Declarative programming languages, Computer Engineering

Assignment Help:

Declarative programming languages:

We notice that declarative programming languages can have some better compensation over procedural ones. Actually, it is often said that a Java program written into to do the same as a Prolog program regularly takes about 10 times the number of lines of code. There many "AI" researchers try out an idea in Prolog just before implementing it more fully in other languages, means Prolog can be used to perform searches more easily (we see later this).

A recognized declarative language that is used a lot by "AI" researchers is Prolog, that is based on first-order logic. Further more for any declarative programming language, the two most important phases are: how information is represented, so the underlying search routine upon this language is based.

Robert Kowalski give this in a most succinct way:

"'Algorithm = Logic + Control'".


Related Discussions:- Declarative programming languages

Which method is used for resolving data dependency, Which method is used fo...

Which method is used for resolving data dependency conflict by the compiler itself?  (A) Delayed load.   (B) operand forwarding.   (C) Pre fetch target instruction.  (D) loo

Compare ss7 architecture with seven-layer osi architecture, Compare the arc...

Compare the architecture of SS7 with seven-layer OSI architecture The relationship among these levels and the layers of the OSI model is demonstrated in figure. The user part i

4bit counter using JK flip flop and unique sequence, Need to build a 4bit J...

Need to build a 4bit JK flip flop counter with a unique patter. 6 4 2 5 3 1 F C B A

What is meant by context switch, What is meant by context switch?  Swit...

What is meant by context switch?  Switching the CPU to another process requires saving the state of the old process and loading the saved state for the new process. This task i

Digital forensic investigation, (a) Name five important activities invol...

(a) Name five important activities involved in a digital forensic investigation. (b) Briefly describe the three types of data that a forensic examiner has to work with. Whic

Authorization bypass, Authorization Bypass is a frighteningly easy process ...

Authorization Bypass is a frighteningly easy process which can be employed with poorly designed applications or content management frameworks. You know how it is... you run a small

What is test factory, Rational Test Factory is a component-based testing to...

Rational Test Factory is a component-based testing tool that automatically produces TestFactory scripts according to the application's navigational structure. TestFactory is integr

When a network uses a star topology, A Network uses a star topology if? ...

A Network uses a star topology if? A Network utilizes a star topology if all computers attach to a single central point.

Operations of the web, Operations of the Web mainly depend on hypertext as ...

Operations of the Web mainly depend on hypertext as its means of interacting with users. But what is hypertext? Hypertext as such is the same as regular text that is it can be read

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd