1977
DOI: 10.1145/954639.954644
|View full text |Cite
|
Sign up to set email alerts
|

A view of coroutines

Abstract: The coroutine mechanism is explained as a simplified implementation of a special case in parallel processing.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

1979
1979
2014
2014

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…A generator is a more restricted variation of a coroutine [12,16]. It encompasses two control abstractions: suspend and resume.…”
Section: Generators In Pythonmentioning
confidence: 99%
“…A generator is a more restricted variation of a coroutine [12,16]. It encompasses two control abstractions: suspend and resume.…”
Section: Generators In Pythonmentioning
confidence: 99%
“…However, recall that the semantics of the Chapel iterators, differing from normal functions, require that once program execution reaches the last statement in the loop body, control resumes inside the iterator body on the statement immediately following the yield statement for each iterator. Zippered iteration would be implemented naturally using coroutines [8], which allow for execution to begin anywhere inside of a function, unlike functions in most current languages. However, without coroutines, zipper-product iteration may still be implemented using techniques we describe in Section 4.…”
Section: Invoking Multiple Iteratorsmentioning
confidence: 99%
“…A coroutine [8] is a routine that yields or produces values for another routine to consume. Unlike functions in most modern languages, coroutines have multiple points of entry.…”
Section: Related Workmentioning
confidence: 99%
“…When the application halts (at SUSPEND [3]), the CURRENT execution environment will be the LOCKED environment (environment SIX).…”
Section: An F~mentioning
confidence: 99%
“…UNAME÷GET USER NAME ~EXTERNAL PROC [2] DIO~I 0 'T~EMO~ 'PAYROLL ABORT UNAME' [3] 'INTERRUPTtOEMOD 'PAYROL~ TERMINATE' [4] [4] ADD TO ERROR LOG NAME,vOENUM,PWD RLOG B Figure 6: Fragment of example secure environment.…”
Section: The Implementer Can Then Determine What the Error Was Withomentioning
confidence: 99%