Executing Parallelized Dictionary Attacks on CPUs and GPUs

Size: px
Start display at page:

Download "Executing Parallelized Dictionary Attacks on CPUs and GPUs"

Transcription

1 Executing Parallelized Dictinary Attacks n CPUs GPUs Hassan Alnn ENSIMAG Grenble, France hassan.alnn@ensimag.imag.fr Shaima Al Awadi ENSIMAG Grenble, France shayma.al-awadi@ensimag.imag.fr ABSTRACT This paper presents dictinary based attacks in additin t their crrespnding MD5 SHA implementatin n GPU CPU. All cmputatinal time testing was prgrammed in CUDA- C language. Kaapi Adaptive Stard Template Library (KASTL) was utilized t aid in perfrming parallel CPU peratins cmplimenting tday s widely spread systems with multiprcessrs r multi-cre prcessrs. Cmprehensive analysis f perfrmed dictinary attacks are detailed thrughut this paper with perfrmance results highlighted twards the cnclusin. Keywrds Dictinary Attack, Cryptgraphic Hash Functin, GPU, CPU, MD5, SHA, KASTL, CUDA, Parallel Executin, Passwrd Cracking.. INTRODUCTION In cmputer security, a dictinary attack is a technique used by cryptanalysts t break the security f the system by attempting t retrieve its decryptin passphrase by searching all likely pssibilities. Operating systems stre passwrds in their message digest frm, cmputed frm ne way functins. In cryptgraphy, ne-way functins are prcedures that are easy t cmpute fr a given input, yet cmplex t inverse in plynmial time. A hash functin takes an input prduces a string f fixed size, ften called message digest. Operating systems stre hash values f passwrds cmpare them with message digests f userentered keys. Cryptgraphic hash functins their respective implementatin in dictinary-based attacks n graphic prcessrs are receiving cnsiderable attentin wrldwide. Realtime mdeling f parallelized cryptgraphic hash functins has expedite perfrmance expectatins detected n theretical mdeling. It was fund that cryptgraphic hash functins perfrm much faster mre efficiently n GPUs than they d n CPUs. Because GPUs allw fr parallel thread executin, parallelized hash functins are the natural chice fr fastest dictinary attack results; especially when dealing with extremely lng messages. This paper takes a deeper lk at dictinary based attack n MD5 SHA based passwrds, discusses their implementatin n CPU GPU, analyzing executins cmparing results. Objectives: Detect any factrs that influence the perfrmance f dictinary based attacks n cryptgraphic hash functins n multicre prcessrs multi-prcessr systems. Determine the feasibility f perfrming dictinary based attacks n hash values n GPU cmpared t CPU. Explre the acceptability f the new rle that GPUs take in tday s cmputerized systems 2. DICTIONARY ATTACKS BASED ON MD5 AND SHA 2. DICTIONARY ATTACKS Dictinary based attacked are basically using brute frce technique t systematically g thrugh a list f wrds frm a specific wrdlist f chice. These wrds list can be based n wrds frm the dictinary r cmmnly knwn used passwrd list that are available all ver the internet. The success in a dictinary based attacks depends n the wrdlist used; that is the amunt f pssibilities t g thrugh. Tday, mst webpages sftware s stre the user passwrds hashed using ne f the many available ne-way hash functins. In ur reprt we fcused n MD5 SHA hashed passwrds, as they are frm the tp cmmnly used hashed functins. We tackled this prject by using a wrdlist that was available nline with the mst cmmnly used wrds. The idea is t hash each wrd in the wrdlist then t cmpare t the hash f the wrd that e want t crack. 2.2 Parallelizatin f Dictinary Attacks Recvery f hash digests f passwrds using dictinary wrds is ideal fr parallel cmputing. In essence the dictinary based attacked are parallel in nature due t ability t perfrm each peratin independently withut any dependencies between them., the fact that mdern iterated hash algrithms require sufficiently lng time t cmpute n single cre prcessr especially fr lng messages, extensin f dictinary based attack using hash algrithms t supprt parallel cmputing will significantly increase perfrmance f a cracking the hashed passwrd. The parallelizatin n the CPU is a bit mre cmplex then parallelizatin n GPU. CPU are made mre suited fr parallel task situatins where prcesses run parallel but require cmmunicatin pssibly have dependencies between them, where as GPU are develped t hle parallel data prcessing, due t the nature f it usage, that is hle graphics, where units f graphics peratins are dne in parallel with hardly any dependencies. 2.3 MD5 Based n the earlier hash functin MD4, MD5 was designed by Rn Rivest; last in successin f cryptgraphic hash functins. It became an internet stard has been integrated in a variety f security applicatins such as SSL/TLS IPSec. MD5 uses Merkle-Damgard paradigm such that the security f the hash functin reduces t the security f its relevant cmpressin functin.

