Larceny User's Manual
Larceny provides all of the required and optional
parts of Scheme as described in the Revised^4
Report, the IEEE Standard, and 
the Revised^5
Report.
This manual describes those aspects of Larceny that are not described by
the Revised Reports or by the IEEE standard.
- Introductory material
- 
Installing and Running Twobit and Larceny
 
- The library
 
- 
Bytevectors
 Control features
 Debugging
 Environments
 Fixnums
 Foreign-function Interface to C
 Hash tables and hash functions
 Input, output, and files
 Low-level functionality
 Operating system interface
 Numbers
 Pairs and lists
 Parameters
 Procedures
 Property lists
 Records
 Sorting
 SRFI support
 Strings
 Structures
 Symbols
 System control and performance measurement
 Vectors
 
Auxiliary library
 Ephemeral functionality
 
 
 
- Using the development system
 
- 
Compiling Larceny
 Running Larceny
 The Read-Eval-Print loop
 Using the development system
 Using the conservative garbage collector
 
 
- Reference
- 
Index of library procedures
 Concept index
 
$Id: index.html,v 1.13 2000/09/12 21:23:22 lth Exp $
larceny@ccs.neu.edu