Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Most of this sounds like a _very_ big bag of hefty tricks. Closure conversion, lambda lifting, escape analysis and allocating on the stack, partial evaluation, etc.

Maybe there are more clues over at https://engineering.purdue.edu/~qobi/papers.html



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: