Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Programming perlJanuary 1991
Publisher:
  • O'Reilly & Associates, Inc.
  • 103A Morris St. Sebastopol, CA
  • United States
ISBN:978-0-937175-64-4
Published:01 January 1991
Pages:
454
Skip Bibliometrics Section
Reflects downloads up to 09 Nov 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Kwiatkowski Ł and Verhoef C (2015). Reducing operational costs through MIPS management, Science of Computer Programming, 98:P4, (551-588), Online publication date: 1-Feb-2015.
  2. ACM
    Vanderbauwhede W List-based Monadic Computations for Dynamically Typed Languages Proceedings of the Workshop on Dynamic Languages and Applications, (1-7)
  3. Kilpeläinen P (2011). Checking determinism of XML Schema content models in optimal time, Information Systems, 36:3, (596-617), Online publication date: 1-May-2011.
  4. ACM
    Chaudhuri A, Naldurg P and Rajamani S (2009). A type system for data-flow integrity on Windows Vista, ACM SIGPLAN Notices, 43:12, (9-20), Online publication date: 28-Feb-2009.
  5. ACM
    Chaudhuri A, Naldurg P and Rajamani S A type system for data-flow integrity on windows vista Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security, (89-100)
  6. ACM
    McCamant S and Ernst M Quantitative information flow as network flow capacity Proceedings of the 29th ACM SIGPLAN Conference on Programming Language Design and Implementation, (193-205)
  7. ACM
    McCamant S and Ernst M (2008). Quantitative information flow as network flow capacity, ACM SIGPLAN Notices, 43:6, (193-205), Online publication date: 30-May-2008.
  8. Hirzel M, Nystrom N, Bloom B and Vitek J Matchete Proceedings of the 10th international conference on Practical aspects of declarative languages, (150-166)
  9. ACM
    Kiciman E and Livshits B (2007). AjaxScope, ACM SIGOPS Operating Systems Review, 41:6, (17-30), Online publication date: 14-Oct-2007.
  10. ACM
    Kiciman E and Livshits B AjaxScope Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, (17-30)
  11. Hunt E Exhaustive peptide searching using relations Proceedings of the 24th British national conference on Databases, (13-24)
  12. ACM
    Sheehan R (2007). Teaching operating systems with ruby, ACM SIGCSE Bulletin, 39:3, (38-42), Online publication date: 25-Jun-2007.
  13. ACM
    Sheehan R Teaching operating systems with ruby Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education, (38-42)
  14. Lissel R, Gerlach J and GmbH R Introducing new verification methods into a company's design flow Proceedings of the conference on Design, automation and test in Europe, (689-694)
  15. Veerman N (2006). Automated mass maintenance of a software portfolio, Science of Computer Programming, 62:3, (287-317), Online publication date: 15-Oct-2006.
  16. Yau C, Tan Y, Fong A and Yu W Hardware concurrent garbage collection for short-lived objects in mobile java devices Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (47-56)
  17. Livshits V and Lam M Finding security vulnerabilities in java applications with static analysis Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, (18-18)
  18. ACM
    Mooney R and Bunescu R (2005). Mining knowledge from text using information extraction, ACM SIGKDD Explorations Newsletter, 7:1, (3-10), Online publication date: 1-Jun-2005.
  19. Jayakumar N and Khatri S A metal and via maskset programmable VLSI design methodology using PLAs Proceedings of the 2004 IEEE/ACM International conference on Computer-aided design, (590-594)
  20. ACM
    Kilpeläinen P and Tuhkanen R Towards efficient implementation of XML schema content models Proceedings of the 2004 ACM symposium on Document engineering, (239-241)
  21. Walker B (2004). The BAT, Journal of Computing Sciences in Colleges, 19:4, (241-245), Online publication date: 1-Apr-2004.
  22. Candea G, Cutler J and Fox A (2004). Improving availability with recursive microreboots, Performance Evaluation, 56:1-4, (213-248), Online publication date: 1-Mar-2004.
