library

Prolog files

aggregate.pl  -- Aggregation operators on backtrackable predicatesShow source
ansi_term.pl  -- Print decorated text to ANSI consolesShow source
ansi_format/3Format text with ANSI attributes.Source
message_line_element/2Hook implementation that deals with ansi(+Attr, +Fmt, +Args) in message specifications.Source
apply.pl  -- Apply predicates on a listShow source
apply_macros.pl  -- Goal expansion rules to avoid meta-callingShow source
expand_phrase/2Provide goal-expansion for PhraseGoal.Source
expand_phrase/4Provide goal-expansion for PhraseGoal.Source
archive.pl  -- Access several archive formatsShow source
archive_close/1Close the archive.Source
archive_create/3Convenience predicate to create an archive in OutputFile with data from a list of InputFiles and the given Options.Source
archive_data_stream/3True when DataStream is a stream to a data object inside Archive.Source
archive_entries/2True when Paths is a list of pathnames appearing in Archive.Source
archive_extract/3Extract files from the given archive into Dir.Source
archive_header_property/2True when Property is a property of the current header.Source
archive_next_header/2Forward to the next entry of the archive for which Name unifies with the pathname of the entry.Source
archive_open/4Open the archive in Data and unify Archive with a handle to the opened archive.Source
archive_open_entry/2Open the current entry as a stream.Source
archive_property/2True when Property is a property of the archive Handle.Source
archive_set_header_property/2Set Property of the current header.Source
arithmetic.pl  -- Extensible arithmeticShow source
assoc.pl  -- Binary associationsShow source
backcomp.pl  -- Backward compatibilityShow source
base32.pl  -- Base32 encoding and decodingShow source
base64.pl  -- Base64 encoding and decodingShow source
broadcast.pl  -- Event serviceShow source
c14n2.pl  -- C14n2 canonical XML documentsShow source
cgi.pl  -- Read CGI parametersShow source
charsio.pl  -- I/O on Lists of Character CodesShow source
atom_to_chars/2Convert Atom into a list of character codes.Source
atom_to_chars/3Convert Atom into a difference list of character codes.Source
format_to_chars/3Use format/2 to write to a list of character codes.Source
format_to_chars/4Use format/2 to write to a difference list of character codes.Source
number_to_chars/2Convert Atom into a list of character codes.Source
number_to_chars/3Convert Number into a difference list of character codes.Source
open_chars_stream/2Open Codes as an input stream.Source
read_from_chars/2Read Codes into Term.Source
read_term_from_chars/3Read Codes into Term.Source
with_output_to_chars/2Run Goal as with once/1.Source
with_output_to_chars/3Run Goal as with once/1.Source
with_output_to_chars/4Same as with_output_to_chars/3 using an explicit stream.Source
write_to_chars/2Write a term to a code list.Source
write_to_chars/3Write a term to a code list.Source
check.pl  -- Consistency checkingShow source
chr.plShow source
crypt.plShow source
crypto.pl  -- Cryptography and authentication libraryShow source
crypto_context_hash/2Obtain the hash code of Context.Source
crypto_context_new/2Context is unified with the empty context, taking into account Options.Source
crypto_curve_generator/2Point is the generator of the elliptic curve Curve.Source
crypto_curve_order/2Obtain the order of an elliptic curve.Source
crypto_curve_scalar_mult/4R is the result of N times Point on the elliptic curve Curve.Source
crypto_data_context/3Context0 is an existing computation context, and Context is the new context after hashing Data in addition to the previously hashed data.Source
crypto_data_decrypt/6Decrypt the given CipherText, using the symmetric algorithm Algorithm, key Key, and initialization vector IV, to give PlainText.Source
crypto_data_encrypt/6Encrypt the given PlainText, using the symmetric algorithm Algorithm, key Key, and initialization vector (or nonce) IV, to give CipherText.Source
crypto_data_hash/3Hash is the hash of Data.Source
crypto_data_hkdf/4Concentrate possibly dispersed entropy of Data and then expand it to the desired length.Source
crypto_file_hash/3True if Hash is the hash of the content of File.Source
crypto_generate_prime/3Generate a prime P with at least N bits.Source
crypto_is_prime/2True iff P passes a probabilistic primality test.Source
crypto_modular_inverse/3Compute the modular multiplicative inverse of the integer X.Source
crypto_n_random_bytes/2Bytes is unified with a list of N cryptographically secure pseudo-random bytes.Source
crypto_name_curve/2Obtain a handle for a named elliptic curve.Source
crypto_open_hash_stream/3Open a filter stream on OrgStream that maintains a hash.Source
