Chapter 10 : Concurrency Control

Size: px
Start display at page:

Download "Chapter 10 : Concurrency Control"

Transcription

1 Chapter 10 : Cocurrecy Cotro modified from: Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See for coditios o re-use

2 Ituitio of Lock-based Protocos Trasactios have to acquire ocks o data items before accessig them If a ock is hod by oe trasactio o a data item this restricts the abiity of other trasactios to acquire ocks for that data item By ockig a data item we wat to esure that o access to that data item is possibe that woud ead to o-seriaizabe schedues The trick is to desig a ock mode ad protoco that guaratees that Lock-based cocurrecy protocos are a form of pessimistic cocurrecy cotro mechaism We avoid ever gettig ito a state that ca ead to a o-seriaizabe schedue Aterative cocurrecy cotro mechaism do ot avoid coficts, but determie ater o (at commit time) whether committig a trasactio woud cause a o-seriaizabe schedue to be geerated Optimistic cocurrecy cotro mechaism CS425 Fa 2013 Boris Gavic 10.2 Siberschatz, Korth ad Sudarsha

3 Lock-Based Protocos A ock is a mechaism to cotro cocurret access to a data item Data items ca be ocked i two modes : 1. excusive (X) mode. Data item ca be both read as we as writte. X-ock is requested usig ock-x istructio. 2. shared (S) mode. Data item ca oy be read. S-ock is requested usig ock-s istructio. Lock requests are made to cocurrecy-cotro maager. Trasactio do ot access data items before havig acquired a ock o that data item Trasactios reease their ocks o a data item oy after they have accessed a data item CS425 Fa 2013 Boris Gavic 10.3 Siberschatz, Korth ad Sudarsha

4 Lock-Based Protocos (Cot.) Lock-compatibiity matrix A trasactio may be grated a ock o a item if the requested ock is compatibe with ocks aready hed o the item by other trasactios Ay umber of trasactios ca hod shared ocks o a item, but if ay trasactio hods a excusive ock o the item o other trasactio may hod ay ock o the item. If a ock caot be grated, the requestig trasactio is made to wait ti a icompatibe ocks hed by other trasactios have bee reeased. The ock is the grated. CS425 Fa 2013 Boris Gavic 10.4 Siberschatz, Korth ad Sudarsha

5 Lock-Based Protocos (Cot.) Exampe of a trasactio performig ockig: T 2 : ock-s(a); read (A); uock(a); ock-s(b); read (B); uock(b); dispay(a+b) Lockig as above is ot sufficiet to guaratee seriaizabiity if A ad B get updated i-betwee the read of A ad B, the dispayed sum woud be wrog. A ockig protoco is a set of rues foowed by a trasactios whie requestig ad reeasig ocks. Lockig protocos restrict the set of possibe schedues. CS425 Fa 2013 Boris Gavic 10.5 Siberschatz, Korth ad Sudarsha

6 Pitfas of Lock-Based Protocos Cosider the partia schedue Neither T 3 or T 4 ca make progress executig ock-s(b) causes T 4 to wait for T 3 to reease its ock o B, whie executig ock-x(a) causes T 3 to wait for T 4 to reease its ock o A. Such a situatio is caed a deadock. To hade a deadock oe of T 3 or T 4 must be roed back ad its ocks reeased. CS425 Fa 2013 Boris Gavic 10.6 Siberschatz, Korth ad Sudarsha

7 Pitfas of Lock-Based Protocos (Cot.) The potetia for deadock exists i most ockig protocos. Deadocks are a ecessary evi. Starvatio is aso possibe if the cocurrecy cotro maager is bady desiged. For exampe: A trasactio may be waitig for a X-ock o a item, whie a sequece of other trasactios request ad are grated a S-ock o the same item. The same trasactio is repeatedy roed back due to deadocks. Cocurrecy cotro maagers ca be desiged to prevet starvatio. CS425 Fa 2013 Boris Gavic 10.7 Siberschatz, Korth ad Sudarsha

8 The Two-Phase Lockig Protoco This is a protoco which esures cofict-seriaizabe schedues. Phase 1: Growig Phase trasactio may obtai ocks trasactio may ot reease ocks Phase 2: Shrikig Phase trasactio may reease ocks trasactio may ot obtai ocks The protoco assures seriaizabiity. It ca be proved that the trasactios ca be seriaized i the order of their ock poits (i.e. the poit where a trasactio acquired its fia ock). CS425 Fa 2013 Boris Gavic 10.8 Siberschatz, Korth ad Sudarsha

