From mboxrd@z Thu Jan 1 00:00:00 1970 Path: news.gmane.org!not-for-mail From: Andy Wingo Newsgroups: gmane.lisp.guile.devel Subject: Re: [PATCH] Efficient Gensym Hack Date: Tue, 06 Mar 2012 09:56:49 +0100 Message-ID: <87linertta.fsf@pobox.com> References: <87mx7vx8zg.fsf@netris.org> <87sjhmsol9.fsf@pobox.com> <87y5rewha6.fsf@netris.org> NNTP-Posting-Host: plane.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Trace: dough.gmane.org 1331024233 15545 80.91.229.3 (6 Mar 2012 08:57:13 GMT) X-Complaints-To: usenet@dough.gmane.org NNTP-Posting-Date: Tue, 6 Mar 2012 08:57:13 +0000 (UTC) Cc: guile-devel@gnu.org To: Mark H Weaver Original-X-From: guile-devel-bounces+guile-devel=m.gmane.org@gnu.org Tue Mar 06 09:57:12 2012 Return-path: Envelope-to: guile-devel@m.gmane.org Original-Received: from lists.gnu.org ([208.118.235.17]) by plane.gmane.org with esmtp (Exim 4.69) (envelope-from ) id 1S4qCi-0001Bm-Bl for guile-devel@m.gmane.org; Tue, 06 Mar 2012 09:57:08 +0100 Original-Received: from localhost ([::1]:33707 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1S4qCh-0003oe-RS for guile-devel@m.gmane.org; Tue, 06 Mar 2012 03:57:07 -0500 Original-Received: from eggs.gnu.org ([208.118.235.92]:44593) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1S4qCc-0003oS-1S for guile-devel@gnu.org; Tue, 06 Mar 2012 03:57:06 -0500 Original-Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1S4qCW-0003m8-Mz for guile-devel@gnu.org; Tue, 06 Mar 2012 03:57:01 -0500 Original-Received: from a-pb-sasl-sd.pobox.com ([74.115.168.62]:62553 helo=sasl.smtp.pobox.com) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1S4qCW-0003lo-Eq for guile-devel@gnu.org; Tue, 06 Mar 2012 03:56:56 -0500 Original-Received: from sasl.smtp.pobox.com (unknown [127.0.0.1]) by a-pb-sasl-sd.pobox.com (Postfix) with ESMTP id D077286EC; Tue, 6 Mar 2012 03:56:53 -0500 (EST) DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=from:to:cc :subject:references:date:in-reply-to:message-id:mime-version :content-type; s=sasl; bh=oIF9C/ziNLGxaeQM//UGIkxi7XQ=; b=hgH0PT MqGBMpgsYS+iwBh64t4Ge/AtKrhEQrP+XH7qIaC0H8uwvTTBkqOvOTNDIfzbhOHW qlp+pSoJSL56eyq2BURdrxQZRxV0NRtqBUdq7TCE2Q78UOT33XyH+ArUZNA9qMlR 05u+NFOmVjBvU7V17jow/LdqaS+Z9qjLVhFzI= DomainKey-Signature: a=rsa-sha1; c=nofws; d=pobox.com; h=from:to:cc :subject:references:date:in-reply-to:message-id:mime-version :content-type; q=dns; s=sasl; b=jhw+wOXMeN7HypvQog4UtBj4+9Tz3Xzn dVNBv/RrQS/gi43Xkc8ystP+xSzMWkAM2wAPj0HChucUvL5I/xujLa41YjUJsUM8 JbzeD4Co2N1VQW8uFKZwFQ/uTHyzUfS+jngdHqp67rW5piQjf/S+6ZAnkygYkLmw xpqgrxuF6AM= Original-Received: from a-pb-sasl-sd.pobox.com (unknown [127.0.0.1]) by a-pb-sasl-sd.pobox.com (Postfix) with ESMTP id C9B2286EB; Tue, 6 Mar 2012 03:56:53 -0500 (EST) Original-Received: from badger (unknown [90.164.198.39]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by a-pb-sasl-sd.pobox.com (Postfix) with ESMTPSA id 34D7B86EA; Tue, 6 Mar 2012 03:56:53 -0500 (EST) In-Reply-To: <87y5rewha6.fsf@netris.org> (Mark H. Weaver's message of "Mon, 05 Mar 2012 22:16:17 -0500") User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.3 (gnu/linux) X-Pobox-Relay-ID: 51C0EA94-676A-11E1-8B27-65B1DE995924-02397024!a-pb-sasl-sd.pobox.com X-detected-operating-system: by eggs.gnu.org: Solaris 10 (beta) X-Received-From: 74.115.168.62 X-BeenThere: guile-devel@gnu.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: "Developers list for Guile, the GNU extensibility library" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guile-devel-bounces+guile-devel=m.gmane.org@gnu.org Original-Sender: guile-devel-bounces+guile-devel=m.gmane.org@gnu.org Xref: news.gmane.org gmane.lisp.guile.devel:14023 Archived-At: On Tue 06 Mar 2012 04:16, Mark H Weaver writes: >> Your thoughts on that weak set mechanism would be appreciated. > > Everything I know about weak storage mechanisms I learned from Bruno > Haible. Highly recommended reading: > > http://www.haible.de/bruno/papers/cs/weak/WeakDatastructures-writeup.html Interesting indeed. Note, though, that some of the implementation techniques are different with the Boehm GC. Andy -- http://wingolog.org/