crypto_password_hash/2If Hash is instantiated, the predicate succeeds iff the hash matches the given password.Source
crypto_password_hash/3Derive Hash based on Password.Source
crypto_stream_hash/2Unify Hash with a hash for the bytes sent to or read from HashStream.Source
ecdsa_sign/4Create an ECDSA signature for Data with EC private key Key.Source
ecdsa_verify/4True iff Signature can be verified as the ECDSA signature for Data, using the EC public key Key.Source
hex_bytes/2Relation between a hexadecimal sequence and a list of bytes.Source
rsa_private_decrypt/4RSA Public key encryption and decryption primitives.Source
rsa_private_encrypt/4RSA Public key encryption and decryption primitives.Source
rsa_public_decrypt/4RSA Public key encryption and decryption primitives.Source
rsa_public_encrypt/4RSA Public key encryption and decryption primitives.Source
rsa_sign/4Create an RSA signature for Data with private key Key.Source
rsa_verify/4Verify an RSA signature for Data with public key Key.Source
csv.pl  -- Process CSV (Comma-Separated Values) dataShow source
ctypes.pl  -- Character code classificationShow source
date.pl  -- Process dates and timesShow source
debug.plShow source
assertion_failed/2This hook is called if the Goal of assertion/1 fails.Source
debug_print_hook/3Hook called by debug/3.Source
assertion/1Acts similar to C assert() macro.Source
debug/1Add/remove a topic from being printed.Source
debug/3Format a message if debug topic is enabled.Source
debug_message_context/1Specify additional context for debug messages.Source
debugging/1Examine debug topics.Source
debugging/2Examine debug topics.Source
list_debug_topics/0List currently known debug topics and their setting.Source
nodebug/1Add/remove a topic from being printed.Source
dialect.plShow source
exists_source/1True if Source (a term valid for load_files/2) exists.Source
expects_dialect/1Tell Prolog all subsequent code to the end of the file or the next :- expects_dialect/1 directive is written for the indicated Dialect.Source
source_exports/2True if Source exports Export.Source
dicts.pl  -- Dict utilitiesShow source
dict_fill/4Implementation for the dicts_to_same_keys/3 OnEmpty closure that fills new cells with a copy of ValueIn.Source
dict_keys/2True when Keys is an ordered set of the keys appearing in Dict.Source
dicts_join/3Join dicts in Dicts that have the same value for Key, provided they do not have conflicting values on other keys.Source
dicts_join/4Join two lists of dicts (Dicts1 and Dicts2) on Key.Source
dicts_same_keys/2True if List is a list of dicts that all have the same keys and Keys is an ordered set of these keys.Source
dicts_same_tag/2True when List is a list of dicts that all have the tag Tag.Source
dicts_slice/3DictsOut is a list of Dicts only containing values for Keys.Source
dicts_to_compounds/4True when Dicts and Compounds are lists of the same length and each element of Compounds is a compound term whose arguments represent the values associated with the corresponding keys in Keys.Source
dicts_to_same_keys/3DictsOut is a copy of DictsIn, where each dict contains all keys appearing in all dicts of DictsIn.Source
dif.pl  -- The dif/2 constraintShow source
dif/2Constraint that expresses that Term1 and Term2 never become identical (==/2).Source
doc_files.pl  -- Create stand-alone documentation filesShow source
doc_save/2Save documentation for FileOrDir to file(s).Source
doc_http.pl  -- Documentation serverShow source
double_metaphone.pl  -- Phonetic string matchingShow source
edinburgh.pl  -- Some traditional Edinburgh predicatesShow source
edit.pl  -- Editor interfaceShow source
error.pl  -- Error generating supportShow source
current_type/3True when Type is a currently defined type and Var satisfies Type of the body term Body succeeds.Source
domain_error/2The argument is of the proper type, but has a value that is outside the supported values.Source
existence_error/2Term is of the correct type and correct domain, but there is no existing (external) resource that is represented by it.Source
has_type/2True if Term satisfies Type.Source
instantiation_error/1An argument is under-instantiated.Source
is_of_type/2True if Term satisfies Type.Source
must_be/2True if Term satisfies the type constraints for Type.Source
permission_error/3It is not allowed to perform Action on the object Term that is of the given Type.Source
representation_error/1A representation error indicates a limitation of the implementation.Source
resource_error/1A goal cannot be completed due to lack of resources.Source
syntax_error/1A text has invalid syntax.Source
type_error/2Tell the user that Term is not of the expected Type.Source
uninstantiation_error/1An argument is over-instantiated.Source
explain.pl  -- Describe Prolog TermsShow source
explain/1Write all information known about Term to the current output.Source
explain/2Explanation describes information about Term.Source
files.plShow source
can_open_file/2Succeeds if the user has access to `File' in mode `Mode'.Source
chdir/1Change Working Directory.Source
filesex.pl  -- Extended operations on filesShow source
copy_directory/2Copy the contents of the directory From to To (recursively).Source
copy_file/2Copy a file into a new file or directory.Source
delete_directory_and_contents/1Recursively remove the directory Dir and its contents.Source
delete_directory_contents/1Remove all content from directory Dir, without removing Dir itself.Source
directory_file_path/3True when Path is the full path-name for File in Dir.Source
link_file/3Create a link in the filesystem from NewPath to OldPath.Source
make_directory_path/1Create Dir and all required components (like mkdir -p).Source
relative_file_name/3True when RelPath is Path, relative to RelTo.Source
set_time_file/3Query and set POSIX time attributes of a file.Source
gensym.pl  -- Generate unique symbolsShow source
git.pl  -- Run GIT commandsShow source
hash_stream.pl  -- Maintain a hash on a streamShow source
help.plShow source
apropos/1Give a list of subjects that might be appropriate.Source
help/1Display online help on specified subject.Source
helpidx.plShow source
iostream.plShow source
listing.pl  -- List programs and pretty print clausesShow source
lists.pl  -- List ManipulationShow source
main.pl  -- Provide entry point for scriptsShow source
argv_options/3Generic transformation of long commandline arguments to options.Source
main/0Call main/1 using the passed command-line arguments.Source
make.pl  -- Reload modified source filesShow source
make/0Reload all source files that have been changed since they were loaded.Source
make_hook/2This hook is called by make/0.
md5.pl  -- MD5 hashesShow source
memfile.plShow source
modules.pl  -- Module utility predicatesShow source
nb_set.pl  -- Non-backtrackable setsShow source
add_nb_set/2Insert Key into the set.Source
add_nb_set/3Insert Key into the set.Source
empty_nb_set/1Create an empty non-backtrackable set.Source
gen_nb_set/2Enumerate the members of a set in the standard order of terms.Source
nb_set_to_list/2Get the elements of a an nb_set.Source
size_nb_set/2Unify Size with the number of elements in the set.Source
occurs.pl  -- Finding and counting sub-termsShow source
operators.pl  -- Manage operatorsShow source
option.pl  -- Option list processingShow source
ordsets.pl  -- Ordered set manipulationShow source
oset.pl  -- Ordered set manipulationShow source
pairs.pl  -- Operations on key-value listsShow source
group_pairs_by_key/2Group values with equivalent (==/2) consecutive keys.Source
map_list_to_pairs/3Create a Key-Value list by mapping each element of List.Source
pairs_keys/2Remove the values from a list of Key-Value pairs.Source
pairs_keys_values/3True if Keys holds the keys of Pairs and Values the values.Source
pairs_values/2Remove the keys from a list of Key-Value pairs.Source
transpose_pairs/2Swap Key-Value to Value-Key.Source
pcre.pl  -- Perl compatible regular expression matching for SWI-PrologShow source
pengines.pl  -- Pengines: Web Logic Programming Made EasyShow source
pengines_io.pl  -- Provide Prolog I/O for HTML clientsShow source
binding_term/5Hook to render a Prolog result term as HTML.Source
pengine_bind_io_to_html/1Redefine the built-in predicates for IO to send HTML messages using pengine_output/1.Source
pengine_display/1Redirect the corresponding Prolog output predicates.Source
pengine_flush_output/0No-op.Source
pengine_format/1As format/1,2.Source
pengine_format/2As format/1,2.Source
pengine_io_predicate/1True when Head describes the head of a (system) IO predicate that is redefined by the HTML binding.Source
pengine_listing/0List the content of the current pengine or a specified predicate in the pengine.Source
pengine_listing/1List the content of the current pengine or a specified predicate in the pengine.Source
pengine_nl/0Emit a <br/> to the pengine.Source
pengine_print/1Redirect the corresponding Prolog output predicates.Source
pengine_write/1Redirect the corresponding Prolog output predicates.Source
pengine_write_canonical/1Redirect the corresponding Prolog output predicates.Source
pengine_write_term/2Writes term as <span class=Class>Term</span>.Source
pengine_writeln/1Emit Term as <span class=writeln>Term<br></span>.Source
pengine_writeq/1Redirect the corresponding Prolog output predicates.Source
message_hook/3Send output from print_message/2 to the pengine.Source