  23. Krebs W and Bourne P Statistical and Visual Morph Movie Analysis of Crystallographic Mutant Selection Bias in Protein Mutation Resource Data Proceedings of the IEEE Computer Society Conference on Bioinformatics
  24. Scott D, Beresford A and Mycroft A Spatial security policies for mobile agents in a sentient computing environment Proceedings of the 6th international conference on Fundamental approaches to software engineering, (102-117)
  25. Laurent B and Karger T A System to Validate and Certify Soft and Hard IP Proceedings of the conference on Design, Automation and Test in Europe: Designers' Forum - Volume 2
  26. Park Y Identification of probable real words Proceedings of the ACL-02 workshop on Unsupervised lexical acquisition - Volume 9, (1-8)
  27. Goswami D, Singh A and Preiss B (2002). From Design Patterns to Parallel Architectural Skeletons, Journal of Parallel and Distributed Computing, 62:4, (669-695), Online publication date: 1-Apr-2002.
  28. Finkel R, Zaslavsky A, Monostori K and Schmidt H (2018). Signature extraction for overlap detection in documents, Australian Computer Science Communications, 24:1, (59-64), Online publication date: 1-Jan-2002.
  29. Finkel R, Zaslavsky A, Monostori K and Schmidt H Signature extraction for overlap detection in documents Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4, (59-64)
  30. Graunke P, Findler R, Krishnamurthi S and Felleisen M Automatically Restructuring Programs for the Web Proceedings of the 16th IEEE international conference on Automated software engineering
  31. Yao A CVSSearch Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
  32. Lehman M and Ramil J (2019). Rules and Tools for Software Evolution Planning and Management, Annals of Software Engineering, 11:1, (15-44), Online publication date: 7-Nov-2001.
  33. ACM
    Levanoni Y and Petrank E (2019). An on-the-fly reference counting garbage collector for Java, ACM SIGPLAN Notices, 36:11, (367-380), Online publication date: 1-Nov-2001.
  34. ACM
    Visser J (2019). Visitor combination and traversal control, ACM SIGPLAN Notices, 36:11, (270-282), Online publication date: 1-Nov-2001.
  35. ACM
    Levanoni Y and Petrank E An on-the-fly reference counting garbage collector for Java Proceedings of the 16th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (367-380)
  36. ACM
    Visser J Visitor combination and traversal control Proceedings of the 16th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (270-282)
  37. ACM
    Coady Y, Kiczales G, Feeley M and Smolyn G Using aspectC to improve the modularity of path-specific customization in operating system code Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering, (88-98)
  38. ACM
    Coady Y, Kiczales G, Feeley M and Smolyn G (2019). Using aspectC to improve the modularity of path-specific customization in operating system code, ACM SIGSOFT Software Engineering Notes, 26:5, (88-98), Online publication date: 1-Sep-2001.
  39. ACM
    Hart D, Tudoreanu M and Kraemer E Mobile agents for monitoring distributed systems Proceedings of the fifth international conference on Autonomous agents, (232-233)
  40. Murphy G, Notkin D and Sullivan K (2001). Software Reflexion Models, IEEE Transactions on Software Engineering, 27:4, (364-380), Online publication date: 1-Apr-2001.
  41. Weerawarana S, Curbera F, Duftler M, Epstein D and Kesselman J Bean markup language Proceedings of the 6th conference on USENIX Conference on Object-Oriented Technologies and Systems - Volume 6, (13-13)
  42. Cowan C, Beattie S, Kroah-Hartman G, Pu C, Wagle P and Gligor V SubDomain: Parsimonious Server Security Proceedings of the 14th USENIX conference on System administration, (355-368)
  43. Osterlund R PIKT: Problem Informant/Killer Tool Proceedings of the 14th USENIX conference on System administration, (147-166)
  44. ACM
    Walker R and Murphy G Implicit context Proceedings of the 8th ACM SIGSOFT international symposium on Foundations of software engineering: twenty-first century applications, (69-78)
  45. ACM
    Walker R and Murphy G (2019). Implicit context, ACM SIGSOFT Software Engineering Notes, 25:6, (69-78), Online publication date: 1-Nov-2000.