2 MD5 s algrithm is designed t take an arbitrary input prduce a fixed 28-bit utput. The input is padded such that its length is 448 mdul 52, a 64-bit representing the length f the message is appended befre padding. A fur-wrd f 28-bit buffer (A, B, C, D) is initialized as fllws: A = B = 89ABCDEF C = FEDCBA98 D = Then, the message is prcessed in 6-wrd (52-bit) chunks, using 4 runds f 6-bit peratins each. The cmpressin functin f MD5 is cmpsed f runds, where each rund has 6 steps f the fllwing frm:,, Where: a, b, c, d are the fur wrds f the buffer, but are used in varied permutatins. g(b, c, d) is a different nnlinear functin in each rund (F,G,H,I). fr example, in rund,,, T[i] is a cnstant value derived frm the sin functin X[k] is derived frm a 52-blck f the message. Exp 6 wrds int eighty wrds by mixing shifting. Use 4 runds f 2 peratins n message blck buffer. The cmpressin functin has runds f 2 steps each, updates the buffer as fllws:,,,,,,, 5 _ _,, 3,, t is the step number, f(t,b,c,d) is a nn-linear functin fr the rund, W t is derived frm the message blck K t is a cnstant value derived frm the sin functin S k is a circular left shift by k bits Figure Message Digest 5 Hashing Algrithm: takes message f arbitrary size after a sequence f prcedures runds, prduces an utput f 28-bits. 2.4 SHA Unlike MD5, SHA prduces a 6-bit utput digest frm a message with a maximum length f bits. Althugh SHA is based n the same principles that Rn Rivest used fr MD5, SHA has a mre cnservative design than that f MD5. In SHA, the message we have is padded in rder t becme a multiple f 52 bits, it is split int 6 32-bit wrds, 52 blcks. A 5-wrd f 6-bit buffer is initialized as fllws: A = B = EFCDAB89 C = 98BADCFE D = E = C3D2EF The message is then prcessed in 6-wrd (52-bit) chunks as fllws: 3. EXPERMENTATION PROCEDURE T d ur experimentatin used a wide range f wrds in each wrdlist file. The number f wrds that we ested fr are arund:.5millin, millin, 2millin, 4millin, 6millin 8millin. We als tested n files smaller then millin, just t see the perfrmance between the GPU CPU in cmputatin GPU memry cpy prcedure time. But due the speed that the hashes were cmputed it was best testt n file with large amunt f data. The wrdlist were retrieved frm different surces n the net, but mainly hashkiller.cm, whichh has a list f cmbinatin f dictinary wrd als cmmnly used passwrd by users. The wrds in the file were increased by adding arbitrary wrds. There is a pssibility f the repetitiveness f the wrd in these huge files, but thesee files are used fr perfrmance testing repetitiveness f the wrd desn t affect the result. Figure 2 SHA Hash Algrithm Our main aim was t try test the time it takes t cmpares hash with the hashes f all the wrds in the list, s wrst cases scenari was taken when the hash wasn t in the list. The systems fr the test are the fllwing: Table. Systems used fr the experimentatin ID. Prcessr GPU Card INTEL Cre 2 Du 2.4 NVIDIA Quadr NVS GHZ 32M INTEL Cre 2 Du, 2.5 NVIDIA GeFrce 86 GHZ GS 8 * AMD Optern 875, 2 x NVIDIA GeFrce ttal 6 cres, 2.2 GHZ GTX 28

3 Thrughut this paper wherever required we wuld refer t the systems illustrated in Table as, idkiff. 4. DICTIONARY ATTACKS ON CPUs 4. KASTL KASTL (Kaapi Adaptive Stard Template Library) is a tl that was develped by the INRIA lab that runs n tp f KAAPI. It allws fr the parallelizatin f STL algrithms based n wrk stealing implementatin f KAAPI. In general it allws parallelizing certain tasks, especially lps that are prcessed n CPU with multi-cres. There are ther tls in the market that allw us t parallelize tasks such as Cilk++ Intel Thread Building Blcks (TBB). We had several issues trying t get Cilk++ t wrk n ur systems, due t time restrictins, we decided t perfrm ur parallelizatin with KASTL as we are als been able t get in tuch with the develper if any issues were raised. 4.2 Implementatin 4.2. MD5 T enable us t parallelize the MD5 implementatin we had t first mdify the cde we fund n the web that was develped by Mari Juric [4]. The cde has tw mde f peratins a search just a general verall hashing functin. We were interested in the search, but it was nly implemented fr GPU. Our first task was t create a functin that wuld allw us t d the search using the CPU prcessing in ne run f the prgram, als keeping in mind that we wuld like t be able t parallelize it t with KASTL. The implementatin f MD5 CPU prcessing was straightfrward but we had t a lt f issues with getting KASTL implementatin dne prperly. We tk the assistance f MR. Trare whse PHD thesis is based n KASTL. The STL algrithm that we were trying t parallelize was std::transfrm, s the lp fr the hash was mdified t make use f the transfrm functin. Once that was achieved, we cnverted the std::transfrm functin t the kastl::transfrm which takes in the same cncept but with slight mdificatin. We re basically giving it extra parameters indicating where the utput result shuld be stred SHA Fr the SHA hash implementatin we used the cde that was develped by Mr. Vilkeliskis [5]. The cde had the SHA implementatin fr the CPU straightfrward, s, we plugged it in the prgram we used fr MD5, where fr each lp thrugh the wrdlist, instead f hashing it with the MD5, we hashed it with SHA, the same we did fr the wrd that we wanted t crack. The kastl::transfrm functin stayed the same as fr MD5, s that helped speed up the implementatin fr SHA. 4.3 Experiments The experiments were dne n the three systems mentined in table as per the experimentatin prcedures mentined in sectin 3 f this reprt. Each systems ttal cre was exhausted in each test perfrmed, t make sure that we parallelize the peratin as much as pssible. Figure 3 Figure 4 shw the perfrmance f the systems upn executing MD5 SHA algrithms n each. Figure 3 MD5 Systems Perfrmance m m 2m 3m 4m 8m.5m m 2m 3m 4m 8m Figure 4 SHA System Perfrmance We can clearly see that perfrmance n idkiff was much higher then the perfrmance f the ther tw systems, as idkiff has a ttal f 6 cres available fr usage. We als nticed as was expected frm reprts read that dictinary attacks n SHA was slwer than MD5. We can definitely say that the increase in cre f the prcess almst cut the prcessing time by half. 5. PARALLEL DICTIONARY ATTACKS ON GPU 5. CUDA Graphic Prcessrs are difficult t prgram fr general-purpse uses. Prgrammers can either learn graphics APIs r cnvert their applicatins t use graphics pipeline peratins, r they can use stream prgramming abstractins n GPUs. NVIDIA released a sftware develpment kit named Cmpute Unified Device Architecture (CUDA) fr its graphics hardware in February 27. CUDA allws prgrammers t access the cmputing pwer f GPU directly. Prgrammers use C fr CUDA t develp prgrams fr executin n GPUs. CUDA s mst utilized benefits is its use f shared memry, a fast regin that can be shared amngst threads. 5.2 Implementatin 5.2. MD5 The cde used fr the GPU was mainly taken als frm the same develper wh we used the MD5 CPU implementatin frm Mr. Juric [7]. The GPU implementatin he had at a first glance seem t be wrking just as we wanted. There was slight mdificatin dne n the cde, mainly separating the CPU GPU peratins s

