Low-level Software Security: Attacks and Countermeasures

Size: px
Start display at page:

Download "Low-level Software Security: Attacks and Countermeasures"

Transcription

1 Lw-level Sftware Security: Attacks and Cuntermeasures Prf Frank PIESSENS These slides are based n the paper: Lw-level Sftware Security by Example by Erlingssn, Yunan and Piessens

2 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses that prevent / detect explitatin Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 2

3 Intrductin An implementatin-level sftware vulnerability is a bug in a prgram that can be explited by an attacker t cause harm Example vulnerabilities: SQL injectin vulnerabilities (discussed in ther part f the curse) XSS vulnerabilities (discussed in ther part f the curse) Buffer verflws and ther memry crruptin vulnerabilities An attack is a scenari where an attacker triggers the bug t cause harm A cuntermeasure is a technique t cunter attacks These lectures will discuss memry crruptin vulnerabilities, cmmn attack techniques, and cmmn cuntermeasures fr them 3

4 Memry crruptin vulnerabilities Memry crruptin vulnerabilities are a class f vulnerabilities relevant fr unsafe languages ie Languages that d nt check whether prgrams access memry in a crrect way Hence buggy prgrams may mess up parts f memry used by the language run-time In these lectures we will fcus n memry crruptin vulnerabilities in C prgrams These can have devastating cnsequences 4

5 Example vulnerable C prgram #include <stdih> int main() { int ckie = 0; char buf[80]; printf("buf: %08x ckie: %08x\n", &buf, &ckie); gets(buf); if (ckie == 0x ) printf("yu win!\n"); } 5

6 Example vulnerable C prgram #include <stdih> int main() { int ckie; char buf[80]; printf("buf: %08x ckie: %08x\n", &buf, &ckie); gets(buf); } 6

7 Backgrund: Memry management in C Memry can be allcated in many ways in C Autmatic (lcal variables in functins) Static (glbal variables) Dynamic (mallc and new) Prgrammer is respnsible fr: Apprpriate use f allcated memry Eg bunds checks, type checks, Crrect de-allcatin f memry 7

8 Prcess memry layut High addresses Lw addresses Arguments/ Envirnment Stack Unused and Mapped Memry Heap (dynamic data) Static Data Prgram Cde Stack grws dwn Heap grws up 8

9 Memry management in C Memry management is very errr-prne Sme typical bugs: Writing past the bund f an array Dangling pinters Duble freeing Memry leaks Fr efficiency, practical C implementatins dn t detect such bugs at run time The language definitin states that behavir f a buggy prgram is undefined 9

10 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 10

11 Stack based buffer verflw The stack is a memry area used at run time t track functin calls and s Per call, an activatin recrd r stack frame is pushed n the stack, cntaining: Actual parameters, address, autmatically allcated lcal variables, As a cnsequence, if a lcal buffer variable can be verflwed, there are interesting memry lcatins t verwrite nearby The simplest attack is t verwrite the address s that it pints t attacker-chsen cde (shellcde) 11

12 Stack based buffer verflw Stack Return address f0 IP f0: call f1 FP SP Saved Frame Ptr f0 Lcal variables f0 f1: buffer[] verflw() 12

13 Stack based buffer verflw Stack Return address f0 f0: call f1 Saved Frame Ptr f0 Lcal variables f0 Arguments f1 IP f1: buffer[] verflw() FP Return address f1 Saved Frame Ptr f1 Space fr buffer SP 13

14 Stack based buffer verflw Stack Return address f0 f0: call f1 Saved Frame Ptr f0 Lcal variables f0 Arguments f1 IP f1: buffer[] verflw() FP Overwritten address Injected Cde SP 14

15 Very simple shell cde In examples further n, we will use: Real shell-cde is nly slightly lnger: LINUX n Intel: char shellcde[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" "\x80\xe8\xdc\xff\xff\xff/bin/sh"; 15

16 Side-nte: endianness Intel prcessrs are little-endian

17 Stack based buffer verflw Example vulnerable prgram: 17

18 Stack based buffer verflw Or alternatively: 18

19 Stack based buffer verflw Snapsht f the stack befre the : 19

20 Stack based buffer verflw Snapsht f the stack befre the : 20

21 Stack based buffer verflw Snapsht f the stack befre the : 0x0012ff4c 0x xfeeb2ecd 0x x66 \x4c\xff\x12\x00 f f f f \xcd\x2e\xeb\xfe f f f f f 21

22 Stack based buffer verflw Lts f details t get right befre it wrks: N nulls in (character-)strings Filling in the crrect address: Fake address must be precisely psitined Attacker might nt knw the address f his wn string Other verwritten data must nt be used befre frm functin Mre infrmatin in Smashing the stack fr fun and prfit by Aleph One 22

23 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 23

24 Heap based buffer verflw If a prgram cntains a buffer verflw vulnerability fr a buffer allcated n the heap, there is n address nearby S attacking a heap based vulnerability requires the attacker t verwrite ther cde pinters We lk at tw examples: Overwriting a functin pinter Overwriting heap metadata 24

25 Overwriting a functin pinter Example vulnerable prgram: 25

26 Overwriting a functin pinter And what happens n verflw: 26

27 Overwriting heap metadata The heap is a memry area where dynamically allcated data is stred Typically managed by a memry allcatin library that ffers functinality t allcate and free chunks f memry (in C: mallc() and free() calls) Mst memry allcatin libraries stre management infrmatin in-band As a cnsequence, buffer verruns n the heap can verwrite this management infrmatin This enables an indirect pinter verwrite -like attack allwing attackers t verwrite arbitrary memry lcatins 27

28 Heap management in dlmallc Tp Heap grws with brk() c Backward pinter Frward pinter Other mgmt inf Free chunk User data Dlmallc maintains a dubly linked list f free chunks When chunk c gets unlinked, c s backward pinter is written t *(frward pinter+12) Or: green value is written 12 bytes abve where red value pints Other mgmt inf Chunk in use 28

29 Expliting a buffer verrun Tp Heap grws with brk() c d RA Stack Green value is written 12 bytes abve where red value pints A buffer verrun in d can verwrite the red and green values Make Green pint t injected cde Make Red pint 12 bytes belw a functin address Heap 29

30 Expliting a buffer verrun Tp Heap grws with brk() RA Green value is written 12 bytes abve where red value pints Net result is that the address pints t the injected cde c Stack Heap 30

31 Indirect pinter verwrite This technique f verwriting a pinter that is later dereferenced fr writing is called indirect pinter verwrite This is a bradly useful attack technique, as it allws t selectively change memry cntents A prgram is vulnerable if: It cntains a bug that allws verwriting a pinter value This pinter value is later dereferenced fr writing And the value written is under cntrl f the attacker 31

32 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 32

33 Return-int-libc Direct cde injectin, where an attacker injects cde as data is nt always feasible Eg When certain cuntermeasures are active Indirect cde injectin attacks will drive the executin f the prgram by manipulating the stack This makes it pssible t execute fractins f cde present in memry Usually, interesting cde is available, eg libc 33

34 Return-int-libc: verview Stack Params fr f1 Return addr Params fr f2 Return addr Params fr f3 Cde Memry f1 f2 f3 SP Return addr Return addr IP 34

35 Return-int-libc: verview Stack Params fr f1 Return addr Params fr f2 Return addr Params fr f3 IP Cde Memry f1 f2 f3 SP Return addr 35

36 Return-int-libc: verview Stack Params fr f1 Return addr Params fr f2 Return addr Params fr f3 IP Cde Memry f1 f2 f3 SP Return addr 36

37 Return-int-libc: verview Stack Params fr f1 Return addr Params fr f2 Return addr Params fr f3 Cde Memry f1 f2 f3 SP Return addr IP 37

38 Return-int-libc: verview Stack Cde Memry SP Params fr f1 Return addr Params fr f2 Return addr IP f1 f2 f3 38

39 Return-int-libc: verview Stack Cde Memry SP Params fr f1 Return addr Params fr f2 Return addr IP f1 f2 f3 39

40 Return-int-libc: verview Stack Cde Memry SP Params fr f1 Return addr IP f1 f2 f3 40

41 Return-t-libc What d we need t make this wrk? Inject the fake stack Easy: this is just data we can put in a buffer Make the stack pinter pint t the fake stack right befre a instructin is executed We will shw an example where this is dne by jumping t a trampline Then we make the stack execute existing functins t d a direct cde injectin But we culd d ther useful stuff withut direct cde injectin 41

42 Vulnerable prgram 42

43 The trampline Assembly cde f qsrt: Trampline cde 43

44 Launching the attack 44

45 Unwinding the fake stack Cde Memry VirtualAllc InterlckedEcxh ange SP 45

46 Unwinding the fake stack Cde Memry IP VirtualAllc InterlckedEcxh ange SP 46

47 Unwinding the fake stack Cde Memry IP VirtualAllc InterlckedEcxh ange SP 47

48 Unwinding the fake stack Cde Memry SP IP VirtualAllc InterlckedEcxh ange 48

49 Unwinding the fake stack Cde Memry VirtualAllc SP InterlckedEcxh ange IP 49

50 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 50

51 Data-nly attacks These attacks prceed by changing nly data f the prgram under attack Depending n the prgram under attack, this can result in interesting explits We discuss tw examples: The unix passwrd attack Overwriting the envirnment table 51

52 Unix passwrd attack Old implementatins f lgin prgram lked like this: Stack Hashed passwrd passwrd Passwrd check in lgin prgram: 1 Read lginname 2 Lkup hashed passwrd 3 Read passwrd 4 Check if hashed passwrd = hash (passwrd) 52

53 Unix passwrd attack Stack Hashed passwrd passwrd Passwrd check in lgin prgram: 1 Read lginname 2 Lkup hashed passwrd 3 Read passwrd 4 Check if hashed passwrd = hash (passwrd) ATTACK: type in a passwrd f the frm pw hash(pw) 53

54 Overwriting the envirnment table 54

55 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 55

56 Stack canaries Basic idea Insert a value right in a stack frame right befre the stred base pinter/ address Verify n frm a functin that this value was nt mdified The inserted value is called a canary, after the cal mine canaries 56

57 Stack canaries Stack Return address f0 IP f0: call f1 FP SP Saved Frame Ptr f0 Canary f1: buffer[] verflw() 57

58 Stack based buffer verflw Stack Return address f0 f0: call f1 Saved Frame Ptr f0 Canary Arguments f1 IP f1: buffer[] verflw() FP Return address f1 Saved Frame Ptr f1 Canary SP 58

59 Stack based buffer verflw Stack Return address f0 f0: call f1 Saved Frame Ptr f0 Canary Arguments f1 IP f1: buffer[] verflw() FP Overwritten address Canary SP 59

60 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 60

61 Nn-executable data Direct cde injectin attacks at sme pint execute data Mst prgrams never need t d this Hence, a simple cuntermeasure is t mark data memry (stack, heap, ) as nn-executable This cunters direct cde injectin, but nt -int-libc r data-nly attacks In additin, this cuntermeasure may break certain legacy applicatins 61

62 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 62

63 Cntrl-flw integrity Mst attacks we discussed break the cntrl flw as it is encded in the surce prgram Eg At the surce cde level, ne always expects a functin t t its call site The idea f cntrl-flw integrity is t instrument the cde t check the sanity f the cntrl-flw at runtime 63

64 Example CFI at the surce level The fllwing cde explicitly checks whether the cmp functin pinter pints t ne f tw knwn functins: 64

65 Example CFI with labels 65

66 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 66

67 Layut Randmizatin Mst attacks rely n precise knwledge f run time memry addresses Intrducing artificial variatin in these addresses significantly raises the bar fr attackers Such adress space layut randmizatin (ASLR) is a cheap and effective cuntermeasure 67

68 Example 68

69 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 69

70 Overview 70

71 Need fr ther defenses The autmatic defenses discussed in this lecture are nly ne element f securing C sftware Instead f preventing / detecting explitatin f the vulnerabilities at run time, ne can: Prevent the intrductin f vulnerabilities in the cde Detect and eliminate the vulnerabilities at develpment time Detect and eliminate the vulnerabilities with testing 71

72 Preventing intrductin Safe prgramming languages such as Java / C# take memry management ut f the prgrammer s hands This makes it impssible t intrduce explitable memry safety vulnerabilities They can still be explited fr denial-f-service purpses Explitable vulnerabilities can still be present in native parts f the applicatin

73 Detect and eliminate vulnerabilities Cde review Static analysis tls: Simple grep -like tls that detect unsafe functins Advanced heuristic tls that have false psitives and false negatives Sund tls that require significant prgrammer effrt t anntate the prgram Testing tls: Fuzz testing Directed fuzz-testing / symblic executin

74 Overview Intrductin Example attacks Stack-based buffer verflw Heap-based buffer verflw Return-t-libc attacks Data-nly attacks Example defenses Stack canaries Nn-executable data Cntrl-flw integrity Layut randmizatin Other defenses Cnclusin 74

75 Cnclusin The design f attacks and cuntermeasures has led t an arms race between attackers and defenders While significant hardening f the executin f C-like languages is pssible, the use f safe languages like Java / C# is frm the pint f view f security preferable 75

Low-level Software Security: Vulnerabilities, Attacks and Countermeasures

Low-level Software Security: Vulnerabilities, Attacks and Countermeasures Lw-level Sftware Security: Vulnerabilities, Attacks and Cuntermeasures Prf Frank PIESSENS Reading material: Ulfar Erlingssn, Yves Yunan, Frank Piessens, Lw-level sftware security by example, Handbk f Infrmatin

More information

Introduction to InfoSec Recitation 2. Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)