  46. ACM
    Ramil J Algorithmic cost estimation for software evolution Proceedings of the 22nd international conference on Software engineering, (701-703)
  47. ACM
    Duc N and Sakurai T Compact yet high performance (CyHP) library for short time-to-market with new technologies Proceedings of the 2000 Asia and South Pacific Design Automation Conference, (475-480)
  48. Nakanishi T and Saeki M Using Multiple Graphs of Programs to Modify Specifications Proceedings of the Sixth Asia Pacific Software Engineering Conference
  49. ACM
    Liddle S, Campbell D and Crawford C Automatically extracting structure and data from business reports Proceedings of the eighth international conference on Information and knowledge management, (86-93)
  50. ACM
    Tseng Y Content-based retrieval for music collections Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, (176-182)
  51. ACM
    Cheong Y and Jarzabek S Frame-based method for customizing generic software architectures Proceedings of the 1999 symposium on Software reusability, (103-112)
  52. Atkins D, Ball T, Bruns G and Cox K (1999). Mawl, IEEE Transactions on Software Engineering, 25:3, (334-346), Online publication date: 1-May-1999.
  53. Warner W and Sunderraman R Network documentation Proceedings of the 1st conference on Conference on Network Administration - Volume 1, (4-4)
  54. Kazman R and Carrière S (1999). Playing Detective, Automated Software Engineering, 6:2, (107-138), Online publication date: 1-Apr-1999.
  55. Reguero I, Foster D and Deloose I Large Scale Print Spool Service Proceedings of the 12th USENIX conference on System administration, (229-242)
  56. Arnold B Accountworks: Users Create Accounts on SQL, Notes, NT, and UNIX Proceedings of the 12th USENIX conference on System administration, (49-62)
  57. Purakayastha A and Mohindra A System Management With NetScript Proceedings of the 12th USENIX conference on System administration, (37-48)
  58. Agnihotri P, Agarwala V, Nucciarone J, Morooney K and Das C The Penn State computing condominium scheduling system Proceedings of the 1998 ACM/IEEE conference on Supercomputing, (1-23)
  59. Skidmore J, Sottile M, Cuny J and Malony A A prototype notebook-based environment for computational tools Proceedings of the 1998 ACM/IEEE conference on Supercomputing, (1-15)
  60. Moreau L (2019). A Syntactic Theory of Dynamic Binding, Higher-Order and Symbolic Computation, 11:3, (233-279), Online publication date: 1-Oct-1998.
  61. Nilsson K, Blomdell A and Laurin O (2019). Open Embedded Control, Real-Time Systems, 14:3, (325-343), Online publication date: 1-May-1998.
  62. Baniassad E and Murphy G Conceptual module querying for software reengineering Proceedings of the 20th international conference on Software engineering, (64-73)
  63. Kienhuis B, Deprettere E, Vissers K and van der Wolf P The construction of a retargetable simulator for an architecture template Proceedings of the 6th international workshop on Hardware/software codesign, (125-129)
  64. Owen C and Makedon F (1998). Asml, Multimedia Tools and Applications, 6:2, (113-139), Online publication date: 1-Mar-1998.
  65. ACM
    Sabin R and Yap T Integrating information retrieval techniques with traditional DB methods in a Web-based database browser Proceedings of the 1998 ACM symposium on Applied Computing, (760-766)
  66. ACM
    Schranz M Engineering flexible World Wide Web services Proceedings of the 1998 ACM symposium on Applied Computing, (712-718)
  67. ACM
    Ames C, Burleigh S and Mitchell S A web based enterprise workflow system Proceedings of the 1997 ACM International Conference on Supporting Group Work, (214-220)
  68. Luerkens C, Bartelme M, Sizer K and Lande J Integrating windows 95/NT into an existing UNIX enterprise network Proceedings of the 1997 Workshop on Large Scale System Administration of Windows NT, (3-3)
  69. Disz T, Olson R and Stevens R Performance model of the Argonne Voyager multimedia server Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors
  70. Owen C The IMAGETCL multimedia algorithm development system Proceedings of the 5th conference on Annual Tcl/Tk Workshop 1997 - Volume 5, (13-13)
  71. ACM
    Schneider C A parallel/serial trade-off methodology for look-up table based decoders Proceedings of the 34th annual Design Automation Conference, (498-503)
  72. Liu L and Pu C (2019). An Adaptive Object-Oriented Approach to Integration and Access ofHeterogeneous Information Sources, Distributed and Parallel Databases, 5:2, (167-205), Online publication date: 1-Apr-1997.