4 that they can be run independently, als simplify the running prcedure withut the extra parameters that the develper included fr benchmarking extra search feature. In the initial stages, a lt f wrk was dne trying t tweak the shared memry, the numbers f threads per blcks that is assigned fr each prcess t see if it wuld increase the perfrmance f the GPU peratin SHA The cde used fr the GPU implementatin f SHA was develped by Mr. Vilkeliskis. The implementatin was dne fr single hashing thrugh GPU, withut taking full effect f GPU capabilities. He did have a benchmarking technique where he ges thrugh a list f arbitrary values t check the perfrmance. These values are nt passed frm glbal functin but rather, are lped frm within the device. This technique wuldn t have been useful fr ur implementatin as it wuld mean fr each wrd we have t cpy it individually t the device then run it, als desn t take full effect GPU parallelism capabilities. Our implementatin fr SHA n GPU was then cnsistent f tw main tasks, trying t use the MD5 implementatin f GPU that is cpying the wrds as a batch t the device, t try use the shared memry that was used in the MD5 implementatin. This was basically a straightfrward implementatin frm the GPU MD5 functin with a slight tweaking t enable us t prduce SHA hashes rather than MD5 hashes. The SHA implementatin interface was als adpted t use the same interface as the MD5 implementatin. 5.3 Experiments The experiments in this sectin were als dne n the 3 systems mentined in table as per the experimentatin prcedures mentined in sectin 3 f this reprt. We have prvided figure fr bth the SHA MD5 dictinary attack times, with withut memry cnsideratin. We fund ut that memry peratin takes a lt f verhead f the verall GPU prcessing time. It was unexpected t find that even thugh the idkiff prcessing time was extremely fast cmpared t the ther systems, the memry peratin threw ff the results nce we cnsidered the memry peratin f cpying frm t the device m m 2m 3m 4m 8m Figure 5 MD5 GPU withut memry peratin cnsideratin TIme / s Figure 6 MD5 GPU with memry peratin cnsideratin m m 2m 3m 4m 8m Figure 7 SHA GPU withut memry cnsideratin m mil 2mil 3mil 4mil 8mil.5m mil 2mil 3mil 4mil 8mil Figure 8 SHA GPU with memry cnsideratin 6. COMPARATIVE ANALYSIS We nticed verall the perfrmance n the GPU were much higher than that f CPU. In exceptin is the idkiff system where even the prcessing time f each thread was prcessed extremely fast almst 5x faster than the CPU, but with the memry cnsideratin it drps it dwn t arund.5x faster. Thugh there was a prblem with the cpy t the GPU memry, as it is very slw time cnsuming which drpped the GPU perfrmance n that system much slwer than that f the CPU 6-multicre perfrmance. T sum up we added tw extra figure shwing the GPU CPU multi-cre perfrmance n the idkiff server with withut the memry cnsideratin.

