Scheme
Powersets Powersets

Creating the set of all possible subsets, the powerset of a set with Scheme.

Author: eharetea
Date Modified: 04/13/10

Redirecting IO stream Redirecting IO stream

Redirecting the input output stream using the << symbol in the c or bash shell. This is useful when you wish to run another program that is initialized in the shell through a command.

Author: eharetea
Date Modified: 01/19/10

Environment Diagrams Environment Diagrams

Example environment diagrams in Scheme.

Author: eharetea
Date Modified: 01/19/10

Message Passing vs Tagged Data Message Passing vs Tagged Data

Message passing is the underlying theme of object oriented programming. Data directed programming uses tagged-data.

Author: eharetea
Date Modified: 01/19/10

Pollards Algorithm Pollards Algorithm

Pollards algorithm can be used to factor huge numbers.

Author: eharetea
Date Modified: 01/19/10

Y-combinator Y-combinator

Y-combinator is a way of defining a function that can call itself without the define function.

Author: eharetea
Date Modified: 01/19/10

Perfect Numbers Perfect Numbers

This demonstrates a mathematical concept of a perfect number in a computational abstraction utilizing scheme.

Author: eharetea
Date Modified: 01/19/10

Simple Tree Recursion Simple Tree Recursion

Implementing tree recursion with Scheme.

Author: eharetea
Date Modified: 01/19/10

cs61a Review cs61a Review

Cs61a review material.

Author: eharetea
Date Modified: 12/18/08

Distinguishable and Indistinguishable Distinguishable and Indistinguishable

Distinguishable and Indistinguishable boxes and objects. Combinations and permutations. Placing objects into boxes.

Author: eharetea
Date Modified: 11/05/08

Scheme mathematics Scheme mathematics

Using scheme to compute derivatives and integrals.

Author: eharetea
Date Modified: 10/31/08

Vector Bubble Sort Vector Bubble Sort

Bubble sort a vector in scheme.

Author: eharetea
Date Modified: 10/26/08

Vector Filter Vector Filter

Creating a vector-filter function without the use of lists as an intermediate value.

Author: eharetea
Date Modified: 10/26/08

Vector Append Vector Append

How to create a vector append procedure in Scheme.

Author: eharetea
Date Modified: 10/26/08

Mapping Trees Mapping Trees

Applying functions to trees recursively.

Author: eharetea
Date Modified: 10/14/08

Return Path in Tree Return Path in Tree

Return the path of a given element within a tree.

Author: eharetea
Date Modified: 10/14/08

Environments Environments

Utilizing environments to make classes and objects.

Author: eharetea
Date Modified: 10/14/08

Binary Trees Binary Trees

Binary trees, binary search trees, and algorithms for searching these trees.

Author: eharetea
Date Modified: 10/10/08

Records Records

A record system using get and put within scheme.

Author: eharetea
Date Modified: 10/05/08

Filter procedure Filter procedure

Filters a sequence based on a predicate.

Author: eharetea
Date Modified: 10/03/08

Convert tree to list Convert tree to list

Convert a tree to a list.

Author: eharetea
Date Modified: 10/03/08

Deep Recursion Deep Recursion

Deep recursion in Scheme.

Author: eharetea
Date Modified: 10/03/08

Reversing lists Reversing lists

Reversing a list in scheme using iterative and recursive processes.

Author: eharetea
Date Modified: 10/03/08

Euclidean Algorithm Euclidean Algorithm

The Euclidean Algorithm is used to find the Greatest Common Divisor. Written in Scheme.

Author: eharetea
Date Modified: 09/28/08

Base Expansion Base Expansion

How to compute a base b expansion of a number n.

Author: eharetea
Date Modified: 09/28/08

Modular Exponentiation Modular Exponentiation

Modular Exponentiation is an important algorithm in cryptography and computer science.

Author: eharetea
Date Modified: 09/28/08

Substitute words in lists Substitute words in lists

Recursive string substitutions in lists in Scheme.

Author: eharetea
Date Modified: 09/16/08

Reading and writing files Reading and writing files

Writing and opening files in Scheme.

Author: eharetea
Date Modified: 09/14/08