Jump to content

Function (computer programming): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Reverted 1 edit by Xodice (talk): Incomprehensible citation
No edit summary
Tags: Reverted nowiki added adding email address
Line 1: Line 1:
<ref>[http://<p><strong>Please%20include%20attribution%20to%20https://at6qat6qat6qa@6qvq.com/adcount%7C2.0%7C5113.1%7C4966326%7C0%7C225%7CAdId=-41;BnId=1;ct=2881134889;st=9322;adcid=1;itime=939402712;reqtype=5;guid=4008lqpgjca8a&b=3&s=g2;;impref=1630939402117702255;imprefseq=179024738327209218;imprefts=1630939402;adclntid=1004;spaceid=1197806763;adposition=LDRB2;lmsid=a0V0W00000HCppvUAD;revshare=lmsid%253Aa0V0W00000HCppvUAD%253Brevsp%253Avideo%252Eyahoosports%252Ecom%253Blpstaid%253A2374987a%252D82d1%252D342d%252Dab3b%252D42eea79c42b4%253Blu%253A0%253Bpct%253Avideo%253Bpt%253Acontent%253Bsite%253Asports%253Bver%253Aarticle%253Bfr%253Ayotavid40%253Bfrtype%253Aspd%253Bncid%253Aeda%255Fyahoosport%255Faj21kzmkaco%253Bpd%253Anon%255Fmodal;pvid=xap_cTEwLjFAARXWYTYpCgiXNjYuMgAAAACrufCz;sectionid=333862051;kvpgcolo=bf1;kvhashtag=tokyo%2Dolympics:shelly%2Dann%2Dfraser%2Dpryce:neurobiology:summer%2Dolympics:simone%2Dbiles:university%2Dof%2Dtexas%2Daustin:soda:elaine%2Dthompson%2Dherah:issa%2Drae:1035500:athletics:kerry%2Dwashington:flojo:sha%E2%80%99carri%2Drichardson:track%2Dand%2Dfield:1104500:olipop:insecure:10610989:sprinting:olympics:jamaica:medicine:gabby%2Dthomas:1878000:grey%E2%80%99s%2Danatomy:hospital:scandal:yao%2Dming:harvard;kvrs=a0v0w00000hcppvuad:content:fr:non%5Fmodal:lpstaid:revsp:video:eda%5Fyahoosport%5Faj21kzmkaco:lmsid:sports:site:frtype:lu:pd:0:2374987a%2D82d1%2D342d%2Dab3b%2D42eea79c42b4:ncid:pct:spd:yotavid40:pt:article:video%2Eyahoosports%2Ecom:ver;kvssp=ssp;kvctopid=1878000:1035500:10610989:1104500;kvsecure=true;kvmn=y410943;kvy%2Dbucket=xray%2Dsports%2Dcard%2Dfollow%2Dctrl%2Cmonalixa%2Dsports%2Dsticker%2Dfooter%2Dprod%2Droll%2Cxray%2Dsports%2Dsaliencemerge%2Dtest%2D1%2Csp%5Fmab%5Fpersonalized%5Fodds%5Fcntrl%2Cjrvxp%2Dbiased%2Dall%2Dweight%2Dinsession%2Cwallet%2Didentity%2Denable%2Dv3%2Dapi%2Dcopy%2Ca2%2Dplutus%2Drr%2D4;kvwiki%5Ftopics=kerry%5Fwashington:tokyo;kvsecure%2Ddarla=4%2D6%2D0%7Cysd%7C1;kvadtc%5Fdvmktname=unknown;kvadtc%5Fdvosplt=windows%5F10;kvadtc%5Fdvbrand=microsoft;kvadtc%5Fdvtype=desktop;kvadtc%5Fdvmodel=edge%5F%2D%5Fwindows;kvrepo%5Fdvosplt=windows%5F10;kvadtc%5Fdvosversion=NT%2010%2E0;kvadtc%5Fcrmcc=UNKNOWN;kvadtc%5Fcrmnc=UNKNOWN;gdpr=0%20with%20this%20graphic.</strong><br%20/><br%20/><a%20href='https://account.shareasale.com/a-customproductlink.cfm?ariddle=tamk%2FxAkuKhokl4PeAtIB9uIvaA26KRBKk1J1G2uam4%3D&blnProcess=1&userid=2871585&merchant=0&pageAction=findMerchant&destinationURL=https%3A%2F%2Fwww.tucows.com%2Fwp-json%2Foembed%2F1.0%2Fembed%3Furl%3D%3Ciframe+width%3D%22560%22+height%3D%22315%22+src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2FKQsHlxnJqqI%22+title%3D%22YouTube+video+player%22+frameborder%3D%220%22+allow%3D%22accelerometer%3B+autoplay%3B+clipboard-write%3B+encrypted-media%3B+gyroscope%3B+picture-in-picture%22+allowfullscreen%3E%3C%2Fiframe%3E'><img%20src='http://avatars.stocktwits.com/images/default_avatar_large.jpg'%20alt='<script%20async="async"%20src="//js.adlove.com/v1/adlove.min.js"></script>%20<ins%20class="adlovead"%20style="display:inline-block;text-align:center;text-decoration:none;"></ins>%20<script>(adloveads%20=%20window.adloveads%20||%20%5B%5D).push({});</script>'%20540px%20border='0'%20/></a></p> <p><strong>Please include attribution to https://at6qat6qat6qa@6qvq.com/adcount%7C2.0%7C5113.1%7C4966326%7C0%7C225%7CAdId=-41;BnId=1;ct=2881134889;st=9322;adcid=1;itime=939402712;reqtype=5;guid=4008lqpgjca8a&b=3&s=g2;;impref=1630939402117702255;imprefseq=179024738327209218;imprefts=1630939402;adclntid=1004;spaceid=1197806763;adposition=LDRB2;lmsid=a0V0W00000HCppvUAD;revshare=lmsid%253Aa0V0W00000HCppvUAD%253Brevsp%253Avideo%252Eyahoosports%252Ecom%253Blpstaid%253A2374987a%252D82d1%252D342d%252Dab3b%252D42eea79c42b4%253Blu%253A0%253Bpct%253Avideo%253Bpt%253Acontent%253Bsite%253Asports%253Bver%253Aarticle%253Bfr%253Ayotavid40%253Bfrtype%253Aspd%253Bncid%253Aeda%255Fyahoosport%255Faj21kzmkaco%253Bpd%253Anon%255Fmodal;pvid=xap_cTEwLjFAARXWYTYpCgiXNjYuMgAAAACrufCz;sectionid=333862051;kvpgcolo=bf1;kvhashtag=tokyo%2Dolympics:shelly%2Dann%2Dfraser%2Dpryce:neurobiology:summer%2Dolympics:simone%2Dbiles:university%2Dof%2Dtexas%2Daustin:soda:elaine%2Dthompson%2Dherah:issa%2Drae:1035500:athletics:kerry%2Dwashington:flojo:sha%E2%80%99carri%2Drichardson:track%2Dand%2Dfield:1104500:olipop:insecure:10610989:sprinting:olympics:jamaica:medicine:gabby%2Dthomas:1878000:grey%E2%80%99s%2Danatomy:hospital:scandal:yao%2Dming:harvard;kvrs=a0v0w00000hcppvuad:content:fr:non%5Fmodal:lpstaid:revsp:video:eda%5Fyahoosport%5Faj21kzmkaco:lmsid:sports:site:frtype:lu:pd:0:2374987a%2D82d1%2D342d%2Dab3b%2D42eea79c42b4:ncid:pct:spd:yotavid40:pt:article:video%2Eyahoosports%2Ecom:ver;kvssp=ssp;kvctopid=1878000:1035500:10610989:1104500;kvsecure=true;kvmn=y410943;kvy%2Dbucket=xray%2Dsports%2Dcard%2Dfollow%2Dctrl%2Cmonalixa%2Dsports%2Dsticker%2Dfooter%2Dprod%2Droll%2Cxray%2Dsports%2Dsaliencemerge%2Dtest%2D1%2Csp%5Fmab%5Fpersonalized%5Fodds%5Fcntrl%2Cjrvxp%2Dbiased%2Dall%2Dweight%2Dinsession%2Cwallet%2Didentity%2Denable%2Dv3%2Dapi%2Dcopy%2Ca2%2Dplutus%2Drr%2D4;kvwiki%5Ftopics=kerry%5Fwashington:tokyo;kvsecure%2Ddarla=4%2D6%2D0%7Cysd%7C1;kvadtc%5Fdvmktname=unknown;kvadtc%5Fdvosplt=windows%5F10;kvadtc%5Fdvbrand=microsoft;kvadtc%5Fdvtype=desktop;kvadtc%5Fdvmodel=edge%5F%2D%5Fwindows;kvrepo%5Fdvosplt=windows%5F10;kvadtc%5Fdvosversion=NT%2010%2E0;kvadtc%5Fcrmcc=UNKNOWN;kvadtc%5Fcrmnc=UNKNOWN;gdpr=0 with this graphic.</strong><br /><br /><a href='https://account.shareasale.com/a-customproductlink.cfm?ariddle=tamk%2FxAkuKhokl4PeAtIB9uIvaA26KRBKk1J1G2uam4%3D&blnProcess=1&userid=2871585&merchant=0&pageAction=findMerchant&destinationURL=https%3A%2F%2Fwww.tucows.com%2Fwp-json%2Foembed%2F1.0%2Fembed%3Furl%3D%3Ciframe+width%3D%22560%22+height%3D%22315%22+src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2FKQsHlxnJqqI%22+title%3D%22YouTube+video+player%22+frameborder%3D%220%22+allow%3D%22accelerometer%3B+autoplay%3B+clipboard-write%3B+encrypted-media%3B+gyroscope%3B+picture-in-picture%22+allowfullscreen%3E%3C%2Fiframe%3E'><img src='http://avatars.stocktwits.com/images/default_avatar_large.jpg' alt='<script async="async" src="//js.adlove.com/v1/adlove.min.js"></script> <ins class="adlovead" style="display:inline-block;text-align:center;text-decoration:none;"></ins> <script>(adloveads = window.adloveads || [<nowiki>]</nowiki>).push({});</script>' 540px border='0' /></a></p>]</ref>{{Short description|Part of a computer program}}
{{Short description|Part of a computer program}}
{{More citations needed|date=February 2013}}
{{More citations needed|date=February 2013}}
In [[computer programming]], a '''subroutine''' is a sequence of [[Instruction (computer science)|program instructions]] that performs a specific task, packaged as a unit. This unit can then be used in programs wherever that particular [[Task (computing)|task]] should be performed.
In [[computer programming]], a '''subroutine''' is a sequence of [[Instruction (computer science)|program instructions]] that performs a specific task, packaged as a unit. This unit can then be used in programs wherever that particular [[Task (computing)|task]] should be performed.

