Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Implementing State Machines

Posted on 1999-10-20
5
Medium Priority
?
233 Views
Last Modified: 2010-04-15
Hello All ,

Can I have pointers to resources which informs about
implementing state machine techniques.

Thanks,
Yogesh
0
Comment
Question by:yogi_bansal
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 1

Expert Comment

by:Ernest022699
ID: 2142688
If possible, avoid making state machines.  They are difficult to debug, and notoriously hard to maintain.  Unless you need the speed and efficiency of a state machine, use some other technique.  Sorry.
0
 
LVL 3

Expert Comment

by:arnond
ID: 2144525
do you need software implementations or hardware implementations ?

Arnon David.
0
 
LVL 2

Accepted Solution

by:
gurpreets earned 60 total points
ID: 2144653
0
 

Author Comment

by:yogi_bansal
ID: 2145778
Arnond ... software state machines...
Sorry, Ernest cannot do without them....
0
 
LVL 3

Expert Comment

by:arnond
ID: 2146502
how about this:

..
..
..
while (1)
{
 switch (state)
   case (state1):
......
   break;
  case (state2):
......
  break;
.......
.......
.......
  case (staten):
......
   break;
}

Arnon David.
}
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Preface I don't like visual development tools that are supposed to write a program for me. Even if it is Xcode and I can use Interface Builder. Yes, it is a perfect tool and has helped me a lot, mainly, in the beginning, when my programs were small…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
The goal of this video is to provide viewers with basic examples to understand and use structures in the C programming language.
The goal of this video is to provide viewers with basic examples to understand opening and writing to files in the C programming language.

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question