  73. Schneider C A Methodology for Hardware Architecture Trade-off at Different Levels of Abstraction Proceedings of the 1997 European conference on Design and Test
  74. ACM
    Curtis R (1997). A Web based configuration control system for team projects, ACM SIGCSE Bulletin, 29:1, (189-193), Online publication date: 1-Mar-1997.
  75. ACM
    Curtis R A Web based configuration control system for team projects Proceedings of the twenty-eighth SIGCSE technical symposium on Computer science education, (189-193)
  76. ACM
    Osawa N, Morita H and Yuba T Animation for performance debugging of parallel computing systems Proceedings of the second symposium on Virtual reality modeling language, (101-ff.)
  77. Johnson W and Erdem A (1997). Interactive Explanation of Software Systems, Automated Software Engineering, 4:1, (53-75), Online publication date: 1-Jan-1997.
  78. ACM
    Romer T, Lee D, Voelker G, Wolman A, Wong W, Baer J, Bershad B and Levy H (1996). The structure and performance of interpreters, ACM SIGOPS Operating Systems Review, 30:5, (150-159), Online publication date: 1-Dec-1996.
  79. Liscano R, Impey R, Gordon P and Abu-Hakima S A system for the seamless integration of personal messages using agents developed on a lotus notes platform. Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative research
  80. Endler M Availability management of distributed programs and services Proceedings of the 1996 conference of the Centre for Advanced Studies on Collaborative research
  81. ACM
    Fox A and Gribble S Security on the move Proceedings of the 2nd annual international conference on Mobile computing and networking, (155-164)
  82. Defert P, Fernandez E, Goossens M, Le Moigne O, Peyrat A and Reguero I Managing and Distributing Application Software Proceedings of the 10th USENIX conference on System administration, (213-226)
  83. Thomas G, Schroeder J, Orcutt M, Johnson D, Simmelink J and Moore J UNIX Host Administration in a Hererogeneous Distributed Computing Environment Proceedings of the 10th USENIX conference on System administration, (43-50)
  84. ACM
    Romer T, Lee D, Voelker G, Wolman A, Wong W, Baer J, Bershad B and Levy H The structure and performance of interpreters Proceedings of the seventh international conference on Architectural support for programming languages and operating systems, (150-159)
  85. ACM
    Berbers Y, De Decker B and Joosen W Infrastructure for mobile agents Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (173-180)
  86. ACM
    Romer T, Lee D, Voelker G, Wolman A, Wong W, Baer J, Bershad B and Levy H (2019). The structure and performance of interpreters, ACM SIGPLAN Notices, 31:9, (150-159), Online publication date: 1-Sep-1996.
  87. ACM
    Hutchins R and Hemmady S How to write Awk and Perl scripts to enable your EDA tools to work together Proceedings of the 33rd annual Design Automation Conference, (409-414)
  88. ACM
    Nguyen T and Srinivasan V (2019). Accessing relational databases from the World Wide Web, ACM SIGMOD Record, 25:2, (529-540), Online publication date: 1-Jun-1996.
  89. ACM
    Nguyen T and Srinivasan V Accessing relational databases from the World Wide Web Proceedings of the 1996 ACM SIGMOD international conference on Management of data, (529-540)
  90. ACM
    Watson B and Shafer K Creating custom SGML DTDs for documentation products Proceedings of the 13th annual international conference on Systems documentation: emerging from chaos: solutions for the growing complexity of our jobs, (189-196)
  91. ACM
    Griswold R and Griswold M History of the Icon programming language History of programming languages---II, (599-624)
  92. ACM
    Villacis J and Gannon D A web interface to parallel program source code archetypes Proceedings of the 1995 ACM/IEEE conference on Supercomputing, (18-es)
  93. Sedayao J and Akita K LACHESIS: A Tool for Benchmarking Internet Service Providers Proceedings of the 9th USENIX conference on System administration, (111-116)
  94. Shapiro J (1995). Prototyping Algorithms in Perl, Linux Journal, 1995:16es, (5-es), Online publication date: 1-Aug-1995.