5 Time/Secnd Figure 9 system CPU GPU perfrmance withut GPU memry cnsideratin Time/Secnd m m 2m 3m 4m 8m.5m m 2m 3m 4m 8m SHA CPU SHA GPU MD5 CPU MD5 GPU SHA CPU SHA GPU MD5 CPU MD5 GPU 8. REFERENCES [] Znenberg, A. 29. Distributed Hash Cracker: A Crss- Platfrm GPU-Accelerated Passwrd Recvery System. Rensselaer Plytechnic Institute. [2] Ruane, J. 26. General Purpse Cmputing with a Graphics Prcessing Unit. Dublin Institute f Technlgy. Vl. [3] Bernaschi, M. Bissn, M. Gabrielli, E. & Taccni, S. 29. An Architecture fr Distributed Dictinary Attacks n Cryptsystems. Jurnal f Cmputers. Vl 4. N. 5. [4] Vilkeliskis, T. 28. Cmputing SHA message digest n GPU (PwerPint). Retrieved frm [5] Vilkeliskis, T. 28. Cmputing SHA message digest n GPU [Sftware]. Available frm [6] Cllange, S. Daumas, M. Dass, Y. S. & Defur, D. Using Graphics Prcessrs fr Parallelizing Hash-based Data Carving. 29. Prceedings f the 42 nd Hawaii Internatinal Cnference n Cmputer Sciences. Hawaii, United States. [7] Juric, M. 28. CUDA MD5 Hashing Experiments [Sftware]. Available frm [8] Radev, R. 28. GPU Cmputing CUDA (PwerPint). Retrieved frm [9] Farber, R. 28. CUDA, Supercmputing fr the masses. Retrieved frm Figure system CPU GPU perfrmance with GPU memry cnsideratin 7. CONCLUSION AND PERSPECTIVE Finally, we were able t see the difference in perfrming dictinary based attacks n ne-way cryptgraphic hashing functins in particular MD5 SHA. Overall in bth GPU CPU tests cracking MD5 hashed passwrds are faster than that f SHA. Als using GPU t crack the hashed passwrd did give a kick t the speed, except maybe in system where the verhead in memry exchange was a lt. It wuld have been mre interesting t been able t include a wider range f ne-way hashing functins such as SHA256 SHA52 r any f the new hashing functins that have been submitted t the NIST hash functin cmpetitin such as MD6 r Skein in the test that were perfrmed.

B Tech Project First Stage Report on

B Tech Project First Stage Report on B Tech Prject First Stage Reprt n GPU Based Image Prcessing Submitted by Sumit Shekhar (05007028) Under the guidance f Prf Subhasis Chaudhari 1. Intrductin 1.1 Graphic Prcessr Units A graphic prcessr unit

More information

It has hardware. It has application software.

It has hardware. It has application software. Q.1 What is System? Explain with an example A system is an arrangement in which all its unit assemble wrk tgether accrding t a set f rules. It can als be defined as a way f wrking, rganizing r ding ne

More information

UFuRT: A Work-Centered Framework and Process for Design and Evaluation of Information Systems

UFuRT: A Work-Centered Framework and Process for Design and Evaluation of Information Systems In: Prceedings f HCI Internatinal 2007 UFuRT: A Wrk-Centered Framewrk and Prcess fr Design and Evaluatin f Infrmatin Systems Jiajie Zhang 1, Keith A. Butler 2 1 University f Texas at Hustn, 7000 Fannin,

More information

Using SPLAY Tree s for state-full packet classification

Using SPLAY Tree s for state-full packet classification Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,

More information

Exploring the Viability of the Cell Broadband Engine for Bioinformatics Applications

Exploring the Viability of the Cell Broadband Engine for Bioinformatics Applications Explring the Viability f the Cell Bradband Engine fr Biinfrmatics Applicatins Authrs: Vipin Sachdeva, Michael Kistler, Evan Speight and Tzy-Hwa Kathy Tzeng Presentatin by: Keyur Malaviya Dept f Cmputer

More information

Operating systems. Module 7 IPC (Interprocess communication) PART I. Tami Sorgente 1

Operating systems. Module 7 IPC (Interprocess communication) PART I. Tami Sorgente 1 Operating systems Mdule 7 IPC (Interprcess cmmunicatin) PART I Tami Srgente 1 INTERPROCESS COMMUNICATION Prcesses within a system may be independent r cperating Cperating prcess can affect r be affected

More information

Parallel Processing in NCAR Command Language for Performance Improvement

Parallel Processing in NCAR Command Language for Performance Improvement Parallel Prcessing in NCAR Cmmand Language fr Perfrmance Imprvement Ping Gu, University f Wyming Mentr: Wei Huang, NCAR C- Mentr: Dave Brwn, NCAR August 1, 2013 Intrductin and Mtivatin ² The NCAR Cmmand

More information

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

Due Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02)

Due Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02) Lab 3 Packet Scheduling Due Date: Lab reprt is due n Mar 6 (PRA 01) r Mar 7 (PRA 02) Teams: This lab may be cmpleted in teams f 2 students (Teams f three r mre are nt permitted. All members receive the

More information

Pastry dough mixing. Problems with traditional systems. Data Encryption Standard. CS349 Cryptography

Pastry dough mixing. Problems with traditional systems. Data Encryption Standard. CS349 Cryptography Pastry dugh mixing Data Encryptin Standard CS349 Cryptgraphy Department f Cmputer Science Wellesley Cllege Prblems with traditinal systems We assume that an attacker has at least sme knwledge f the statistical

More information

Retrieval Effectiveness Measures. Overview

Retrieval Effectiveness Measures. Overview Retrieval Effectiveness Measures Vasu Sathu 25th March 2001 Overview Evaluatin in IR Types f Evaluatin Retrieval Perfrmance Evaluatin Measures f Retrieval Effectiveness Single Valued Measures Alternative