persistency.pl  -- Provide persistent dynamic predicatesShow source
pldoc.pl  -- Process source documentationShow source
porter_stem.plShow source
predicate_options.pl  -- Access and analyse predicate optionsShow source
assert_predicate_options/4As predicate_options(:PI, +Arg, +Options).Source
check_predicate_option/3Verify predicate options at runtime.Source
check_predicate_options/0Analyse loaded program for erroneous options.Source
check_predicate_options/1Verify calls to predicates that have options in all clauses of the predicate indicated by PredicateIndicator.Source
current_option_arg/2True when Arg of PI processes predicate options.Source
current_predicate_option/3True when Arg of PI processes Option.Source
current_predicate_options/3True when Options is the current active option declaration for PI on Arg.Source
derive_predicate_options/0Derive new predicate option declarations.Source
derived_predicate_options/1Derive predicate option declarations for a module.Source
derived_predicate_options/3Derive option arguments using static analysis.Source
predicate_options/3Declare that the predicate PI processes options on Arg.Source
retractall_predicate_options/0Remove all dynamically (derived) predicate options.Source
process.pl  -- Create processes and redirect I/OShow source
is_process/1True if PID might be a process.Source
process_create/3Create a new process running the file Exe and using arguments from the given list.Source
process_group_kill/1Send signal to the group containing process PID.Source
process_group_kill/2Send signal to the group containing process PID.Source
process_id/1True if PID is the process id of the running Prolog process.Source
process_id/2PID is the process id of Process.Source
process_kill/1Send signal to process PID.Source
process_kill/2Send signal to process PID.Source
process_release/1Release process handle.Source
process_wait/2True if PID completed with Status.Source
process_wait/3True if PID completed with Status.Source
prolog_autoload.pl  -- Autoload all dependenciesShow source
prolog_breakpoints.pl  -- Manage Prolog break-pointsShow source
prolog_clause.pl  -- Get detailed source-information about a clauseShow source
clause_info/4Fetches source information for the given clause.Source
clause_name/2Provide a suitable description of the indicated clause.Source
initialization_layout/4Find term-layout of :- initialization directives.Source
open_source/2Hook into clause_info/5 that opens the stream holding the source for a specific clause.Source
predicate_name/2Describe a predicate as [Module:]Name/Arity.Source
unify_goal/5This hook is called to fix up source code manipulations that result from goal expansions.Source
prolog_codewalk.pl  -- Prolog code walkerShow source
prolog_program_clause/2True when ClauseRef is a reference for clause in the program.Source
prolog_walk_code/1Walk over all loaded (user) Prolog code.Source
prolog_colour.pl  -- Prolog syntax colouring support.Show source
prolog_format.pl  -- Analyse format specificationsShow source
prolog_history.pl  -- Per-directory persistent commandline historyShow source
prolog_history/1Execute Action on the history.Source
prolog_metainference.pl  -- Infer meta-predicate propertiesShow source
prolog_pack.pl  -- A package manager for PrologShow source
prolog_source.pl  -- Examine Prolog source-filesShow source
prolog_stack.pl  -- Examine the Prolog stackShow source
prolog_stream.pl  -- A stream with Prolog callbacksShow source
prolog_xref.pl  -- Prolog cross-referencer data collectionShow source
pure_input.pl  -- Pure Input from files and streamsShow source
qsave.pl  -- Save current program as a state or executableShow source
qsave_program/1Make a saved state in file `File'.Source
qsave_program/2Make a saved state in file `File'.Source
quasi_quotations.pl  -- Define Quasi Quotation syntaxShow source
quintus.pl  -- Quintus compatibilityShow source
abs/2Unify `Absolute' with the absolute value of `Number'.Source
atom_char/2Same as ISO char_code/2.Source
compile/1Compile files.Source
cos/2Math library predicates.Source
current_stream/3SICStus/Quintus and backward compatible predicate.Source
date/1Get current date as date(Y,M,D).Source
genarg/3Generalised version of ISO arg/3.Source
log/2Math library predicates.Source
log10/2Math library predicates.Source
midstring/3Too difficult to explain.Source
midstring/4Too difficult to explain.Source
midstring/5Too difficult to explain.Source
midstring/6Too difficult to explain.Source
mode/1Ignore a DEC10/Quintus :- mode(Head) declaration.Source
no_style_check/1Same as SWI-Prolog style_check(-Style).Source
on_exception/3Source
otherwise/0For (A -> B ; otherwise -> C).Source