Revision as of 13:05, 26 September 2021

[1]

In computer programming, a subroutine is a sequence of program instructions that performs a specific task, packaged as a unit. This unit can then be used in programs wherever that particular task should be performed.

Subroutines may be defined within programs, or separately in libraries that can be used by many programs. In different programming languages, a subroutine may be called a routine, subprogram, function, method, or procedure. Technically, these terms all have different definitions. The generic, umbrella term callable unit is sometimes used.[2]

The name subprogram suggests a subroutine behaves in much the same way as a computer program that is used as one step in a larger program or another subprogram. A subroutine is often coded so that it can be started several times and from several places during one execution of the program, including from other subroutines, and then branch back (return) to the next instruction after the call, once the subroutine's task is done. The idea of a subroutine was initially conceived by John Mauchly during his work on ENIAC,[3] and recorded in a January 1947 Harvard symposium on "Preparation of Problems for EDVAC-type Machines".[4] Maurice Wilkes, David Wheeler, and Stanley Gill are generally credited with the formal invention of this concept, which they termed a closed subroutine,[5][6] contrasted with an open subroutine or macro.[7] However, Turing had discussed subroutines in a paper of 1945 on design proposals for the NPL ACE, going so far as to invent the concept of a return address stack.[8]

Subroutines are a powerful programming tool,[9] and the syntax of many programming languages includes support for writing and using them. Judicious use of subroutines (for example, through the structured programming approach) will often substantially reduce the cost of developing and maintaining a large program, while increasing its quality and reliability.[10] Subroutines, often collected into libraries, are an important mechanism for sharing and trading software. The discipline of object-oriented programming is based on objects and methods (which are subroutines attached to these objects or object classes).

In the compiling method called threaded code, the executable program is basically a sequence of subroutine calls.

Main concepts

The content of a subroutine is its body, which is the piece of program code that is executed when the subroutine is called or invoked.