More information

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested

More information

Stealing passwords via browser refresh

Stealing passwords via browser refresh Stealing passwrds via brwser refresh Authr: Karmendra Khli [karmendra.khli@paladin.net] Date: August 07, 2004 Versin: 1.1 The brwser s back and refresh features can be used t steal passwrds frm insecurely

More information

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel CS510 Cncurrent Systems Class 2 A Lck-Free Multiprcessr OS Kernel The Synthesis kernel A research prject at Clumbia University Synthesis V.0 ( 68020 Uniprcessr (Mtrla N virtual memry 1991 - Synthesis V.1

More information

Chapter 14. Basic Planning Methodology

Chapter 14. Basic Planning Methodology Chapter 14 Basic Planning Methdlgy This chapter prvides a basic and generic methdlgy fr planning prtectin requirements. It fcuses n the primary cnsideratins fr designing and implementing a basic strage

More information

CS4500/5500 Operating Systems Computer and Operating Systems Overview

CS4500/5500 Operating Systems Computer and Operating Systems Overview Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap

More information

Computer Organization and Architecture

Computer Organization and Architecture Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.

More information

NVIDIA S KEPLER ARCHITECTURE. Tony Chen 2015

NVIDIA S KEPLER ARCHITECTURE. Tony Chen 2015 NVIDIA S KEPLER ARCHITECTURE Tny Chen 2015 Overview 1. Fermi 2. Kepler a. SMX Architecture b. Memry Hierarchy c. Features 3. Imprvements 4. Cnclusin 5. Brief verlk int Maxwell Fermi ~2010 40 nm TSMC (sme

More information

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the. 1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding

More information

Hierarchical Classification of Amazon Products

Hierarchical Classification of Amazon Products Hierarchical Classificatin f Amazn Prducts Bin Wang Stanfrd University, bwang4@stanfrd.edu Shaming Feng Stanfrd University, superfsm@ stanfrd.edu Abstract - This prjects prpsed a hierarchical classificatin

More information

Computer Organization and Architecture

Computer Organization and Architecture Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.

More information

WEB LAB - Subset Extraction

WEB LAB - Subset Extraction WEB LAB - Subset Extractin Fall 2005 Authrs: Megha Siddavanahalli Swati Singhal Table f Cntents: Sl. N. Tpic Page N. 1 Abstract 2 2 Intrductin 2 3 Backgrund 2 4 Scpe and Cnstraints 3 5 Basic Subset Extractin

More information

Chapter 6: Lgic Based Testing LOGIC BASED TESTING: This unit gives an indepth verview f lgic based testing and its implementatin. At the end f this unit, the student will be able t: Understand the cncept

More information

Scatter Search And Bionomic Algorithms For The Aircraft Landing Problem

Scatter Search And Bionomic Algorithms For The Aircraft Landing Problem Scatter Search And Binmic Algrithms Fr The Aircraft Landing Prblem J. E. Beasley Mathematical Sciences Brunel University Uxbridge UB8 3PH United Kingdm http://peple.brunel.ac.uk/~mastjjb/jeb/jeb.html Abstract:

More information

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command

Using CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command Using CppSim t Generate Neural Netwrk Mdules in Simulink using the simulink_neural_net_gen cmmand Michael H. Perrtt http://www.cppsim.cm June 24, 2008 Cpyright 2008 by Michael H. Perrtt All rights reserved.

More information

An Introduction to Crescendo s Maestro Application Delivery Platform

An Introduction to Crescendo s Maestro Application Delivery Platform An Intrductin t Crescend s Maestr Applicatin Delivery Platfrm Intrductin This dcument is intended t serve as a shrt intrductin t Crescend s Maestr Platfrm and its cre features/benefits. The dcument will

More information

Performance of VSA in VMware vsphere 5

Performance of VSA in VMware vsphere 5 Perfrmance f VSA in VMware vsphere 5 Perfrmance Study TECHNICAL WHITE PAPER Table f Cntents Intrductin... 3 Executive Summary... 3 Test Envirnment... 3 Key Factrs f VSA Perfrmance... 4 Cmmn Strage Perfrmance

More information

Greg Dias, Alex Wilson. Fermi

Greg Dias, Alex Wilson. Fermi Greg Dias, Alex Wilsn Fermi Agenda Cmputer Graphics and Parallelism Basic GPU structure NVIDIA Fermi and CUDA Graphics Rendering Methds Plygn Rendering Ray Tracing Plygn Rendering Apprximatin f cmplex

More information

ECE 545 Project Deliverables

ECE 545 Project Deliverables Tp-level flder: _ Secnd-level flders: 1_assumptins 2_blck_diagrams 3_interface 4_ASM_charts 5_surce_cdes 6_verificatin 7_timing_analysis 8_results 9_benchmarking 10_bug_reprts

More information

Implementation of Authentication Mechanism for a Virtual File System

Implementation of Authentication Mechanism for a Virtual File System Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55. Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and

More information

In-Class Exercise. Hashing Used in: Hashing Algorithm

In-Class Exercise. Hashing Used in: Hashing Algorithm In-Class Exercise Hashing Used in: Encryptin fr authenticatin Hash a digital signature, get the value assciated with the digital signature,and bth are sent separately t receiver. The receiver then uses

More information

CS4500/5500 Operating Systems Synchronization

CS4500/5500 Operating Systems Synchronization Operating Systems Synchrnizatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

Because this underlying hardware is dedicated to processing graphics commands, OpenGL drawing is typically very fast.