Introduction to InfoSec Recitation 2. Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il) Intrductin t InfSec Recitatin 2 Nir Krakwski (nirkrak at pst.tau.ac.il) Itamar Gilad (itamargi at pst.tau.ac.il) Mre assembly tips Review f the stack Stack verflws Implementatin Tls Tday Little vs Big

More information

CSE 361S Intro to Systems Software Lab #2

CSE 361S Intro to Systems Software Lab #2 Due: Thursday, September 22, 2011 CSE 361S Intr t Systems Sftware Lab #2 Intrductin This lab will intrduce yu t the GNU tls in the Linux prgramming envirnment we will be using fr CSE 361S this semester,

More information

Assignment #5: Rootkit. ECE 650 Fall 2018

Assignment #5: Rootkit. ECE 650 Fall 2018 General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment

More information

Stealing passwords via browser refresh

Stealing passwords via browser refresh Stealing passwrds via brwser refresh Authr: Karmendra Khli [karmendra.khli@paladin.net] Date: August 07, 2004 Versin: 1.1 The brwser s back and refresh features can be used t steal passwrds frm insecurely

More information

MIPS Architecture and Assembly Language Overview

MIPS Architecture and Assembly Language Overview MIPS Architecture and Assembly Language Overview Adapted frm: http://edge.mcs.dre.g.el.edu/gicl/peple/sevy/architecture/mipsref(spim).html [Register Descriptin] [I/O Descriptin] Data Types and Literals

More information

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions Eastern Mediterranean University Schl f Cmputing and Technlgy Infrmatin Technlgy Lecture2 Functins User Defined Functins Why d we need functins? T make yur prgram readable and rganized T reduce repeated

More information

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first

More information

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C

LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C LAB 7 (June 29/July 4) Structures, Stream I/O, Self-referential structures (Linked list) in C Due: July 9 (Sun) 11:59 pm 1. Prblem A Subject: Structure declaratin, initializatin and assignment. Structure

More information

- Replacement of a single statement with a sequence of statements(promotes regularity)

- Replacement of a single statement with a sequence of statements(promotes regularity) ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine

More information

Implementation of Authentication Mechanism for a Virtual File System

Implementation of Authentication Mechanism for a Virtual File System Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract

More information

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55. Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and

More information

Project 4: System Calls 1

Project 4: System Calls 1 CMPT 300 1. Preparatin Prject 4: System Calls 1 T cmplete this assignment, it is vital that yu have carefully cmpleted and understd the cntent in the fllwing guides which are psted n the curse website:

More information

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 Iterative Code Design handout Style Guidelines handout

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 Iterative Code Design handout Style Guidelines handout UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2013 Lab 1 - Calculatr Intrductin Reading Cncepts In this lab yu will be

More information

TRAINING GUIDE. Overview of Lucity Spatial

TRAINING GUIDE. Overview of Lucity Spatial TRAINING GUIDE Overview f Lucity Spatial Overview f Lucity Spatial In this sessin, we ll cver the key cmpnents f Lucity Spatial. Table f Cntents Lucity Spatial... 2 Requirements... 2 Setup... 3 Assign

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins) Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective

More information

CS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation

CS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation Operating Systems Page Replacement Algrithms and Segmentatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOSE, OS@Austin, Clumbia, Rchester Recap f

More information

ARM Programmer s Model

ARM Programmer s Model ARM Prgrammer s Mdel Hsung-Pin Chang Department f Cmputer Science Natinal Chung Hsing University PDF created with FinePrint pdffactry Pr trial versin www.pdffactry.cm Outline ARM Data Types ARM Prcessr

More information

Getting Started with the Web Designer Suite

Getting Started with the Web Designer Suite Getting Started with the Web Designer Suite The Web Designer Suite prvides yu with a slew f Dreamweaver extensins that will assist yu in the design phase f creating a website. The tls prvided in this suite

More information

Lecture 6 -.NET Remoting

Lecture 6 -.NET Remoting Lecture 6 -.NET Remting 1. What is.net Remting?.NET Remting is a RPC technique that facilitates cmmunicatin between different applicatin dmains. It allws cmmunicatin within the same prcess, between varius

More information

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel CS510 Cncurrent Systems Class 2 A Lck-Free Multiprcessr OS Kernel The Synthesis kernel A research prject at Clumbia University Synthesis V.0 ( 68020 Uniprcessr (Mtrla N virtual memry 1991 - Synthesis V.1

More information

SOLA and Lifecycle Manager Integration Guide

SOLA and Lifecycle Manager Integration Guide SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names

More information

CSE 3320 Operating Systems Page Replacement Algorithms and Segmentation Jia Rao

CSE 3320 Operating Systems Page Replacement Algorithms and Segmentation Jia Rao CSE 0 Operating Systems Page Replacement Algrithms and Segmentatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f last Class Virtual memry Memry verlad What if the

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital

More information

Computer Organization and Architecture

Computer Organization and Architecture Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.

More information

Using SPLAY Tree s for state-full packet classification

Using SPLAY Tree s for state-full packet classification Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast

More information

HW4 Software Version 3.4.1

HW4 Software Version 3.4.1 Release ntes HW4 Sftware Versin 3.4.1 Change cntrl HW4 versin 3.4.1 includes all the functins and features f HW4 versin 3.4.0 with the fllwing mdificatins and additins: Enhancements: Nne New features Nne

More information

Level 2 Development Training

Level 2 Development Training Level 2 Develpment Training Level 2 Develpment Training Level 2 Develpment Training Vide Capture RSS 4000 Level 2 Develpment Training Vide Capture Cntents 1 Intrductin... 3 Intrductin... 3 Available Resurces...

More information

Entering an NSERC CCV: Step by Step

Entering an NSERC CCV: Step by Step Entering an NSERC CCV: Step by Step - 2018 G t CCV Lgin Page Nte that usernames and passwrds frm ther NSERC sites wn t wrk n the CCV site. If this is yur first CCV, yu ll need t register: Click n Lgin,

More information

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu

More information

Quick start guide: Working in Transit NXT with a PPF

Quick start guide: Working in Transit NXT with a PPF Quick start guide: Wrking in Transit NXT with a PPF STAR UK Limited Cntents What is a PPF?... 3 What are language pairs?... 3 Hw d I pen the PPF?... 3 Hw d I translate in Transit NXT?... 6 What is a fuzzy

More information

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as: Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties

More information

CodeSlice. o Software Requirements. o Features. View CodeSlice Live Documentation

CodeSlice. o Software Requirements. o Features. View CodeSlice Live Documentation CdeSlice View CdeSlice Live Dcumentatin Scripting is ne f the mst pwerful extensibility features in SSIS, allwing develpers the ability t extend the native functinality within SSIS t accmmdate their specific

More information

MediaTek LinkIt Development Platform for RTOS Memory Layout Developer's Guide

MediaTek LinkIt Development Platform for RTOS Memory Layout Developer's Guide MediaTek LinkIt Develpment Platfrm fr RTOS Memry Layut Develper's Guide Versin: 1.1 Release date: 31 March 2016 2015-2016 MediaTek Inc. MediaTek cannt grant yu permissin fr any material that is wned by

More information

Test Pilot User Guide

Test Pilot User Guide Test Pilt User Guide Adapted frm http://www.clearlearning.cm Accessing Assessments and Surveys Test Pilt assessments and surveys are designed t be delivered t anyne using a standard web brwser and thus

More information

Mooring system design in anysim. Introduction... 2

Mooring system design in anysim. Introduction... 2 1 Mring system design in anysim CONTENTS Page Intrductin... 2 1 Analysis type DynFlatOutput... 3 1.1 CalcEqui and CalcEnvirEqui... 3 1.2 CalcPsSequence... 4 1.3 CalcFrceSequence... 4 2 Analysis type SingleLinePrepar...

More information

Municode Website Instructions

Municode Website Instructions Municde Website instructins Municde Website Instructins The new and imprved Municde site allws yu t navigate t, print, save, e-mail and link t desired sectins f the Online Cde f Ordinances with greater

More information

Telecommunication Protocols Laboratory Course

Telecommunication Protocols Laboratory Course Telecmmunicatin Prtcls Labratry Curse Lecture 2 March 11, 2004 http://www.ab.fi/~lpetre/teleprt/teleprt.html 1 Last time We examined sme key terms: prtcl, service, layer, netwrk architecture We examined

More information

It has hardware. It has application software.

It has hardware. It has application software. Q.1 What is System? Explain with an example A system is an arrangement in which all its unit assemble wrk tgether accrding t a set f rules. It can als be defined as a way f wrking, rganizing r ding ne

More information

CaseWare Working Papers. Data Store user guide

CaseWare Working Papers. Data Store user guide CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3

More information

Profiling & Debugging

Profiling & Debugging Prfiling & Debugging CISC 879 Tristan Vanderbruggen & Jhn Cavazs Dept f Cmputer & Infrmatin Sciences University f Delaware 1 Lecture Overview Prfiling and Debugging Why? Tls Data sets Race Cnditin and

More information

LiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017

LiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017 LiveEngage and Micrsft Dynamics Integratin Guide Dcument Versin: 1.0 September 2017 Cntents Intrductin... 3 Step 1: Sign Up... 3 CRM Widget Signing Up... 3 Step 2: Cnfiguring the CRM Widget... 4 Accessing

More information

History of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History

History of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History Histry f Java 1. Brief histry f Java 2. Java Versin Histry The histry f Java is very interesting. Java was riginally designed fr interactive televisin, but it was t advanced technlgy fr the digital cable

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer

More information

Ascii Art Capstone project in C

Ascii Art Capstone project in C Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,

More information

Upgrade Guide. Medtech Evolution General Practice. Version 1.9 Build (March 2018)

Upgrade Guide. Medtech Evolution General Practice. Version 1.9 Build (March 2018) Upgrade Guide Medtech Evlutin General Practice Versin 1.9 Build 1.9.0.312 (March 2018) These instructins cntain imprtant infrmatin fr all Medtech Evlutin users and IT Supprt persnnel. We suggest that these

More information

Systems & Operating Systems

Systems & Operating Systems McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware

More information

Enabling Your Personal Web Page on the SacLink

Enabling Your Personal Web Page on the SacLink 53 Enabling Yur Persnal Web Page n the SacLink *Yu need t enable yur persnal web page nly ONCE. It will be available t yu until yu graduate frm CSUS. T enable yur Persnal Web Page, fllw the steps given

More information

The screenshots/advice are based on upgrading Controller 10.1 RTM to 10.1 IF6 on Win2003

The screenshots/advice are based on upgrading Controller 10.1 RTM to 10.1 IF6 on Win2003 Overview The screenshts/advice are based n upgrading Cntrller 10.1 RTM t 10.1 IF6 n Win2003 Other Interim Fix (IF) upgrades are likely t be similar, but the authr cannt guarantee that the dcumentatin is

More information

SmartPass User Guide Page 1 of 50

SmartPass User Guide Page 1 of 50 SmartPass User Guide Table f Cntents Table f Cntents... 2 1. Intrductin... 3 2. Register t SmartPass... 4 2.1 Citizen/Resident registratin... 4 2.1.1 Prerequisites fr Citizen/Resident registratin... 4

More information

ClassFlow Administrator User Guide

ClassFlow Administrator User Guide ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual

More information

Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installation

Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installation Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installatin Updated Aug 30, 2011 Server Requirements Hardware The hardware requirements are mstly dependent n the number f cncurrent users yu expect

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

WebEx Web Conferencing Quick Start Guide

WebEx Web Conferencing Quick Start Guide WebEx Web Cnferencing Quick Start Guide WebEx allws the curse instructr and participants t cnnect using web cnferencing and VIP using yur cmputer r smart device. WebEx's allws yu t share cntent, chat,

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

CS4500/5500 Operating Systems Processes

CS4500/5500 Operating Systems Processes Operating Systems Prcesses Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS3E, OS@Austin, Clumbia, Rchester Recap f the Last Class Cmputer hardware

More information

C pointers. (Reek, Ch. 6) 1 CS 3090: Safety Critical Programming in C

C pointers. (Reek, Ch. 6) 1 CS 3090: Safety Critical Programming in C C pinters (Reek, Ch. 6) 1 Review f pinters A pinter is just a memry lcatin. A memry lcatin is simply an integer value, that we interpret as an address in memry. The cntents at a particular memry lcatin

More information

Automatic imposition version 5

Automatic imposition version 5 Autmatic impsitin v.5 Page 1/9 Autmatic impsitin versin 5 Descriptin Autmatic impsitin will d the mst cmmn impsitins fr yur digital printer. It will autmatically d flders fr A3, A4, A5 r US Letter page

More information

Reading and writing data in files

Reading and writing data in files Reading and writing data in files It is ften very useful t stre data in a file n disk fr later reference. But hw des ne put it there, and hw des ne read it back? Each prgramming language has its wn peculiar

More information

TaiRox Mail Merge. Running Mail Merge

TaiRox Mail Merge. Running Mail Merge TaiRx Mail Merge TaiRx Mail Merge TaiRx Mail Merge integrates Sage 300 with Micrsft Wrd s mail merge functin. The integratin presents a Sage 300 style interface frm within the Sage 300 desktp. Mail Merge

More information

Announcing Veco AuditMate from Eurolink Technology Ltd

Announcing Veco AuditMate from Eurolink Technology Ltd Vec AuditMate Annuncing Vec AuditMate frm Eurlink Technlgy Ltd Recrd any data changes t any SQL Server database frm any applicatin Database audit trails (recrding changes t data) are ften a requirement

More information

To over come these problems collections are recommended to use. Collections Arrays

To over come these problems collections are recommended to use. Collections Arrays Q1. What are limitatins f bject Arrays? The main limitatins f Object arrays are These are fixed in size ie nce we created an array bject there is n chance f increasing r decreasing size based n ur requirement.

More information

TIBCO Statistica Options Configuration

TIBCO Statistica Options Configuration TIBCO Statistica Optins Cnfiguratin Sftware Release 13.3 June 2017 Tw-Secnd Advantage Imprtant Infrmatin SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

CS4500/5500 Operating Systems Computer and Operating Systems Overview

CS4500/5500 Operating Systems Computer and Operating Systems Overview Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap

More information

Installation and Getting Started

Installation and Getting Started Eurstat Data Transmissin Tls & Services EDAMIS Web Applicatin v3.1 Installatin and Getting Started TABLE OF CONTENTS: 1 Intrductin... 2 2 Installatin... 2 2.1 Prerequisites... 2 2.2 EWA installatin...

More information

Create Your Own Report Connector

Create Your Own Report Connector Create Yur Own Reprt Cnnectr Last Updated: 15-December-2009. The URS Installatin Guide dcuments hw t cmpile yur wn URS Reprt Cnnectr. This dcument prvides a guide t what yu need t create in yur cnnectr

More information

The Login Page Designer

The Login Page Designer The Lgin Page Designer A new Lgin Page tab is nw available when yu g t Site Cnfiguratin. The purpse f the Admin Lgin Page is t give fundatin staff the pprtunity t build a custm, yet simple, layut fr their

More information

Chapter 6: Lgic Based Testing LOGIC BASED TESTING: This unit gives an indepth verview f lgic based testing and its implementatin. At the end f this unit, the student will be able t: Understand the cncept

More information

Integrating QuickBooks with TimePro

Integrating QuickBooks with TimePro Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data

More information

User Guide. Avigilon Control Center Mobile Version 2.2 for Android

User Guide. Avigilon Control Center Mobile Version 2.2 for Android User Guide Avigiln Cntrl Center Mbile Versin 2.2 fr Andrid 2011-2015, Avigiln Crpratin. All rights reserved. Unless expressly granted in writing, n license is granted with respect t any cpyright, industrial

More information

Lab 5 Sorting with Linked Lists

Lab 5 Sorting with Linked Lists UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces

More information

One reason for controlling access to an object is to defer the full cost of its creation and initialization until we actually need to use it.

One reason for controlling access to an object is to defer the full cost of its creation and initialization until we actually need to use it. Prxy 1 Intent Prvide a surrgate r placehlder fr anther bject t cntrl access t it. Als Knwn As Surrgate Mtivatin One reasn fr cntrlling access t an bject is t defer the full cst f its creatin and initializatin

More information

Extended Vendors lets you: Maintain vendors across multiple Sage 300 companies using the Copy Vendors functionality. o

Extended Vendors lets you: Maintain vendors across multiple Sage 300 companies using the Copy Vendors functionality. o Extended Vendrs Extended Vendrs is an enhanced replacement fr the Sage Vendrs frm. It prvides yu with mre infrmatin while entering a PO and fast access t additinal PO, Vendr, and Item infrmatin. Extended

More information

Parallel Processing in NCAR Command Language for Performance Improvement

Parallel Processing in NCAR Command Language for Performance Improvement Parallel Prcessing in NCAR Cmmand Language fr Perfrmance Imprvement Ping Gu, University f Wyming Mentr: Wei Huang, NCAR C- Mentr: Dave Brwn, NCAR August 1, 2013 Intrductin and Mtivatin ² The NCAR Cmmand

More information

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page Managing the News Page TABLE OF CONTENTS: The News Page Key Infrmatin Area fr Members... 2 Newsletter Articles... 3 Adding Newsletter as Individual Articles... 3 Adding a Newsletter Created Externally...

More information

Imagine for MSDNAA Student SetUp Instructions

Imagine for MSDNAA Student SetUp Instructions Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS

More information

Java Programming Course IO

Java Programming Course IO Java Prgramming Curse IO By Võ Văn Hải Faculty f Infrmatin Technlgies Industrial University f H Chi Minh City Sessin bjectives What is an I/O stream? Types f Streams Stream class hierarchy Cntrl flw f

More information

Preparation: Follow the instructions on the course website to install Java JDK and jgrasp on your laptop.

Preparation: Follow the instructions on the course website to install Java JDK and jgrasp on your laptop. Lab 1 Name: Checked: (instructr r TA initials) Objectives: Learn abut jgrasp - the prgramming envirnment that we will be using (IDE) Cmpile and run a Java prgram Understand the relatinship between a Java

More information

Upgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0

Upgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0 Upgrading Kaltura MediaSpace TM Enterprise 1.0 t Kaltura MediaSpace TM Enterprise 2.0 Assumptins: The existing cde was checked ut f: svn+ssh://mediaspace@kelev.kaltura.cm/usr/lcal/kalsurce/prjects/m ediaspace/scial/branches/production/website/.