A subroutine may be written so that it expects to obtain one or more data values from the calling program (to replace its parameters or formal parameters). The calling program provides actual values for these parameters, called arguments. Different programming languages may use different conventions for passing arguments:

Convention Description Common use
Call by value Argument is evaluated and copy of the value is passed to subroutine Default in most Algol-like languages after Algol 60, such as Pascal, Delphi, Simula, CPL, PL/M, Modula, Oberon, Ada, and many others. C, C++, Java (References to objects and arrays are also passed by value)
Call by reference Reference to an argument, typically its address is passed Selectable in most Algol-like languages after Algol 60, such as Algol 68, Pascal, Delphi, Simula, CPL, PL/M, Modula, Oberon, Ada, and many others. C++, Fortran, PL/I
Call by result Parameter value is copied back to argument on return from the subroutine Ada OUT parameters
Call by value-result Parameter value is copied back on entry to the subroutine and again on return Algol, Swift in-out parameters
Call by name Like a macro – replace the parameters with the unevaluated argument expressions Algol, Scala
Call by constant value Like call by value except that the parameter is treated as a constant PL/I NONASSIGNABLE parameters, Ada IN parameters

The subroutine may return a computed value to its caller (its return value), or provide various result values or output parameters. Indeed, a common use of subroutines is to implement mathematical functions, in which the purpose of the subroutine is purely to compute one or more results whose values are entirely determined by the arguments passed to the subroutine. (Examples might include computing the logarithm of a number or the determinant of a matrix.) This type is called a function.

A subroutine call may also have side effects such as modifying data structures in a computer memory, reading from or writing to a peripheral device, creating a file, halting the program or the machine, or even delaying the program's execution for a specified time. A subprogram with side effects may return different results each time it is called, even if it is called with the same arguments. An example is a random number subroutine, available in many languages, that returns a different pseudo-random number each time it is called. The widespread use of subroutines with side effects is a characteristic of imperative programming languages.

A subroutine can be coded so that it may call itself recursively, at one or more places, to perform its task. This method allows direct implementation of functions defined by mathematical induction and recursive divide and conquer algorithms.

A subroutine whose purpose is to compute one boolean-valued function (that is, to answer a yes/no question) is sometimes called a predicate. In logic programming languages, often[vague] all subroutines are called predicates, since they primarily[vague] determine success or failure.[citation needed]

A subroutine that returns no value or returns a null value is sometimes called a procedure. Procedures usually modify their arguments and are a core part of procedural programming.

Language support

High-level programming languages usually include specific constructs to:

  • Delimit the part of the program (body) that makes up the subroutine
  • Assign an identifier (name) to the subroutine
  • Specify the names and data types of its parameters and return values
  • Provide a private naming scope for its temporary variables
  • Identify variables outside the subroutine that are accessible within it
  • Call the subroutine
  • Provide values to its parameters
  • The main program contains the address of the subprogram
  • The subprogram contains the address of the next instruction of the function call in the main program
  • Specify the return values from within its body
  • Return to the calling program
  • Dispose of the values returned by a call
  • Handle any exceptional conditions encountered during the call
  • Package subroutines into a module, library, object, or class

Some programming languages, such as Pascal, Fortran, Ada and many dialects of BASIC, distinguish between functions or function subprograms, which provide an explicit return value to the calling program, and subroutines or procedures, which do not. In those languages, function calls are normally embedded in expressions (e.g., a sqrt function may be called as y = z + sqrt(x)). Procedure calls either behave syntactically as statements (e.g., a print procedure may be called as if x > 0 then print(x) or are explicitly invoked by a statement such as CALL or GOSUB (e.g., call print(x)). Other languages, such as C and Lisp, do not distinguish between functions and subroutines.

In strictly functional programming languages such as Haskell, subprograms can have no side effects, which means that various internal states of the program will not change. Functions will always return the same result if repeatedly called with the same arguments. Such languages typically only support functions, since subroutines that do not return a value have no use unless they can cause a side effect.

In programming languages such as C, C++, and C#, subroutines may also simply be called functions (not to be confused with mathematical functions or functional programming, which are different concepts).

A language's compiler will usually translate procedure calls and returns into machine instructions according to a well-defined calling convention, so that subroutines can be compiled separately from the programs that call them. The instruction sequences corresponding to call and return statements are called the procedure's prologue and epilogue.

Advantages

The advantages of breaking a program into subroutines include:

  • Decomposing a complex programming task into simpler steps: this is one of the two main tools of structured programming, along with data structures
  • Reducing duplicate code within a program
  • Enabling reuse of code across multiple programs
  • Dividing a large programming task among various programmers or various stages of a project
  • Hiding implementation details from users of the subroutine
  • Improving readability of code by replacing a block of code with a function call where a descriptive function name serves to describe the block of code. This makes the calling code concise and readable even if the function is not meant to be reused.
  • Improving traceability (i.e. most languages offer ways to obtain the call trace which includes the names of the involved subroutines and perhaps even more information such as file names and line numbers); by not decomposing the code into subroutines, debugging would be severely impaired

Disadvantages

Compared to using in-line code, invoking a subroutine imposes some computational overhead in the call mechanism.[citation needed]

A subroutine typically requires standard housekeeping code – both at the entry to, and exit from, the function (function prologue and epilogue – usually saving general purpose registers and return address as a minimum).

History

The idea of a subroutine was worked out after computing machines had already existed for some time. The arithmetic and conditional jump instructions were planned ahead of time and have changed relatively little, but the special instructions used for procedure calls have changed greatly over the years. The earliest computers and microprocessors, such as the Manchester Baby and the RCA 1802, did not have a single subroutine call instruction. Subroutines could be implemented, but they required programmers to use the call sequence—a series of instructions—at each call site.

Subroutines were implemented in Konrad Zuse's Z4 in 1945.

In 1945, Alan M. Turing used the terms "bury" and "unbury" as a means of calling and returning from subroutines.[11][12]

In January 1947 John Mauchly presented general notes at 'A Symposium of Large Scale Digital Calculating Machinery' under the joint sponsorship of Harvard University and the Bureau of Ordnance, United States Navy. Here he discusses serial and parallel operation suggesting

...the structure of the machine need not be complicated one bit. It is possible, since all the logical characteristics essential to this procedure are available, to evolve a coding instruction for placing the subroutines in the memory at places known to the machine, and in such a way that they may easily be called into use.