prolog_flag/2Same as ISO current_prolog_flag/2.Source
raise_exception/1Quintus compatible exception handling.Source
simple/1Term is atomic or a variable.Source
sin/2Math library predicates.Source
skip_line/0Skip the rest of the current line (on Stream).Source
skip_line/1Skip the rest of the current line (on Stream).Source
stream_position/3True when Old is the current position in Stream and the stream has been repositioned to New.Source
tan/2Math library predicates.Source
unix/1interface to Unix.Source
random.pl  -- Random numbersShow source
rbtrees.pl  -- Red black treesShow source
is_rbtree/1True if Term is a valide Red-Black tree.Source
list_to_rbtree/2Tree is the red-black tree corresponding to the mapping in List, which should be a list of Key-Value pairs.Source
ord_list_to_rbtree/2Tree is the red-black tree corresponding to the mapping in list List, which should be a list of Key-Value pairs.Source
rb_apply/4If the value associated with key Key is Val0 in Tree, and if call(G,Val0,ValF) holds, then NewTree differs from Tree only in that Key is associated with value ValF in tree NewTree.Source
rb_clone/3`Clone' the red-back tree TreeIn into a new tree TreeOut with the same keys as the original but with all values set to unbound values.Source
rb_del_max/4Delete the largest element from the tree Tree, returning the key Key, the value Val associated with the key and a new tree NewTree.Source
rb_del_min/4Delete the least element from the tree Tree, returning the key Key, the value Val associated with the key and a new tree NewTree.Source
rb_delete/3Delete element with key Key from the tree Tree, returning the value Val associated with the key and a new tree NewTree.Source
rb_delete/4Delete element with key Key from the tree Tree, returning the value Val associated with the key and a new tree NewTree.Source
rb_empty/1Succeeds if Tree is an empty Red-Black tree.Source
rb_fold/4Fold the given predicate over all the key-value pairs in Tree, starting with initial state State0 and returning the final state State.Source
rb_in/3True when Key-Value is a key-value pair in red-black tree Tree.Source
rb_insert/4Add an element with key Key and Value to the tree Tree creating a new red-black tree NewTree.Source
rb_insert_new/4Add a new element with key Key and Value to the tree Tree creating a new red-black tree NewTree.Source
rb_keys/2Keys is unified with an ordered list of all keys in the Red-Black tree Tree.Source
rb_lookup/3True when Value is associated with Key in the Red-Black tree Tree.Source
rb_map/2True if call(Goal, Value) is true for all nodes in T.Source
rb_map/3For all nodes Key in the tree Tree, if the value associated with key Key is Val0 in tree Tree, and if call(G,Val0,ValF) holds, then the value associated with Key in NewTree is ValF.Source
rb_max/3Key is the maximal key in Tree, and is associated with Val.Source
rb_min/3Key is the minimum key in Tree, and is associated with Val.Source
rb_new/1Create a new Red-Black tree Tree.Source
rb_next/4Next is the next element after Key in Tree, and is associated with Val.Source
rb_partial_map/4For all nodes Key in Keys, if the value associated with key Key is Val0 in tree Tree, and if call(G,Val0,ValF) holds, then the value associated with Key in NewTree is ValF.Source
rb_previous/4Previous is the previous element after Key in Tree, and is associated with Val.Source
rb_size/2Size is the number of elements in Tree.Source
rb_update/4Tree NewTree is tree Tree, but with value for Key associated with NewVal.Source
rb_update/5Tree NewTree is tree Tree, but with value for Key associated with NewVal.Source
rb_visit/2Pairs is an infix visit of tree Tree, where each element of Pairs is of the form Key-Value.Source
rdf.plShow source
load_rdf/2Parse an XML file holding an RDF term into a list of RDF triples.Source
load_rdf/3Parse an XML file holding an RDF term into a list of RDF triples.Source
process_rdf/3Process RDF from Input.Source
xml_to_rdf/3Source
rdf_ntriples.pl  -- RDF N-triples parser (obsolete)Show source
rdf_parser.plShow source
element_to_plrdf/3Rewrite a single XML element.Source
rdf_name_space/1True if URL must be handled as rdf: Determines special handling of rdf:about, rdf:resource, etc.Source
xml_to_plrdf/3Translate an XML (using namespaces) term into an Prolog term representing the RDF data.Source
rdf_triple.pl  -- Create triples from intermediate representationShow source
rdf_write.pl  -- Write RDF/XML from a list of triplesShow source
readline.pl  -- GNU readline interfaceShow source
rl_add_history/1Add a line to the history.
rl_read_history/1Read a saved history from File.
rl_read_init_file/1Read a GNU readline config file.
rl_write_history/1Save the history to File.