9 The Two-Phase Lockig Protoco (Cot.) Two-phase ockig does ot esure freedom from deadocks Cascadig ro-back is possibe uder two-phase ockig. To avoid this, foow a modified protoco caed strict two-phase ockig (S2PL). Here a trasactio must hod a its excusive ocks ti it commits/aborts. Rigorous two-phase ockig (SS2PL) is eve stricter: here a ocks are hed ti commit/abort. I this protoco trasactios ca be seriaized i the order i which they commit. CS425 Fa 2013 Boris Gavic 10.9 Siberschatz, Korth ad Sudarsha

10 The Two-Phase Lockig Protoco (Cot.) There ca be cofict seriaizabe schedues that caot be obtaied if two-phase ockig is used. However, i the absece of extra iformatio (e.g., orderig of access to data), two-phase ockig is eeded for cofict seriaizabiity i the foowig sese: Give a trasactio T i that does ot foow two-phase ockig, we ca fid a trasactio T j that uses two-phase ockig, ad a schedue for T i ad T j that is ot cofict seriaizabe. CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

11 Lock Coversios Two-phase ockig with ock coversios: First Phase: ca acquire a ock-s o item ca acquire a ock-x o item ca covert a ock-s to a ock-x (upgrade) Secod Phase: ca reease a ock-s ca reease a ock-x ca covert a ock-x to a ock-s (dowgrade) This protoco assures seriaizabiity. But sti reies o the programmer to isert the various ockig istructios. CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

12 Automatic Acquisitio of Locks A trasactio T i issues the stadard read/write istructio, without expicit ockig cas. The operatio read(d) is processed as: if T i has a ock o D the read(d) ese begi if ecessary wait uti o other trasactio has a ock-x o D grat T i a ock-s o D; read(d) ed CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

13 Automatic Acquisitio of Locks (Cot.) write(d) is processed as: if T i has a ock-x o D the write(d) ese begi if ecessary wait uti o other tras. has ay ock o D, if T i has a ock-s o D the upgrade ock o D to ock-x ese grat T i a ock-x o D write(d) ed; A ocks are reeased after commit or abort CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

14 Impemetatio of Lockig A ock maager ca be impemeted as a separate process to which trasactios sed ock ad uock requests The ock maager repies to a ock request by sedig a ock grat messages (or a message askig the trasactio to ro back, i case of a deadock) The requestig trasactio waits uti its request is aswered The ock maager maitais a data-structure caed a ock tabe to record grated ocks ad pedig requests The ock tabe is usuay impemeted as a i-memory hash tabe idexed o the ame of the data item beig ocked CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

15 Lock Tabe T23 T1 T8 T T23 14 T1 T23 Lock tabe aso records the type of ock grated or requested New request is added to the ed of the queue of requests for the data item, ad grated if it is compatibe with a earier ocks Uock requests resut i the request beig deeted, ad ater requests are checked to see if they ca ow be grated If trasactio aborts, a waitig or grated requests of the trasactio are deeted ock maager may keep a ist of ocks hed by each trasactio, to impemet this efficiety 144 T8 CS425 Fa 2013 Boris Gavic grated waitig Siberschatz, Korth ad Sudarsha

16 Deadock Hadig Cosider the foowig two trasactios: T 1 : write (X) T 2 : write(y) write(y) write(x) Schedue with deadock CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

17 Deadock Hadig System is deadocked if there is a set of trasactios such that every trasactio i the set is waitig for aother trasactio i the set. Deadock prevetio protocos esure that the system wi ever eter ito a deadock state. Some prevetio strategies : Require that each trasactio ocks a its data items before it begis executio (predecaratio). Not practica Impose partia orderig of a data items ad require that a trasactio ca ock data items oy i the order specified by the partia order (graph-based protoco). CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

18 More Deadock Prevetio Strategies Foowig schemes use trasactio timestamps for the sake of deadock prevetio aoe. Preemptive: Trasactio hodig a ock is aborted to make ock avaiabe wait-die scheme o-preemptive oder trasactio may wait for youger oe to reease data item. Youger trasactios ever wait for oder oes; they are roed back istead. a trasactio may die severa times before acquirig eeded data item woud-wait scheme preemptive oder trasactio wouds (forces roback) of youger trasactio istead of waitig for it. Youger trasactios may wait for oder oes. may be fewer robacks tha wait-die scheme. CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

19 Deadock prevetio (Cot.) Both i wait-die ad i woud-wait schemes, a roed back trasactios is restarted with its origia timestamp. Oder trasactios thus have precedece over ewer oes, ad starvatio is hece avoided. Timeout-Based Schemes: a trasactio waits for a ock oy for a specified amout of time. After that, the wait times out ad the trasactio is roed back. thus deadocks are ot possibe simpe to impemet; but starvatio is possibe. Aso difficut to determie good vaue of the timeout iterva. CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