Because this underlying hardware is dedicated to processing graphics commands, OpenGL drawing is typically very fast. The Open Graphics Library (OpenGL) is used fr visualizing 2D and 3D data. It is a multipurpse pen-standard graphics library that supprts applicatins fr 2D and 3D digital cntent creatin, mechanical and

More information

CSE 361S Intro to Systems Software Lab #2

CSE 361S Intro to Systems Software Lab #2 Due: Thursday, September 22, 2011 CSE 361S Intr t Systems Sftware Lab #2 Intrductin This lab will intrduce yu t the GNU tls in the Linux prgramming envirnment we will be using fr CSE 361S this semester,

More information

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram

More information

UML : MODELS, VIEWS, AND DIAGRAMS

UML : MODELS, VIEWS, AND DIAGRAMS UML : MODELS, VIEWS, AND DIAGRAMS Purpse and Target Grup f a Mdel In real life we ften bserve that the results f cumbersme, tedius, and expensive mdeling simply disappear in a stack f paper n smene's desk.

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital

More information

NVIDIA Tesla K20X GPU Accelerator. Breton Minnehan, Beau Sattora

NVIDIA Tesla K20X GPU Accelerator. Breton Minnehan, Beau Sattora NVIDIA Tesla K20X GPU Acceleratr Bretn Minnehan, Beau Sattra Overview Jb f the GPU Histry What is the K20X GK110 Benchmark Perfrmance Jb f the GPU Vertex Shader Applies transfrms n each vertex Applies

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

High Security SaaS Concept Software as a Service (SaaS) for Life Science

High Security SaaS Concept Software as a Service (SaaS) for Life Science Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...

More information

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first

More information

Systems & Operating Systems

Systems & Operating Systems McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware

More information

Speculative Parallelization. Devarshi Ghoshal

Speculative Parallelization. Devarshi Ghoshal Speculative Parallelizatin Devarshi Ghshal Indiana University, Blmingtn 10/10/2011 1 Agenda Speculative Parallelizatin FastFrward-A Speculatin using Checkpint/Restart System Design Sftware-based Speculatin

More information

Rapid Implementation Package

Rapid Implementation Package Implementatin Package Implementatin 1 Purpse The purpse f this dcument is t detail thse services BuildingPint NrthEast ( BPNE ) will prvide as part f the Prlg Rapid Implementatin Package. This package

More information

1 Binary Trees and Adaptive Data Compression

1 Binary Trees and Adaptive Data Compression University f Illinis at Chicag CS 202: Data Structures and Discrete Mathematics II Handut 5 Prfessr Rbert H. Slan September 18, 2002 A Little Bttle... with the wrds DRINK ME, (r Adaptive data cmpressin

More information

Tekmos. TK68020 Microprocessor. Features. General Description. 9/03/14 1

Tekmos. TK68020 Microprocessor. Features. General Description. 9/03/14   1 Tekms TK68020 Micrprcessr September 3, 2014 Prduct Overview Features Addressing Mde Extensins fr Enhanced Supprt f High-Level Languages Object-Cde Cmpatible with Earlier M68000 Micrprcessrs Addressing

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

An Efficient Low Area Implementation of 2-D DCT on FPGA

An Efficient Low Area Implementation of 2-D DCT on FPGA An Efficient Lw Area Implementatin f 2-D DCT n FPGA Atakan Dğan Anadlu University, Electrical and Electrnics Engineering, Eskişehir, Turkey atdgan@anadlu.edu.tr Abstract This paper presents the design

More information

Chapter-10 INHERITANCE

Chapter-10 INHERITANCE Chapter-10 INHERITANCE Intrductin: Inheritance is anther imprtant aspect f bject riented prgramming. C++ allws the user t create a new class (derived class) frm an existing class (base class). Inheritance:

More information

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

Infrastructure Series

Infrastructure Series Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing

More information

Assignment #5: Rootkit. ECE 650 Fall 2018

Assignment #5: Rootkit. ECE 650 Fall 2018 General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment

More information

Low-Cost Solutions for Video Compression Systems

Low-Cost Solutions for Video Compression Systems Overview Lw-Cst Slutins fr Cmpressin Systems Brian Jentz Altera Crpratin 101 Innvatin Drive San Jse, CA 9505, USA (08) 5-7709 bjentz@altera.cm Many device applicatins utilize vide cmpressin t reduce the

More information

Lab 0: Compiling, Running, and Debugging

Lab 0: Compiling, Running, and Debugging UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 0: Cmpiling, Running, and Debugging Intrductin Reading This is the

More information

How to use DCI Contract Alerts

How to use DCI Contract Alerts Hw t use DCI Cntract Alerts Welcme t the MyDCI Help Guide series Hw t use DCI Cntract Alerts In here, yu will find a lt f useful infrmatin abut hw t make the mst f yur DCI Alerts which will help yu t fully

More information

Australian Statistics API Specification

Australian Statistics API Specification Australian Statistics API Specificatin Versin: 1.2 Date Mdified: 23 March 2017 Page 1 The cntext... 2 Functins f the API... 2 2.1 Retail Trade API... 2 Input Parameters fr API... 3 Output Specificatin

More information

Studio Software Update 7.7 Release Notes

Studio Software Update 7.7 Release Notes Studi Sftware Update 7.7 Release Ntes Summary: Previus Studi Release: 2013.10.17/2015.01.07 All included Studi applicatins have been validated fr cmpatibility with previusly created Akrmetrix Studi file

More information

Lab 5 Sorting with Linked Lists

Lab 5 Sorting with Linked Lists UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces

More information

Customized RTU for Local and Remote Supervision

Customized RTU for Local and Remote Supervision AUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES ISSN:1991-8178 EISSN: 2309-8414 Jurnal hme page: www.ajbasweb.cm Custmized RTU fr Lcal and Remte Supervisin 1 Mayssa Hajar, 2 Raed ElRafei, 3 Khaled Muchref

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician

More information

Project 4: System Calls 1

Project 4: System Calls 1 CMPT 300 1. Preparatin Prject 4: System Calls 1 T cmplete this assignment, it is vital that yu have carefully cmpleted and understd the cntent in the fllwing guides which are psted n the curse website:

More information

Teaching Operating Systems Scheduling

Teaching Operating Systems Scheduling Prceedings f Infrming Science & IT Educatin Cnference (InSITE) 2010 Teaching Operating Systems Scheduling Shimn Chen MLA Academic Learning Center, Israel shamn51@gmail.cm Abstract The Operating System

More information

Getting Started with the SDAccel Environment on Nimbix Cloud

Getting Started with the SDAccel Environment on Nimbix Cloud Getting Started with the SDAccel Envirnment n Nimbix Clud Revisin Histry The fllwing table shws the revisin histry fr this dcument. Date Versin Changes 09/17/2018 201809 Updated figures thrughut Updated

More information

CSE 3320 Operating Systems Synchronization Jia Rao

CSE 3320 Operating Systems Synchronization Jia Rao CSE 3320 Operating Systems Synchrnizatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready queue

More information

CAMPBELL COUNTY GILLETTE, WYOMING

CAMPBELL COUNTY GILLETTE, WYOMING CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed

More information

Update: Users are updated when their information changes (examples: Job Title or Department). o

Update: Users are updated when their information changes (examples: Job Title or Department). o Learn Basic User Integratin Batch File Prcessing The Learn Basic User Integratin is designed t manage the rganizatinal changes cmpanies are challenged with n a daily basis. Withut a basic type f integratin,

More information

MICRO Graphicionado. A High-Performance and Energy-Efficient Graph Analytics Accelerator

MICRO Graphicionado. A High-Performance and Energy-Efficient Graph Analytics Accelerator MICRO 2016 Graphicinad A High-Perfrmance and Energy-Efficient Graph Analytics Acceleratr Tae Jun Ham Lisa Wu Narayanan Sundaram Nadathur Satish Margaret Martnsi Slide: http://tiny.cc/graphicinad Graph

More information

To over come these problems collections are recommended to use. Collections Arrays

To over come these problems collections are recommended to use. Collections Arrays Q1. What are limitatins f bject Arrays? The main limitatins f Object arrays are These are fixed in size ie nce we created an array bject there is n chance f increasing r decreasing size based n ur requirement.

More information

M. Tavera, M. Alfonseca and J. Rojas IBM Madrid Scientific Center P. Castellana, 4. Madrid-l. SPAIN.

M. Tavera, M. Alfonseca and J. Rojas IBM Madrid Scientific Center P. Castellana, 4. Madrid-l. SPAIN. THE IBM PERSONAL COMPUTER APL SYSTEM M. Tavera, M. Alfnseca and J. Rjas IBM Madrid Scientific Center P. Castellana, 4. Madrid-l. SPAIN. INTRODUCTION AND HISTORY The Cmputer Science Department f the IBM

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

PRECISION DMX USER GUIDE

PRECISION DMX USER GUIDE PRECISION DMX USER GUIDE The Precisin DMX is the wrld s smallest DMX cntrllable theatrical fldlight. This RGB fixture is smaller than a fist yet packs cmparable punch t traditinal fixtures several times

More information

You may receive a total of two GSA graduate student grants in your entire academic career, regardless of what program you are currently enrolled in.

You may receive a total of two GSA graduate student grants in your entire academic career, regardless of what program you are currently enrolled in. GSA Research Grant Applicatin GUIDELINES & INSTRUCTIONS GENERAL INFORMATION T apply fr this grant, yu must be a GSA student member wh has renewed r is active thrugh the end f the award year (which is the

More information

CS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation

CS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation Operating Systems Page Replacement Algrithms and Segmentatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOSE, OS@Austin, Clumbia, Rchester Recap f

More information

Using the DOCUMENT Procedure to Expand the Output Flexibility of the Output Delivery System with Very Little Programming Effort

Using the DOCUMENT Procedure to Expand the Output Flexibility of the Output Delivery System with Very Little Programming Effort Paper 11864-2016 Using the DOCUMENT Prcedure t Expand the Output Flexibility f the Output Delivery System with Very Little Prgramming Effrt ABSTRACT Rger D. Muller, Ph.D., Data T Events Inc. The DOCUMENT

More information

- Replacement of a single statement with a sequence of statements(promotes regularity)

- Replacement of a single statement with a sequence of statements(promotes regularity) ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine

More information

NORTHERN ILLINOIS UNIVERSITY

NORTHERN ILLINOIS UNIVERSITY NORTHERN ILLINOIS UNIVERSITY Simulatr f IBM Mainframe Prgramming Envirnment A Thesis Submitted t the University Hnrs Prgram In Partial Fulfillment f the Requirements f the Baccalaureate Degree With University

More information

CSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao

CSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao CSE 3320 Operating Systems Cmputer and Operating Systems Overview Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Overview Recap f last class What is an perating system?