readutil.pl  -- Read utilitiesShow source
record.pl  -- Access compound arguments by nameShow source
current_record/2True if Name is the name of a record defined in the module associated with Term and Term is the user-provided record declaration.Source
current_record_predicate/2True if PI is the predicate indicator for an access predicate to Record.Source
record/1Define access predicates for a compound-term.Source
rewrite.plShow source
sandbox.pl  -- Sandboxed Prolog codeShow source
sandbox_allowed_directive/1Throws an exception if G is not considered a safe directive.Source
sandbox_allowed_expansion/1Throws an exception if G is not considered a safe expansion goal.Source
sandbox_allowed_goal/1Throw an exception if it is not safe to call G.Source
safe_call/1Call Goal if it complies with the sandboxing rules.Source
safe_directive/1Hook to declare additional directives as safe.Source
safe_global_variable/1Declare the given global variable safe to write to.Source
safe_goal/1True if calling Goal provides no security risc.Source
safe_meta/2Hook.Source
safe_primitive/1True if Goal is safe to call (i.e., cannot access dangerous system-resources and cannot upset other parts of the Prolog process).Source
settings.pl  -- Setting managementShow source
sgml.pl  -- SGML, XML and HTML parserShow source
sgml_write.pl  -- XML/SGML writer moduleShow source
html_write/2Write a term as created by the SGML/XML parser to a stream in SGML or XML format.Source
html_write/3Write a term as created by the SGML/XML parser to a stream in SGML or XML format.Source
sgml_write/2Write a term as created by the SGML/XML parser to a stream in SGML or XML format.Source
sgml_write/3Write a term as created by the SGML/XML parser to a stream in SGML or XML format.Source
xml_write/2Write a term as created by the SGML/XML parser to a stream in SGML or XML format.Source
xml_write/3Write a term as created by the SGML/XML parser to a stream in SGML or XML format.Source
xmlns/2Hook to define human readable abbreviations for XML namespaces.Source
sha.pl  -- SHA secure hashesShow source
file_sha1/2True when SHA1 is the SHA1 hash for the content of File.Source
hash_atom/2Convert a list of bytes (integers 0..255) into the usual hexadecimal notation.Source
hmac_sha/4For Options, see sha_hash/3.Source
sha_hash/3Hash is the SHA hash of Data, The conversion is controlled by Options:.Source
sha_hash_ctx/4Hash is the SHA hash of Data.Source
sha_new_ctx/2NewContext is unified with the empty SHA computation context (which includes the Options.) It could later be passed to sha_hash_ctx/4.Source
shell.pl  -- Elementary shell commandsShow source
shlib.pl  -- Utility library for loading foreign objects (DLLs, shared objects)Show source
snowball.pl  -- The Snowball multi-lingual stemmer libraryShow source
snowball/3Apply the Snowball Algorithm on Input and unify the result (an atom) with Stem.Source
snowball_current_algorithm/1True if Algorithm is the official name of an algorithm suported by snowball/3.Source
socket.pl  -- Network socket (TCP and UDP) libraryShow source
gethostname/1Return the canonical fully qualified name of this host.Source
negotiate_socks_connection/2Negotiate a connection to DesiredEndpoint over StreamPair.Source
proxy_for_url/3This hook can be implemented to return a proxy to try when connecting to URL.Source
tcp_accept/3This predicate waits on a server socket for a connection request by a client.Source
tcp_bind/2Bind the socket to Address on the current machine.Source
tcp_close_socket/1Closes the indicated socket, making SocketId invalid.Source
tcp_connect/2Connect SocketId.Source
tcp_connect/3Establish a TCP communication as a client.Source
tcp_connect/4Connect a (client) socket to Address and return a bi-directional connection through the stream-handles Read and Write.Source
tcp_fcntl/3Interface to the fcntl() call.Source
tcp_host_to_address/2Translate between a machines host-name and it's (IP-)address.Source
tcp_listen/2Tells, after tcp_bind/2, the socket to listen for incoming requests for connections.Source
tcp_open_socket/2Create streams to communicate to SocketId.Source
tcp_open_socket/3Similar to tcp_open_socket/2, but creates two separate sockets where tcp_open_socket/2 would have created a stream pair.Source
tcp_select/3Same as the built-in wait_for_input/3, but integrates better with event processing and the various options of sockets for Windows.Source
tcp_setopt/2Set options on the socket.Source
tcp_socket/1Creates an INET-domain stream-socket and unifies an identifier to it with SocketId.Source
try_proxy/4Attempt a socket-level connection via the given proxy to TargetAddress.Source
solution_sequences.pl  -- Modify solution sequencesShow source
distinct/1True if Goal is true and no previous solution of Goal bound Witness to the same value.Source
distinct/2True if Goal is true and no previous solution of Goal bound Witness to the same value.Source
group_by/4Group bindings of Template that have the same value for By.Source
limit/2Limit the number of solutions.Source
offset/2Ignore the first Count solutions.Source
order_by/2Order solutions according to Spec.Source
reduced/1Similar to distinct/1, but does not guarantee unique results in return for using a limited amount of memory.Source
reduced/3Similar to distinct/1, but does not guarantee unique results in return for using a limited amount of memory.Source
sort.plShow source
ssl.pl  -- Secure Socket Layer (SSL) libraryShow source
cert_accept_any/5Implementation for the hook `cert_verify_hook(:Hook)` that accepts any certificate.Source
load_certificate/2Loads a certificate from a PEM- or DER-encoded stream, returning a term which will unify with the same certificate if presented in cert_verify_hook.Source
load_crl/2Loads a CRL from a PEM- or DER-encoded stream, returning a term containing terms hash/1, signature/1, issuer_name/1 and revocations/1, which is a list of revoked/2 terms.Source
load_private_key/3Load a private key PrivateKey from the given stream Stream, using Password to decrypt the key if it is encrypted.Source
load_public_key/2Load a public key PublicKey from the given stream Stream.Source
ssl_add_certificate_key/4Add an additional certificate/key pair to SSL0, yielding SSL.Source
ssl_context/3Create an SSL context.Source
ssl_negotiate/5Once a connection is established and a read/write stream pair is available, (PlainRead and PlainWrite), this predicate can be called to negotiate an SSL session over the streams.Source
ssl_peer_certificate/2True if the peer certificate is provided (this is always the case for a client connection) and Certificate unifies with the peer certificate.Source
ssl_peer_certificate_chain/2Certificates is the certificate chain provided by the peer, represented as a list of certificates.Source
ssl_secure_ciphers/1Secure ciphers must guarantee forward secrecy, and must mitigate all known critical attacks.Source
ssl_session/2Retrieves (debugging) properties from the SSL context associated with Stream.Source
ssl_set_options/3SSL is the same as SSL0, except for the options specified in Options.Source
system_root_certificates/1List is a list of trusted root certificates as provided by the OS.Source
statistics.pl  -- Get information about resource usageShow source
profile/1Run Goal under the execution profiler.Source
profile/2Run Goal under the execution profiler.Source
show_profile/1Display last collected profiling data.Source
statistics/0Print information about resource usage using print_message/2.Source
statistics/1Stats is a dict representing the same information as statistics/0.Source
thread_statistics/2Obtain statistical information about a single thread.Source
time/1Execute Goal, reporting statistics to the user.Source
streampool.plShow source
syslog.pl  -- Unix syslog interfaceShow source
system.pl  -- System utilitiesShow source
table.plShow source
tabling.pl  -- Tabled execution (SLG WAM)Show source
term_to_json.plShow source
terms.pl  -- Term manipulationShow source
subsumes/2True if Generic is unified to Specific without changing Specific.Source
subsumes_chk/2True if Generic can be made equivalent to Specific without changing Specific.Source
term_factorized/3Is true when Skeleton is Term where all subterms that appear multiple times are replaced by a variable and Substitution is a list of Var=Value that provides the subterm at the location Var.Source
term_size/2True if Size is the size in cells occupied by Term on the global (term) stack.Source
term_subsumer/3General is the most specific term that is a generalisation of Special1 and Special2.Source
variant/2Same as SWI-Prolog Term1 =@= Term2.Source
thread.pl  -- High level thread primitivesShow source
thread_pool.pl  -- Resource bounded thread managementShow source
threadutil.pl  -- Interactive thread utilitiesShow source
time.plShow source
alarm/3Set up an alarm to be signaled Time seconds from now.Source
alarm/4Set up an alarm to be signaled Time seconds from now.Source
alarm_at/3As alarm/3 and alarm/4, but schedule the alarm at an absolute point in time.Source
alarm_at/4As alarm/3 and alarm/4, but schedule the alarm at an absolute point in time.Source
call_with_time_limit/2Call Goal, while watching out for a (wall-time) limit.Source
current_alarm/4Enumerate the alarms in the schedule.Source
install_alarm/1Install an alarm allocated using alarm/4 with the install(false) option or de-activated using uninstall_alarm/1.Source
install_alarm/2Install an alarm allocated using alarm/4 with the install(false) option or de-activated using uninstall_alarm/1.Source
remove_alarm/1Remove an alarm.Source
uninstall_alarm/1De-activate an alarm.Source
tty.pl  -- Terminal operationsShow source
udp_broadcast.pl  -- A UDP Broadcast BridgeShow source
