Convert the given CEK implementation to an implementation of the CEKS machine.Every other step taken by your CEKS machine should be a gc step that
collects as much as possible.Hand-in procedure for exercise 11.1: Send a mail message containing your code to mflatt@cs.utah.edu. Mime-encoded enclosures are preferred, but any reasonable encoding/enclosing mechanism is fine, including plain text.
Last update: Wednesday, February 28th, 2001mflatt@cs.utah.edu