Larceny User's Manual
Larceny provides all of the required and optional
parts of Scheme as described in the Revised^4
Report, the IEEE Standard, and
the Revised^5
Report.
This manual describes those aspects of Larceny that are not described by
the Revised Reports or by the IEEE standard.
- Introductory material
-
Installing and Running Twobit and Larceny
- The library
-
Bytevectors
Control features
Debugging
Environments
Fixnums
Foreign-function Interface to C
Hash tables and hash functions
Input, output, and files
Low-level functionality
Operating system interface
Numbers
Pairs and lists
Parameters
Procedures
Property lists
Records
Sorting
SRFI support
Strings
Structures
Symbols
System control and performance measurement
Vectors
Auxiliary library
Ephemeral functionality
- Using the development system
-
Compiling Larceny
Running Larceny
The Read-Eval-Print loop
Using the development system
Using the conservative garbage collector
- Reference
-
Index of library procedures
Concept index
$Id: index.html,v 1.13 2000/09/12 21:23:22 lth Exp $
larceny@ccs.neu.edu