[The Vesta evaluator separates] the dependencies into two groups, those that … the primary key and the later the secondary … it to access the cache. This yields a … call site environment for a possible match. … [p. 117] The primary key … is formed by combining the fingerprints of the … the secondary key is a set of (name, …
Google-1
Google-2
Copyright clearance needed for quotation.