ugraphs.pl  -- Graph manipulation libraryShow source
compose/3Calculates the composition of two S-form graphs, which need not have the same set of vertices.Source
del_vertices/3Unify NewGraph with a new graph obtained by deleting the list of Vertices and all the edges that start from or go to a vertex in Vertices to the Graph.Source
edges/2Edges is the set of edges in UGraph.Source
neighbors/3Neigbours is a sorted list of the neighbours of Vertex in Graph.Source
neighbours/3Neigbours is a sorted list of the neighbours of Vertex in Graph.Source
top_sort/2Sorted is a topological sorted list of nodes in Graph.Source
top_sort/3Sorted is a topological sorted list of nodes in Graph.Source
transpose_ugraph/2Unify NewGraph with a new graph obtained from Graph by replacing all edges of the form V1-V2 by edges of the form V2-V1.Source
ugraph_union/3Is true when Union is the union of Set1 and Set2.Source
vertices/2Strips off the neighbours lists of an S-representation to produce a list of the vertices of the graph.Source
vertices_edges_to_ugraph/3Create a UGraph from Vertices and edges.Source
uid.pl  -- User and group management on Unix systemsShow source
unicode.pl  -- Unicode string handlingShow source
unix.pl  -- Unix specific operationsShow source
detach_IO/0Detach I/O similar to detach_IO/1.Source
detach_IO/1This predicate is intended to create Unix deamon processes.Source
dup/2Interface to Unix dup2(), copying the underlying filedescriptor and thus making both streams point to the same underlying object.Source
exec/1Replace the running program by starting Command.Source
fork/1Clone the current process into two branches.Source
fork_exec/1Fork (as fork/1) and exec (using exec/1) the child immediately.Source
kill/2Deliver a software interrupt to the process with identifier Pid using software-interrupt number Signal.Source
pipe/2Create a communication-pipe.Source
prctl/1Access to Linux process control operations.Source
sysconf/1Access system configuration.Source
wait/2Wait for a child to change status.Source
uri.pl  -- Process URIsShow source
url.pl  -- Analysing and constructing URLShow source
file_name_to_url/2Translate between a filename and a file:// URL.Source
global_url/3Translate a possibly relative URL into an absolute one.Source
http_location/2Construct or analyze an HTTP location.Source
is_absolute_url/1True if URL is an absolute URL.Source
parse_url/2Construct or analyse a URL.Source
parse_url/3Similar to parse_url/2 for relative URLs.Source
parse_url_search/2Construct or analyze an HTTP search specification.Source
set_url_encoding/2Query and set the encoding for URLs.Source
url_iri/2Convert between a URL, encoding in US-ASCII and an IRI.Source
www_form_encode/2En/decode to/from application/x-www-form-encoded.Source
utf8.pl  -- UTF-8 encoding/decoding on lists of character codes.Show source
uuid.pl  -- Universally Unique Identifier (UUID) LibraryShow source
varnumbers.pl  -- Utilities for numbered termsShow source
when.pl  -- Conditional coroutiningShow source
when/2Execute Goal when Condition is satisfied.Source
win_menu.pl  -- Console window menuShow source
writef.pl  -- Old-style formatted writeShow source
swritef/2Use writef/1 or writef/2 and write the result to a string.Source
swritef/3Use writef/1 or writef/2 and write the result to a string.Source
writef/1Formatted write to the current_output.Source
writef/2Formatted write to the current_output.Source
www_browser.pl  -- Open a URL in the users browserShow source
xmlenc.pl  -- XML encryption libraryShow source
xpath.pl  -- Select nodes in an XML DOMShow source
xsdp_types.pl  -- XML-Schema primitive typesShow source
yall.pl  -- Lambda expressionsShow source
//2Shorthand for Free/[]>>Lambda.Source
//3Shorthand for Free/[]>>Lambda.Source
//4Shorthand for Free/[]>>Lambda.Source
//5Shorthand for Free/[]>>Lambda.Source
//6Shorthand for Free/[]>>Lambda.Source
//7Shorthand for Free/[]>>Lambda.Source
//8Shorthand for Free/[]>>Lambda.Source
//9Shorthand for Free/[]>>Lambda.Source
>>/2Calls a copy of Lambda.Source
>>/3Calls a copy of Lambda.Source
>>/4Calls a copy of Lambda.Source
>>/5Calls a copy of Lambda.Source
>>/6Calls a copy of Lambda.Source
>>/7Calls a copy of Lambda.Source
>>/8Calls a copy of Lambda.Source
>>/9Calls a copy of Lambda.Source
is_lambda/1True if Term is a valid Lambda expression.Source
lambda_calls/2Goal is the goal called if call/N is applied to LambdaExpression, where ExtraArgs are the additional arguments to call/N.Source
lambda_calls/3Goal is the goal called if call/N is applied to LambdaExpression, where ExtraArgs are the additional arguments to call/N.Source
zlib.pl  -- Zlib wrapper for SWI-PrologShow source
encoding_filter/3Act as plugin for library(http/http_open) for processing content with Content-encoding: gzip.Source
gzopen/3Open a file compatible with the gzip program.Source
gzopen/4Open a file compatible with the gzip program.Source