  95. Pollice G Using a very high level language to build families of high quality reusable components Proceedings of the USENIX 1994 Very High Level Languages Symposium Proceedings on USENIX 1994 Very High Level Languages Symposium Proceedings, (11-11)
  96. Curry T Profiling and tracing dynamic library usage via interposition Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (18-18)
  97. Stein L, Marquis A, Dredge E, Reeve M, Daly M, Rozen S and Goodman N Splicing UNIX into a genome mapping laboratory Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (15-15)
  98. ACM
    Perl S and Weihl W Performance assertion checking Proceedings of the fourteenth ACM symposium on Operating systems principles, (134-145)
  99. ACM
    Perl S and Weihl W (2019). Performance assertion checking, ACM SIGOPS Operating Systems Review, 27:5, (134-145), Online publication date: 1-Dec-1993.
  100. ACM
    Maffeis S (1993). File access patterns in public FTP archives and an index for locality of reference, ACM SIGMETRICS Performance Evaluation Review, 20:3, (22-35), Online publication date: 1-Mar-1993.
  101. ACM
    Musliner D, Dolter J and Shin K BIBDB Proceedings of the 1992 ACM conference on Computer-supported cooperative work, (386-393)
  102. ACM
    Kajler N CAS/PI Papers from the international symposium on Symbolic and algebraic computation, (376-386)
  103. ACM
    Deerwester S, Waclena K and LaMar M A textual object management system Proceedings of the 15th annual international ACM SIGIR conference on Research and development in information retrieval, (126-139)
Contributors

Reviews

W. Richard Stevens

Perl is an interpreted script language that has become a popular utility tool for some UNIX users. It is freely available and easy to install, so it has propagated widely. This book, coauthored by the developer of perl, is the first book on this language. In the preface, the authors claim that “Perl is in many ways a simple language.” That is debatable. Perl has been described by some people as a kitchen-sink language. That it is. Perl is somewhat a combination of C, the shell, awk, and sed. If you have ever written a UNIX shell script that uses awk, sed, and grep, probably in a pipeline, you could probably write that entire script using just perl. Unfortunately, perl goes farther and tries to provide everything to all users. This book, for example, describes 161 different functions that can be called from a perl program. Some are specific to perl (such as join and push), while others are taken from the standard C library (such as printf and socket). The online manual for perl is almost 100 pages; perl is not what I call a simple language. While you can write perl programs using a small subset of the language, to read and understand the perl programs that appear on the Usenet, for example, you will need to be proficient in perl. Chapter 1 is a 32-page overview of perl. After reading this chapter, I read a 6-page magazine article on perl, which I found to be a far better introduction [1]. This chapter can easily confuse readers who are unfamiliar with perl. The first chapter should have been a gentle introduction to perl, and not an overview of many detailed features. Chapter 2, “Practical Programming,” is followed by chapter 3, “The Gory Details.” Chapter 4 describes each of the 161 functions provided by perl. Chapter 5 shows how to perform common tasks with perl, giving 44 different pieces of code that you can lift and put into your program. Chapter 6 contains 35 “Real Perl Programs.” All the examples from the book are available electronically using FTP or UUCP, which is nice. One must be careful when reviewing a book like this to separate the language from the book. I am disappointed with the language because I do not see the need for a kitchen-sink super-language to replace some of the existing UNIX tools. I am disappointed with this book, as I found the early chapters hard to read and the made-up examples in those chapters hokey. Chapters 5 and 6 are the best part of the book and will be of most interest to perl users. Another complaint I have about this book is its cutesy tone. The authors appear to go out of their way to interject humorous sayings and jokes every page or two. These grate on the reader very quickly. Every page of the glossary contains an entry with a cute sentence. The tone of the entire glossary makes it almost useless if you are really trying to look up the definition of a term. The book was printed on a 300-dot-per-inch laser printer and it shows. The type has a rough, jagged appearance, with many adjacent characters touching. This typography gives the book the appearance of a Xerox copy and makes it hard on the eye. It is unfortunate that publishers are producing books today using 300 dpi laser printers. If you are a perl enthusiast, you will want a copy of this book, as it is the definitive reference for perl today. If you have heard of perl but have not used it, I doubt this book will convince you to use it for everyday tasks.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations