Larceny User's Manual

Larceny provides all of the required and optional parts of Scheme as described in the Revised^4 Report, the IEEE Standard, and the Revised^5 Report.

This manual describes those aspects of Larceny that are not described by the Revised Reports or by the IEEE standard.

Introductory material
Installing and Running Twobit and Larceny

The library
Bytevectors
Control features
Debugging
Environments
Fixnums
Foreign-function Interface to C
Hash tables and hash functions
Input, output, and files
Low-level functionality
Operating system interface
Numbers
Pairs and lists
Parameters
Procedures
Property lists
Records
Sorting
SRFI support
Strings
Structures
Symbols
System control and performance measurement
Vectors

Auxiliary library
Ephemeral functionality

Using the development system
Compiling Larceny
Running Larceny
The Read-Eval-Print loop
Using the development system
Using the conservative garbage collector

Reference
Index of library procedures
Concept index


$Id: index.html,v 1.13 2000/09/12 21:23:22 lth Exp $
larceny@ccs.neu.edu