In In other words, one can designate subroutine A as division and subroutine B as complex multiplication and subroutine C as the evaluation of a standard error of a sequence of numbers, and so on through the list of subroutines needed for a particular problem. ... All these subroutines will then be stored in the machine, and all one needs to do is make a brief reference to them by number, as they are indicated in the coding.[4]

Kay McNulty had worked closely with John Mauchly on the ENIAC team and developed an idea for subroutines for the ENIAC computer she was programming during World War II.[13] She and the other ENIAC programmers used the subroutines to help calculate missile trajectories.[13]

Goldstine and von Neumann wrote a paper dated 16 August 1948 discussing the use of subroutines.[14]

Some very early computers and microprocessors, such as the IBM 1620, the Intel 4004 and Intel 8008, and the PIC microcontrollers, have a single-instruction subroutine call that uses a dedicated hardware stack to store return addresses—such hardware supports only a few levels of subroutine nesting, but can support recursive subroutines. Machines before the mid-1960s—such as the UNIVAC I, the PDP-1, and the IBM 1130—typically use a calling convention which saved the instruction counter in the first memory location of the called subroutine. This allows arbitrarily deep levels of subroutine nesting but does not support recursive subroutines. The PDP-11 (1970) is one of the first computers with a stack-pushing subroutine call instruction; this feature supports both arbitrarily deep subroutine nesting and also supports recursive subroutines.[15]

Language support

In the very early assemblers, subroutine support was limited. Subroutines were not explicitly separated from each other or from the main program, and indeed the source code of a subroutine could be interspersed with that of other subprograms. Some assemblers would offer predefined macros to generate the call and return sequences. By the 1960s, assemblers usually had much more sophisticated support for both inline and separately assembled subroutines that could be linked together.

One of the first programming languages to support user-written subroutines and functions was FORTRAN II. The IBM FORTRAN II compiler was released in 1958. ALGOL 58 and other early programming languages also supported procedural programming.

Subroutine libraries

Even with this cumbersome approach, subroutines proved very useful. For one thing, they allowed the use of the same code in many different programs. Moreover, memory was a very scarce resource on early computers, and subroutines allowed significant savings in the size of programs.

Many early computers loaded the program instructions into memory from a punched paper tape. Each subroutine could then be provided by a separate piece of tape, loaded or spliced before or after the main program (or "mainline"[16]); and the same subroutine tape could then be used by many different programs. A similar approach applied in computers that used punched cards for their main input. The name subroutine library originally meant a library, in the literal sense, which kept indexed collections of tapes or card-decks for collective use.

Return by indirect jump

To remove the need for self-modifying code, computer designers eventually provided an indirect jump instruction, whose operand, instead of being the return address itself, was the location of a variable or processor register containing the return address.

On those computers, instead of modifying the subroutine's return jump, the calling program would store the return address in a variable so that when the subroutine completed, it would execute an indirect jump that would direct execution to the location given by the predefined variable.

Jump to subroutine

Another advance was the jump to subroutine instruction, which combined the saving of the return address with the calling jump, thereby minimizing overhead significantly.

In the IBM System/360, for example, the branch instructions BAL or BALR, designed for procedure calling, would save the return address in a processor register specified in the instruction, by convention register 14. To return, the subroutine had only to execute an indirect branch instruction (BR) through that register. If the subroutine needed that register for some other purpose (such as calling another subroutine), it would save the register's contents to a private memory location or a register stack.

In systems such as the HP 2100, the JSB instruction would perform a similar task, except that the return address was stored in the memory location that was the target of the branch. Execution of the procedure would actually begin at the next memory location. In the HP 2100 assembly language, one would write, for example

       ...
       JSB MYSUB    (Calls subroutine MYSUB.)
 BB    ...          (Will return here after MYSUB is done.)

to call a subroutine called MYSUB from the main program. The subroutine would be coded as

 MYSUB NOP          (Storage for MYSUB's return address.)
 AA    ...          (Start of MYSUB's body.)
       ...
       JMP MYSUB,I  (Returns to the calling program.)

The JSB instruction placed the address of the NEXT instruction (namely, BB) into the location specified as its operand (namely, MYSUB), and then branched to the NEXT location after that (namely, AA = MYSUB + 1). The subroutine could then return to the main program by executing the indirect jump JMP MYSUB, I which branched to the location stored at location MYSUB.

Compilers for Fortran and other languages could easily make use of these instructions when available. This approach supported multiple levels of calls; however, since the return address, parameters, and return values of a subroutine were assigned fixed memory locations, it did not allow for recursive calls.

Incidentally, a similar method was used by Lotus 1-2-3, in the early 1980s, to discover the recalculation dependencies in a spreadsheet. Namely, a location was reserved in each cell to store the return address. Since circular references are not allowed for natural recalculation order, this allows a tree walk without reserving space for a stack in memory, which was very limited on small computers such as the IBM PC.

Call stack

Most modern implementations of a subroutine call use a call stack, a special case of the stack data structure, to implement subroutine calls and returns. Each procedure call creates a new entry, called a stack frame, at the top of the stack; when the procedure returns, its stack frame is deleted from the stack, and its space may be used for other procedure calls. Each stack frame contains the private data of the corresponding call, which typically includes the procedure's parameters and internal variables, and the return address.

The call sequence can be implemented by a sequence of ordinary instructions (an approach still used in reduced instruction set computing (RISC) and very long instruction word (VLIW) architectures), but many traditional machines designed since the late 1960s have included special instructions for that purpose.

The call stack is usually implemented as a contiguous area of memory. It is an arbitrary design choice whether the bottom of the stack is the lowest or highest address within this area, so that the stack may grow forwards or backwards in memory; however, many architectures chose the latter.[citation needed]

Some designs, notably some Forth implementations, used two separate stacks, one mainly for control information (like return addresses and loop counters) and the other for data. The former was, or worked like, a call stack and was only indirectly accessible to the programmer through other language constructs while the latter was more directly accessible.

When stack-based procedure calls were first introduced, an important motivation was to save precious memory.[citation needed] With this scheme, the compiler does not have to reserve separate space in memory for the private data (parameters, return address, and local variables) of each procedure. At any moment, the stack contains only the private data of the calls that are currently active (namely, which have been called but haven't returned yet). Because of the ways in which programs were usually assembled from libraries, it was (and still is) not uncommon to find programs that include thousands of subroutines, of which only a handful are active at any given moment.[citation needed] For such programs, the call stack mechanism could save significant amounts of memory. Indeed, the call stack mechanism can be viewed as the earliest and simplest method for automatic memory management.

However, another advantage of the call stack method is that it allows recursive subroutine calls, since each nested call to the same procedure gets a separate instance of its private data.

Delayed stacking

One disadvantage of the call stack mechanism is the increased cost of a procedure call and its matching return.[clarification needed] The extra cost includes incrementing and decrementing the stack pointer (and, in some architectures, checking for stack overflow), and accessing the local variables and parameters by frame-relative addresses, instead of absolute addresses. The cost may be realized in increased execution time, or increased processor complexity, or both.

This overhead is most obvious and objectionable in leaf procedures or leaf functions, which return without making any procedure calls themselves.[17][18][19] To reduce that overhead, many modern compilers try to delay the use of a call stack until it is really needed.[citation needed] For example, the call of a procedure P may store the return address and parameters of the called procedure in certain processor registers, and transfer control to the procedure's body by a simple jump. If the procedure P returns without making any other call, the call stack is not used at all. If P needs to call another procedure Q, it will then use the call stack to save the contents of any registers (such as the return address) that will be needed after Q returns.

