From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: * X-Spam-Status: No, score=1.3 required=5.0 tests=BAYES_00,INVALID_MSGID, MSGID_RANDY autolearn=no autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,e94a7e4f6f888766 X-Google-Attributes: gid103376,public From: Ted Dennison Subject: Re: Self-referential types Date: 1999/10/12 Message-ID: <7tvq5g$28u$1@nnrp1.deja.com>#1/1 X-Deja-AN: 535857180 References: <7ttb4a$8mq$1@nnrp1.deja.com> <3802f2db_2@news1.prserv.net> X-Http-Proxy: 1.0 bx6.deja.com:80 (Squid/1.1.22) for client 204.48.27.130 Organization: Deja.com - Before you buy. X-Article-Creation-Date: Tue Oct 12 17:12:31 1999 GMT X-MyDeja-Info: XMYDJUIDtedennison Newsgroups: comp.lang.ada X-Http-User-Agent: Mozilla/4.6 [en] (WinNT; I) Date: 1999-10-12T00:00:00+00:00 List-Id: In article , "news.oxy.com" wrote: > > Matthew Heaney wrote in message <3802f2db_2@news1.prserv.net>... > >This is the basis for programming with access discriminants, which is > >how you do MI in Ada95. > You might put a short article regarding this issue to Adapower. > I am sure it will be very useful. I'd like to heartily second that one. I tried every resource I could find to figure this out before I resorted to c.l.a. The example in Cohen's book is wrong, and he doesn't address its use in MI at all. The rationale just talks about it but doesn't put up any examples. I couldn't even find anything in the LRM that said this was legal after over an hour of searching. It'd be a shame if the only real documentation of this technique was word of mouth. -- T.E.D. Sent via Deja.com http://www.deja.com/ Before you buy.