G'day all.

Quoting Chung-chieh Shan <[EMAIL PROTECTED]>:

Yes.  You can even do this portably, using nothing "unsafe", with Dylan
Thurston's technique:

That paper gives you a choice between inefficient and leaky.  I think I'll
take unsafeCoerce#. :-)

Cheers,
Andrew Bromage
_______________________________________________
Haskell-Cafe mailing list
Haskell-Cafe@haskell.org
http://www.haskell.org/mailman/listinfo/haskell-cafe

Reply via email to