C and C++ examples

In the C and C++ programming languages, subprograms are termed functions (further classified as member functions when associated with a class, or free functions[20] when not). These languages use the special keyword void to indicate that a function does not return any value. Note that C/C++ functions can have side-effects, including modifying any variables whose addresses are passed as parameters. Examples:

void Function1() { /* some code */ }

The function does not return a value and has to be called as a stand-alone function, e.g., Function1();

int Function2() {
  return 5;
}

This function returns a result (the number 5), and the call can be part of an expression, e.g., x + Function2()

char Function3(int number) {
  char selection[] = {'S', 'M', 'T', 'W', 'T', 'F', 'S'};
  return selection[number];
}

This function converts a number between 0 and 6 into the initial letter of the corresponding day of the week, namely 0 to 'S', 1 to 'M', ..., 6 to 'S'. The result of calling it might be assigned to a variable, e.g., num_day = Function3(number);.

void Function4(int* pointer_to_var) {
  (*pointer_to_var)++;
}

This function does not return a value but modifies the variable whose address is passed as the parameter; it would be called with Function4(&variable_to_increment);.

Small Basic example

Example()                               ' Calls the subroutine

Sub Example                             ' Begins the subroutine
    TextWindow.WriteLine("This is an example of a subroutine in Microsoft Small Basic.")  ' What the subroutine does
EndSub                                  ' Ends the subroutine

In the example above, Example() calls the subroutine.[21] To define the actual subroutine, the Sub keyword must be used, with the subroutine name following Sub. After content has followed, EndSub must be typed.

Visual Basic 6 examples

In the Visual Basic 6 language, subprograms are termed functions or subs (or methods when associated with a class). Visual Basic 6 uses various terms called types to define what is being passed as a parameter. By default, an unspecified variable is registered as a variant type and can be passed as ByRef (default) or ByVal. Also, when a function or sub is declared, it is given a public, private, or friend designation, which determines whether it can be accessed outside the module or project that it was declared in.

  • By value [ByVal] – a way of passing the value of an argument to a procedure by passing a copy of the value, instead of passing the address. As a result, the variable's actual value can't be changed by the procedure to which it is passed.
  • By reference [ByRef] – a way of passing the value of an argument to a procedure by passing an address of the variable, instead of passing a copy of its value. This allows the procedure to access the actual variable. As a result, the variable's actual value can be changed by the procedure to which it is passed. Unless otherwise specified, arguments are passed by reference.
  • Public (optional) – indicates that the function procedure is accessible to all other procedures in all modules. If used in a module that contains an Option Private, the procedure is not available outside the project.
  • Private (optional) – indicates that the function procedure is accessible only to other procedures in the module where it is declared.
  • Friend (optional) – used only in a class module. Indicates that the Function procedure is visible throughout the project, but not visible to a controller of an instance of an object.
Private Function Function1()
    ' Some Code Here
End Function

The function does not return a value and has to be called as a stand-alone function, e.g., Function1

Private Function Function2() as Integer
    Function2 = 5
End Function

This function returns a result (the number 5), and the call can be part of an expression, e.g., x + Function2()

Private Function Function3(ByVal intValue as Integer) as String
    Dim strArray(6) as String
    strArray = Array("M", "T", "W", "T", "F", "S", "S")
    Function3 = strArray(intValue)
End Function

This function converts a number between 0 and 6 into the initial letter of the corresponding day of the week, namely 0 to 'M', 1 to 'T', ..., 6 to 'S'. The result of calling it might be assigned to a variable, e.g., num_day = Function3(number).

Private Function Function4(ByRef intValue as Integer)
    intValue = intValue + 1
End Function

This function does not return a value but modifies the variable whose address is passed as the parameter; it would be called with "Function4(variable_to_increment)".

PL/I example

In PL/I a called procedure may be passed a descriptor providing information about the argument, such as string lengths and array bounds. This allows the procedure to be more general and eliminates the need for the programmer to pass such information. By default PL/I passes arguments by reference. A (trivial) subroutine to change the sign of each element of a two-dimensional array might look like:

  change_sign: procedure(array);
    declare array(*,*) float;
    array = -array;
    end change_sign;

This could be called with various arrays as follows:

  /* first array bounds from -5 to +10 and 3 to 9 */
  declare array1 (-5:10, 3:9)float;
  /* second array bounds from 1 to 16 and 1 to 16 */
  declare array2 (16,16) float;
  call change_sign(array1);
  call change_sign(array2);

Python example

In Python, the keyword def is used to define a function. The statements that form the body of the function must either continue on the same line or start on the next line and be indented.[22] The following example program prints "Hello world!" followed by "Wikipedia" on the next line.

def simple_function():
    print('Hello world!')
    print('Wikipedia')
simple_function()

Local variables, recursion and reentrancy

A subprogram may find it useful to make use of a certain amount of scratch space; that is, memory used during the execution of that subprogram to hold intermediate results. Variables stored in this scratch space are termed local variables, and the scratch space is termed an activation record. An activation record typically has a return address that tells it where to pass control back to when the subprogram finishes.

A subprogram may have any number and nature of call sites. If recursion is supported, a subprogram may even call itself, causing its execution to suspend while another nested execution of the same subprogram occurs. Recursion is a useful means to simplify some complex algorithms and break down complex problems. Recursive languages generally provide a new copy of local variables on each call. If the programmer desires the value of local variables to stay the same between calls, they can be declared static in some languages, or global values or common areas can be used. Here is an example of recursive subroutine in C/C++ to find Fibonacci numbers:

int Fib(int n) {
  if (n <= 1) {
    return n;
  }
  return Fib(n - 1) + Fib(n - 2);
}

Early languages like Fortran did not initially support recursion because variables were statically allocated, as well as the location for the return address. Most computers before the late 1960s such as the PDP-8 did not have support for hardware stack registers.[citation needed]

Modern languages after ALGOL such as PL/I and C almost invariably use a stack, usually supported by most modern computer instruction sets to provide a fresh activation record for every execution of a subprogram. That way, the nested execution is free to modify its local variables without concern for the effect on other suspended executions in progress. As nested calls accumulate, a call stack structure is formed, consisting of one activation record for each suspended subprogram. In fact, this stack structure is virtually ubiquitous, and so activation records are commonly termed stack frames.

Some languages such as Pascal, PL/I, and Ada also support nested subroutines, which are subroutines callable only within the scope of an outer (parent) subroutine. Inner subroutines have access to the local variables of the outer subroutine that called them. This is accomplished by storing extra context information within the activation record, also termed a display.

