OnDoc
| sign
in
up
~
pub
|
pdf
txt
html
toc
url
|
<<
>>
1
2
3
4
5
6
7
8
~
16
Table of Contents
1 Introduction
2 Detecting sharing: necessity and difficulty
3 Pointer comparison
4 Pure Hash-Consing
4.1 Tagless-final embedding
4.2 Detecting implicit sharing
5 Explicit sharing
6 Conclusions and further reading