 1:56 PM, David Rush [EMAIL PROTECTED] wrote:
Hello again -
It looks like the socket code is broken on linux 2.4 series kernels
because WCONTINUED and and WNOWAIT were unsupported before the 2.5 kernel
series. I am looking into patching it, but I thought I should post in case
Just in case anyone is working on this...
-- Forwarded message --
From: David Rush [EMAIL PROTECTED]
Date: Nov 3, 2007 4:30 PM
Subject: Re: [gambit-list] Web Framework
To: Marc Feeley [EMAIL PROTECTED]
On 11/3/07, Marc Feeley [EMAIL PROTECTED] wrote:
On 3-Nov-07, at 11:48 AM
On 7/22/07, Felix Klock [EMAIL PROTECTED] wrote:
On Jul 22, 2007, at 6:08 PM, David Rush wrote:
SO can someone tell me what the difference is between
boxed and void* in the (require 'std-ffi) layer? *And* how to pass a
null pointer to a call-out in a reliable fashion?
I'll write up a more
But is there support in Larceny on Windows for TCP/socket
communication yet? I assume that it is available in the .NET stuff
somewhere...
david
--
Once you label me, you negate me
- Soren Kierkegaard
___
Larceny-users mailing list
to procedures at the repl.
And just to be difficult, I do need it to work on windows :) Any suggestions?
david rush
--
Once you label me, you negate me
- Soren Kierkegaard
___
Larceny-users mailing list
Larceny-users@lists.ccs.neu.edu
https
40 matches
Mail list logo