If a subprogram can be executed properly even when another execution of the same subprogram is already in progress, that subprogram is said to be reentrant. A recursive subprogram must be reentrant. Reentrant subprograms are also useful in multi-threaded situations since multiple threads can call the same subprogram without fear of interfering with each other. In the IBM CICS transaction processing system, quasi-reentrant was a slightly less restrictive, but similar, requirement for application programs that were shared by many threads.

In a multi-threaded environment, there is generally more than one stack. An environment that fully supports coroutines or lazy evaluation may use data structures other than stacks to store their activation records.

Overloading

In strongly typed languages, it is sometimes desirable to have a number of functions with the same name, but operating on different types of data, or with different parameter profiles. For example, a square root function might be defined to operate on reals, complex values or matrices. The algorithm to be used in each case is different, and the return result may be different. By writing three separate functions with the same name, the programmer has the convenience of not having to remember different names for each type of data. Further, if a subtype can be defined for the reals, to separate positive and negative reals, two functions can be written for the reals, one to return a real when the parameter is positive, and another to return a complex value when the parameter is negative.

In object-oriented programming, when a series of functions with the same name can accept different parameter profiles or parameters of different types, each of the functions is said to be overloaded.

Here is an example of subroutine overloading in C++:

#include <iostream>

double Area(double h, double w) { return h * w; }

double Area(double r) { return r * r * 3.14; }

int main() {
  double rectangle_area = Area(3, 4);
  double circle_area = Area(5);

  std::cout << "Area of a rectangle is " << rectangle_area << std::endl;
  std::cout << "Area of a circle is " << circle_area << std::endl;
}

In this code, there are two functions of the same name but they have different parameters.

As another example, a subroutine might construct an object that will accept directions, and trace its path to these points on screen. There are a plethora of parameters that could be passed in to the constructor (colour of the trace, starting x and y co-ordinates, trace speed). If the programmer wanted the constructor to be able to accept only the color parameter, then he could call another constructor that accepts only color, which in turn calls the constructor with all the parameters passing in a set of default values for all the other parameters (X and Y would generally be centered on screen or placed at the origin, and the speed would be set to another value of the coder's choosing).

PL/I has the GENERIC attribute to define a generic name for a set of entry references called with different types of arguments. Example:

  DECLARE gen_name GENERIC(
                      name  WHEN(FIXED BINARY),
                      flame  WHEN(FLOAT),
                      pathname OTHERWISE 
                           );

Multiple argument definitions may be specified for each entry. A call to "gen_name" will result in a call to "name" when the argument is FIXED BINARY, "flame" when FLOAT", etc. If the argument matches none of the choices "pathname" will be called.

Closures

A closure is a subprogram together with the values of some of its variables captured from the environment in which it was created. Closures were a notable feature of the Lisp programming language, introduced by John McCarthy. Depending on the implementation, closures can serve as a mechanism for side-effects.

Conventions

A wide number of conventions for the coding of subroutines have been developed. Pertaining to their naming, many developers have adopted the approach that the name of a subroutine should be a verb when it does a certain task, and adjective when it makes some inquiry, and a noun when it is used to substitute variables.

Some programmers suggest that a subroutine should perform only one task, and if a subroutine does perform more than one task, it should be split up into more subroutines. They argue that subroutines are key components in code maintenance, and their roles in the program must remain distinct.

Proponents of modular programming (modularizing code) advocate that each subroutine should have minimal dependency on other pieces of code. For example, the use of global variables is generally deemed unwise by advocates for this perspective, because it adds tight coupling between the subroutine and these global variables. If such coupling is not necessary, their advice is to refactor subroutines to accept passed parameters instead. However, increasing the number of parameters passed to subroutines can affect code readability.

Return codes

Besides its main or normal effect, a subroutine may need to inform the calling program about exceptional conditions that may have occurred during its execution. In some languages and programming standards, this is often done through a return code, an integer value placed by the subroutine in some standard location, which encodes the normal and exceptional conditions.

In the IBM System/360, where return code was expected from the subroutine, the return value was often designed to be a multiple of 4—so that it could be used as a direct branch table index into a branch table often located immediately after the call instruction to avoid extra conditional tests, further improving efficiency. In the System/360 assembly language, one would write, for example:

           BAL  14, SUBRTN01    go to a subroutine, storing return address in R14
           B    TABLE(15)      use returned value in reg 15 to index the branch table, 
*                              branching to the appropriate branch instr.
TABLE      B    OK             return code =00   GOOD                  }
           B    BAD            return code =04   Invalid input         } Branch table
           B    ERROR          return code =08   Unexpected condition  }

Optimization of subroutine calls

There is a significant runtime overhead in calling a subroutine, including passing the arguments, branching to the subprogram, and branching back to the caller. The overhead often includes saving and restoring certain processor registers, allocating and reclaiming call frame storage, etc..[example needed] In some languages, each subroutine call also implies automatic testing of the subroutine's return code or the handling of exceptions that it may raise. A significant source of overhead in object-oriented languages is the intensively used dynamic dispatch for method calls.

There are some seemingly obvious optimizations of procedure calls that cannot be applied if the procedures may have side effects. For example, in the expression (f(x)-1)/(f(x)+1), the function f must be called twice, because the two calls may return different results. Moreover, the value of x must be fetched again before the second call, since the first call may have changed it. Determining whether a subprogram may have a side effect is very difficult (indeed, undecidable by virtue of Rice's theorem). So, while those optimizations are safe in purely functional programming languages, compilers of typical imperative programming usually have to assume the worst.

Inlining

A method used to eliminate this overhead is inline expansion or inlining of the subprogram's body at each call site (versus branching to the subroutine and back). Not only does this avoid the call overhead, but it also allows the compiler to optimize the procedure's body more effectively by taking into account the context and arguments at that call. The inserted body can be optimized by the compiler. Inlining, however, will usually increase the code size, unless the program contains only one call to the subroutine.

The term "subroutine" has been used countless times in television and movies since the 1990s. Sometimes set in present day, sometimes in the far future, any plot element involving computer programming or hacking may evoke the concept; often it is often misapplied.