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

Enterprise Installation

Enterprise Installation Enterprise Installatin Mnnit Crpratin Versin 3.6.0.0 Cntents Prerequisites... 3 Web Server... 3 SQL Server... 3 Installatin... 4 Activatin Key... 4 Dwnlad... 4 Cnfiguratin Wizard... 4 Activatin... 4 Create

More information

Wave IP 4.5. CRMLink Desktop User Guide

Wave IP 4.5. CRMLink Desktop User Guide Wave IP 4.5 CRMLink Desktp User Guide 2015 by Vertical Cmmunicatins, Inc. All rights reserved. Vertical Cmmunicatins and the Vertical Cmmunicatins lg and cmbinatins theref and Vertical ViewPint, Wave Cntact

More information

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

Refreshing Axiom TEST with a Current Copy of Production Axiom EPM June 20, 2014

Refreshing Axiom TEST with a Current Copy of Production Axiom EPM June 20, 2014 Refreshing Axim TEST with a Current Cpy f Prductin Axim EPM June 20, 2014 Refreshing Axim TEST If yu maintain an Axim TEST envirnment yu will want t refresh it with a current cpy f yur PROD database when

More information

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f

More information

STIDistrict AL Rollover Procedures

STIDistrict AL Rollover Procedures 2009-2010 STIDistrict AL Rllver Prcedures General Infrmatin abut STIDistrict Rllver IMPORTANT NOTE! Rllver shuld be perfrmed between June 25 and July 25 2010. During this perid, the STIState applicatin

More information

SAP Intelligent Notification 365, Service. On-boarding process for SAP Hybris Marketing Cloud / SAP Hybris Marketing customers

SAP Intelligent Notification 365,  Service. On-boarding process for SAP Hybris Marketing Cloud / SAP Hybris Marketing customers SAP Intelligent Ntificatin 365, Email Service On-barding prcess fr SAP Hybris Marketing Clud / SAP Hybris Marketing custmers TABLE OF CONTENTS 1. DOCUMENT HISTORY... 3 2. INTRODUCTION... 4 3. HIGH LEVEL

More information

Faculty Textbook Adoption Instructions

Faculty Textbook Adoption Instructions Faculty Textbk Adptin Instructins The Bkstre has partnered with MBS Direct t prvide textbks t ur students. This partnership ffers ur students and parents mre chices while saving them mney, including ptins

More information

1 Version Spaces. CS 478 Homework 1 SOLUTION

1 Version Spaces. CS 478 Homework 1 SOLUTION CS 478 Hmewrk SOLUTION This is a pssible slutin t the hmewrk, althugh there may be ther crrect respnses t sme f the questins. The questins are repeated in this fnt, while answers are in a mnspaced fnt.

More information

CSE3320 Operating Systems Processes Jia Rao

CSE3320 Operating Systems Processes Jia Rao CSE3320 Operating Systems Prcesses Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Cmputer hardware Time-sharing Space-sharing Characteristics } Lcality,

More information

Table of Contents. 1 Introduction Connecting to the API HTTP request syntax API release versions... 4

Table of Contents. 1 Introduction Connecting to the API HTTP request syntax API release versions... 4 API Guide Table f Cntents 1 Intrductin... 3 2 Cnnecting t the API... 4 2.1 HTTP request syntax... 4 2.2 API release versins... 4 3 Direct Answer API... 5 3.1 Required parameters... 5 3.2 Optinal parameters...

More information

Experience With Processes and Monitors in Mesa

Experience With Processes and Monitors in Mesa Advanced Tpics in Cmputer Systems, CS262A Prf. Eric Brewer Experience With Prcesses and Mnitrs in Mesa I. Experience With Prcesses and Mnitrs in Mesa Fcus f this paper: light-weight prcesses (threads in

More information

InfoCitrus Brief Instructions

InfoCitrus Brief Instructions InfCitrus Brief Instructins In rder t access the CA InfCitrus system, there are number f steps t fllw. Here is a brief verview f these steps: G t the CA website www.citrusaustralia.cm.au Click n the lgin

More information

Element Creator for Enterprise Architect

Element Creator for Enterprise Architect Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the

More information

Graduate Application Review Process Documentation

Graduate Application Review Process Documentation Graduate Applicatin Review Prcess Cntents System Cnfiguratin... 1 Cgns... 1 Banner Dcument Management (ApplicatinXtender)... 2 Banner Wrkflw... 4 Navigatin... 5 Cgns... 5 IBM Cgns Sftware Welcme Page...

More information