More information

WinEst 15.2 Installation Guide

WinEst 15.2 Installation Guide WinEst 15.2 Installatin Guide This installatin guide prvides yu with step-by-step instructins n hw t install r upgrade WinEst. Fr a successful installatin, ensure that all machines meet the requirements.

More information

Creating a TES Encounter/Transaction Entry Batch

Creating a TES Encounter/Transaction Entry Batch Creating a TES Encunter/Transactin Entry Batch Overview Intrductin This mdule fcuses n hw t create batches fr transactin entry in TES. Charges (transactins) are entered int the system in grups called batches.

More information

FIPS Level 1 Security Policy Version Number: 1.5 Date: February 29, 2016

FIPS Level 1 Security Policy Version Number: 1.5 Date: February 29, 2016 Nn-Prprietary Bx JCA Cryptgraphic Mdule 1.0 FIPS 140-2 Level 1 Security Plicy Versin Number: 1.5 Date: February 29, 2016 Table f Cntents 1. MODULE OVERVIEW 3 2. MODES OF OPERATION 5 2.1 APPROVED CRYPTOGRAPHIC

More information

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions

Eastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions Eastern Mediterranean University Schl f Cmputing and Technlgy Infrmatin Technlgy Lecture2 Functins User Defined Functins Why d we need functins? T make yur prgram readable and rganized T reduce repeated

More information

Aloha Offshore SDLC Process

Aloha Offshore SDLC Process Alha Sftware Develpment Life Cycle Alha Offshre SDLC Prcess Alha Technlgy fllws a sftware develpment methdlgy that is derived frm Micrsft Slutins Framewrk and Ratinal Unified Prcess (RUP). Our prcess methdlgy

More information

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority

Setting up the ncipher nshield HSM for use with Kerberized Certificate Authority Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized

More information

Imagine for MSDNAA Student SetUp Instructions

Imagine for MSDNAA Student SetUp Instructions Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS

More information

Municode Website Instructions

Municode Website Instructions Municde Website instructins Municde Website Instructins The new and imprved Municde site allws yu t navigate t, print, save, e-mail and link t desired sectins f the Online Cde f Ordinances with greater

More information

Querying Data with Transact SQL

Querying Data with Transact SQL Querying Data with Transact SQL Curse Cde: 20761 Certificatin Exam: 70-761 Duratin: 5 Days Certificatin Track: MCSA: SQL 2016 Database Develpment Frmat: Classrm Level: 200 Abut this curse: This curse is

More information

Relius Documents ASP Checklist Entry

Relius Documents ASP Checklist Entry Relius Dcuments ASP Checklist Entry Overview Checklist Entry is the main data entry interface fr the Relius Dcuments ASP system. The data that is cllected within this prgram is used primarily t build dcuments,

More information

The programming for this lab is done in Java and requires the use of Java datagrams.

The programming for this lab is done in Java and requires the use of Java datagrams. Lab 2 Traffic Regulatin This lab must be cmpleted individually Purpse f this lab: In this lab yu will build (prgram) a netwrk element fr traffic regulatin, called a leaky bucket, that runs ver a real netwrk.

More information

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management

Guidance for Applicants: Submitting an application in AAS Ishango Grants Management Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1

More information

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as: Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties

More information

Laboratory #13: Trigger

Laboratory #13: Trigger Schl f Infrmatin and Cmputer Technlgy Sirindhrn Internatinal Institute f Technlgy Thammasat University ITS351 Database Prgramming Labratry Labratry #13: Trigger Objective: - T learn build in trigger in

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

Iteration Part 2. Review: Iteration [Part 1] Flow charts for two loop constructs. Review: Syntax of loops. while continuation_condition : statement1

Iteration Part 2. Review: Iteration [Part 1] Flow charts for two loop constructs. Review: Syntax of loops. while continuation_condition : statement1 Review: Iteratin [Part 1] Iteratin Part 2 CS111 Cmputer Prgramming Department f Cmputer Science Wellesley Cllege Iteratin is the repeated executin f a set f statements until a stpping cnditin is reached.

More information

Software Toolbox Extender.NET Component. Development Best Practices

Software Toolbox Extender.NET Component. Development Best Practices Page 1 f 16 Sftware Tlbx Extender.NET Cmpnent Develpment Best Practices Table f Cntents Purpse... 3 Intended Audience and Assumptins Made... 4 Seeking Help... 5 Using the ErrrPrvider Cmpnent... 6 What

More information

Procurement Contract Portal. User Guide

Procurement Contract Portal. User Guide Prcurement Cntract Prtal User Guide Cntents Intrductin...2 Access the Prtal...2 Hme Page...2 End User My Cntracts...2 Buttns, Icns, and the Actin Bar...3 Create a New Cntract Request...5 Requester Infrmatin...5

More information