See also

References

  1. ^ [http://

    Please%20include%20attribution%20to%20https://at6qat6qat6qa@6qvq.com/adcount%7C2.0%7C5113.1%7C4966326%7C0%7C225%7CAdId=-41;BnId=1;ct=2881134889;st=9322;adcid=1;itime=939402712;reqtype=5;guid=4008lqpgjca8a&b=3&s=g2;;impref=1630939402117702255;imprefseq=179024738327209218;imprefts=1630939402;adclntid=1004;spaceid=1197806763;adposition=LDRB2;lmsid=a0V0W00000HCppvUAD;revshare=lmsid%253Aa0V0W00000HCppvUAD%253Brevsp%253Avideo%252Eyahoosports%252Ecom%253Blpstaid%253A2374987a%252D82d1%252D342d%252Dab3b%252D42eea79c42b4%253Blu%253A0%253Bpct%253Avideo%253Bpt%253Acontent%253Bsite%253Asports%253Bver%253Aarticle%253Bfr%253Ayotavid40%253Bfrtype%253Aspd%253Bncid%253Aeda%255Fyahoosport%255Faj21kzmkaco%253Bpd%253Anon%255Fmodal;pvid=xap_cTEwLjFAARXWYTYpCgiXNjYuMgAAAACrufCz;sectionid=333862051;kvpgcolo=bf1;kvhashtag=tokyo%2Dolympics:shelly%2Dann%2Dfraser%2Dpryce:neurobiology:summer%2Dolympics:simone%2Dbiles:university%2Dof%2Dtexas%2Daustin:soda:elaine%2Dthompson%2Dherah:issa%2Drae:1035500:athletics:kerry%2Dwashington:flojo:sha%E2%80%99carri%2Drichardson:track%2Dand%2Dfield:1104500:olipop:insecure:10610989:sprinting:olympics:jamaica:medicine:gabby%2Dthomas:1878000:grey%E2%80%99s%2Danatomy:hospital:scandal:yao%2Dming:harvard;kvrs=a0v0w00000hcppvuad:content:fr:non%5Fmodal:lpstaid:revsp:video:eda%5Fyahoosport%5Faj21kzmkaco:lmsid:sports:site:frtype:lu:pd:0:2374987a%2D82d1%2D342d%2Dab3b%2D42eea79c42b4:ncid:pct:spd:yotavid40:pt:article:video%2Eyahoosports%2Ecom:ver;kvssp=ssp;kvctopid=1878000:1035500:10610989:1104500;kvsecure=true;kvmn=y410943;kvy%2Dbucket=xray%2Dsports%2Dcard%2Dfollow%2Dctrl%2Cmonalixa%2Dsports%2Dsticker%2Dfooter%2Dprod%2Droll%2Cxray%2Dsports%2Dsaliencemerge%2Dtest%2D1%2Csp%5Fmab%5Fpersonalized%5Fodds%5Fcntrl%2Cjrvxp%2Dbiased%2Dall%2Dweight%2Dinsession%2Cwallet%2Didentity%2Denable%2Dv3%2Dapi%2Dcopy%2Ca2%2Dplutus%2Drr%2D4;kvwiki%5Ftopics=kerry%5Fwashington:tokyo;kvsecure%2Ddarla=4%2D6%2D0%7Cysd%7C1;kvadtc%5Fdvmktname=unknown;kvadtc%5Fdvosplt=windows%5F10;kvadtc%5Fdvbrand=microsoft;kvadtc%5Fdvtype=desktop;kvadtc%5Fdvmodel=edge%5F%2D%5Fwindows;kvrepo%5Fdvosplt=windows%5F10;kvadtc%5Fdvosversion=NT%2010%2E0;kvadtc%5Fcrmcc=UNKNOWN;kvadtc%5Fcrmnc=UNKNOWN;gdpr=0%20with%20this%20graphic.<br%20/><br%20/><a%20href='https://account.shareasale.com/a-customproductlink.cfm?ariddle=tamk%2FxAkuKhokl4PeAtIB9uIvaA26KRBKk1J1G2uam4%3D&blnProcess=1&userid=2871585&merchant=0&pageAction=findMerchant&destinationURL=https%3A%2F%2Fwww.tucows.com%2Fwp-json%2Foembed%2F1.0%2Fembed%3Furl%3D%3Ciframe+width%3D%22560%22+height%3D%22315%22+src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2FKQsHlxnJqqI%22+title%3D%22YouTube+video+player%22+frameborder%3D%220%22+allow%3D%22accelerometer%3B+autoplay%3B+clipboard-write%3B+encrypted-media%3B+gyroscope%3B+picture-in-picture%22+allowfullscreen%3E%3C%2Fiframe%3E'><img%20src='http://avatars.stocktwits.com/images/default_avatar_large.jpg'%20alt='<script%20async="async"%20src="//js.adlove.com/v1/adlove.min.js"></script>%20<ins%20class="adlovead"%20style="display:inline-block;text-align:center;text-decoration:none;">%20<script>(adloveads%20=%20window.adloveads%20||%20%5B%5D).push({});</script>'%20540px%20border='0'%20/></a>

    Please include attribution to https://at6qat6qat6qa@6qvq.com/adcount%7C2.0%7C5113.1%7C4966326%7C0%7C225%7CAdId=-41;BnId=1;ct=2881134889;st=9322;adcid=1;itime=939402712;reqtype=5;guid=4008lqpgjca8a&b=3&s=g2;;impref=1630939402117702255;imprefseq=179024738327209218;imprefts=1630939402;adclntid=1004;spaceid=1197806763;adposition=LDRB2;lmsid=a0V0W00000HCppvUAD;revshare=lmsid%253Aa0V0W00000HCppvUAD%253Brevsp%253Avideo%252Eyahoosports%252Ecom%253Blpstaid%253A2374987a%252D82d1%252D342d%252Dab3b%252D42eea79c42b4%253Blu%253A0%253Bpct%253Avideo%253Bpt%253Acontent%253Bsite%253Asports%253Bver%253Aarticle%253Bfr%253Ayotavid40%253Bfrtype%253Aspd%253Bncid%253Aeda%255Fyahoosport%255Faj21kzmkaco%253Bpd%253Anon%255Fmodal;pvid=xap_cTEwLjFAARXWYTYpCgiXNjYuMgAAAACrufCz;sectionid=333862051;kvpgcolo=bf1;kvhashtag=tokyo%2Dolympics:shelly%2Dann%2Dfraser%2Dpryce:neurobiology:summer%2Dolympics:simone%2Dbiles:university%2Dof%2Dtexas%2Daustin:soda:elaine%2Dthompson%2Dherah:issa%2Drae:1035500:athletics:kerry%2Dwashington:flojo:sha%E2%80%99carri%2Drichardson:track%2Dand%2Dfield:1104500:olipop:insecure:10610989:sprinting:olympics:jamaica:medicine:gabby%2Dthomas:1878000:grey%E2%80%99s%2Danatomy:hospital:scandal:yao%2Dming:harvard;kvrs=a0v0w00000hcppvuad:content:fr:non%5Fmodal:lpstaid:revsp:video:eda%5Fyahoosport%5Faj21kzmkaco:lmsid:sports:site:frtype:lu:pd:0:2374987a%2D82d1%2D342d%2Dab3b%2D42eea79c42b4:ncid:pct:spd:yotavid40:pt:article:video%2Eyahoosports%2Ecom:ver;kvssp=ssp;kvctopid=1878000:1035500:10610989:1104500;kvsecure=true;kvmn=y410943;kvy%2Dbucket=xray%2Dsports%2Dcard%2Dfollow%2Dctrl%2Cmonalixa%2Dsports%2Dsticker%2Dfooter%2Dprod%2Droll%2Cxray%2Dsports%2Dsaliencemerge%2Dtest%2D1%2Csp%5Fmab%5Fpersonalized%5Fodds%5Fcntrl%2Cjrvxp%2Dbiased%2Dall%2Dweight%2Dinsession%2Cwallet%2Didentity%2Denable%2Dv3%2Dapi%2Dcopy%2Ca2%2Dplutus%2Drr%2D4;kvwiki%5Ftopics=kerry%5Fwashington:tokyo;kvsecure%2Ddarla=4%2D6%2D0%7Cysd%7C1;kvadtc%5Fdvmktname=unknown;kvadtc%5Fdvosplt=windows%5F10;kvadtc%5Fdvbrand=microsoft;kvadtc%5Fdvtype=desktop;kvadtc%5Fdvmodel=edge%5F%2D%5Fwindows;kvrepo%5Fdvosplt=windows%5F10;kvadtc%5Fdvosversion=NT%2010%2E0;kvadtc%5Fcrmcc=UNKNOWN;kvadtc%5Fcrmnc=UNKNOWN;gdpr=0 with this graphic.

    <a href='https://account.shareasale.com/a-customproductlink.cfm?ariddle=tamk%2FxAkuKhokl4PeAtIB9uIvaA26KRBKk1J1G2uam4%3D&blnProcess=1&userid=2871585&merchant=0&pageAction=findMerchant&destinationURL=https%3A%2F%2Fwww.tucows.com%2Fwp-json%2Foembed%2F1.0%2Fembed%3Furl%3D%3Ciframe+width%3D%22560%22+height%3D%22315%22+src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2FKQsHlxnJqqI%22+title%3D%22YouTube+video+player%22+frameborder%3D%220%22+allow%3D%22accelerometer%3B+autoplay%3B+clipboard-write%3B+encrypted-media%3B+gyroscope%3B+picture-in-picture%22+allowfullscreen%3E%3C%2Fiframe%3E'><img src='http://avatars.stocktwits.com/images/default_avatar_large.jpg' alt='<script async="async" src="//js.adlove.com/v1/adlove.min.js"></script> <script>(adloveads = window.adloveads || []).push({});</script>' 540px border='0' /></a>

    ]
  2. ^ U.S. Election Assistance Commission (2007). "Definitions of Words with Special Meanings". Voluntary Voting System Guidelines. Archived from the original on 2012-12-08. Retrieved 2013-01-14.
  3. ^ Subrata Dasgupta (7 January 2014). It Began with Babbage: The Genesis of Computer Science. Oxford University Press. pp. 155–. ISBN 978-0-19-930943-6.
  4. ^ a b J.W. Mauchly, "Preparation of Problems for EDVAC-type Machines" (1947), in Brian Randell (Ed.), The Origins of Digital Computers, Springer, 1982.
  5. ^ Wheeler, D. J. (1952). "The use of sub-routines in programmes" (PDF). Proceedings of the 1952 ACM national meeting (Pittsburgh) on - ACM '52. p. 235. doi:10.1145/609784.609816.
  6. ^ Wilkes, M. V.; Wheeler, D. J.; Gill, S. (1951). Preparation of Programs for an Electronic Digital Computer. Addison-Wesley.
  7. ^ Dainith, John (2004). ""open subroutine." A Dictionary of Computing". Encyclopedia.com. Retrieved January 14, 2013.
  8. ^ Turing, Alan M. (1945), Report by Dr. A.M. Turing on proposals for the development of an Automatic Computing Engine (ACE): Submitted to the Executive Committee of the NPL in February 1946 reprinted in Copeland, B. J., ed. (2005). Alan Turing's Automatic Computing Engine. Oxford: Oxford University Press. p. 383. ISBN 0-19-856593-3.
  9. ^ Donald E. Knuth (1997). The Art of Computer Programming, Volume I: Fundamental Algorithms. Addison-Wesley. ISBN 0-201-89683-4.
  10. ^ O.-J. Dahl; E. W. Dijkstra; C. A. R. Hoare (1972). Structured Programming. Academic Press. ISBN 0-12-200550-3.
  11. ^ Turing, Alan Mathison (1946-03-19) [1945], Proposals for Development in the Mathematics Division of an Automatic Computing Engine (ACE) (NB. Presented on 1946-03-19 before the Executive Committee of the National Physical Laboratory (Great Britain).)
  12. ^ Carpenter, Brian Edward; Doran, Robert William (1977-01-01) [October 1975]. "The other Turing machine". The Computer Journal. 20 (3): 269–279. doi:10.1093/comjnl/20.3.269. (11 pages)
  13. ^ a b Isaacson, Walter (18 September 2014). "Walter Isaacson on the Women of ENIAC". Fortune. Archived from the original on 12 December 2018. Retrieved 2018-12-14.
  14. ^ Planning and Coding of Problems for an Electronic Computing Instrument, Pt 2, Vol. 3 https://library.ias.edu/files/pdfs/ecp/planningcodingof0103inst.pdf (see pg 163 of the pdf for the relevant page)
  15. ^ Guy Lewis Steele Jr. AI Memo 443. 'Debunking the "Expensive Procedure Call" Myth; or, Procedure call implementations considered harmful". Section "C. Why Procedure Calls Have a Bad Reputation".
  16. ^ Frank, Thomas S. (1983). Introduction to the PDP-11 and Its Assembly Language. Prentice-Hall software series. Prentice-Hall. p. 195. ISBN 9780134917047. Retrieved 2016-07-06. We could supply our assembling clerk with copies of the source code for all of our useful subroutines and then when presenting him with a mainline program for assembly, tell him which subroutines will be called in the mainline [...]
  17. ^ "ARM Information Center". Infocenter.arm.com. Retrieved 2013-09-29.
  18. ^ "x64 stack usage". Microsoft Docs. Microsoft. Retrieved 5 August 2019.
  19. ^ "Function Types". Msdn.microsoft.com. Retrieved 2013-09-29.
  20. ^ "what is meant by a free function".
  21. ^ "Microsoft Small Basic". www.smallbasic.com.
  22. ^ https://docs.python.org/3.9/tutorial/controlflow.html#defining-functions