20 Deadock Detectio Deadocks ca be described as a wait-for graph, which cosists of a pair G = (V,E), V is a set of vertices (a the trasactios i the system) E is a set of edges; each eemet is a ordered pair T i T j. If T i T j is i E, the there is a directed edge from T i to T j, impyig that T i is waitig for T j to reease a data item. Whe T i requests a data item currety beig hed by T j, the the edge T i T j is iserted i the wait-for graph. This edge is removed oy whe T j is o oger hodig a data item eeded by T i. The system is i a deadock state if ad oy if the wait-for graph has a cyce. Must ivoke a deadock-detectio agorithm periodicay to ook for cyces. CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

21 Deadock Detectio (Cot.) Wait-for graph without a cyce Wait-for graph with a cyce CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

22 Deadock Recovery Whe deadock is detected : Some trasactio wi have to roed back (made a victim) to break deadock. Seect that trasactio as victim that wi icur miimum cost. Roback -- determie how far to ro back trasactio Tota roback: Abort the trasactio ad the restart it. More effective to ro back trasactio oy as far as ecessary to break deadock. Starvatio happes if same trasactio is aways chose as victim. Icude the umber of robacks i the cost factor to avoid starvatio CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

23 Weak Leves of Cosistecy Degree-two cosistecy: differs from two-phase ockig i that S-ocks may be reeased at ay time, ad ocks may be acquired at ay time X-ocks must be hed ti ed of trasactio Seriaizabiity is ot guarateed, programmer must esure that o erroeous database state wi occur] Cursor stabiity: For reads, each tupe is ocked, read, ad ock is immediatey reeased X-ocks are hed ti ed of trasactio Specia case of degree-two cosistecy CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

24 Weak Leves of Cosistecy i SQL SQL aows o-seriaizabe executios Seriaizabe: is the defaut Repeatabe read: aows oy committed records to be read, ad repeatig a read shoud retur the same vaue (so read ocks shoud be retaied) However, the phatom pheomeo eed ot be preveted T1 may see some records iserted by T2, but may ot see others iserted by T2 Read committed: same as degree two cosistecy, but most systems impemet it as cursor-stabiity Read ucommitted: aows eve ucommitted data to be read I may database systems, read committed is the defaut cosistecy eve has to be expicity chaged to seriaizabe whe required set isoatio eve seriaizabe CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

25 Recap Cocurrecy Cotro Pessimistic: Prevet bad thigs from happeig Lockig Protocos Optimistic: Detect that bad thigs have happeed ad resove the probem Two-Phase Lockig (2PL) Two types of ocks: Shared (S) ocks for read-oy access Excusive (X) ocks for write + read access Lock compatibiity Trasactios caot acquire ocks after they have reeased a ock Divides trasactio ito growig ad shrikig phase Esures cofict-seriaizabiity Cascadig robacks are possibe Deadocks are possibe CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

26 Recap Strict Two-Phase Lockig (S2PL) Excusive ocks are hed uti trasactio commit Prevets cascadig robacks Deadocks are sti possibe Strict Strog Two-Phase Lockig (SS2PL) A ocks are hed uti trasactio commit Eabes seriaizabiity i commit order Deadocks Deadock Prevetio Wait-die: Youger trasactio that waits for oder is roed back Woud-wait: If oder waits for youger, the youger is roed back Deadock Detectio Cyce Detectio i Waits-for graph Expesive Timeout CS425 Fa 2013 Boris Gavic Siberschatz, Korth ad Sudarsha

27 Ed of Chapter Thaks to Aa Fekete ad Sudhir Jorwekar for Sapshot Isoatio exampes modified from: Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See for coditios o re-use

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee

More information

TRANSACTION MANAGEMENT [CH 16]

TRANSACTION MANAGEMENT [CH 16] Sprig 2017 TRANSACTION MANAGEMENT [CH 16] 4/25/17 CS 564: Database Maagemet Systems; (c) Jigesh M. Patel, 2013 1 Trasactio Maagemet Read (A); Check (A > $25); Pay ($25); A = A 25; Write (A); Yes You Read

More information

JDBC (Java Database Connectivity)

JDBC (Java Database Connectivity) JDBC (Java Database Coectivity) Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See www.db-book.com for coditios o re-use JDBC Java API for commuicatig with database systems supportig

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 20 Itroductio to Trasactio Processig Cocepts ad Theory Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Trasactio Describes local

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

CS425 Project Assignment

CS425 Project Assignment CS425 Project Assigmet Tue the TPC-H queries i a database of your choice What is TPC-H? Idustry stadard bechmark for testig database performace for compex SQL Decisio support Aaytics Ad-hoc TPC-H specificatio

More information

Review: The ACID properties

Review: The ACID properties Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of

More information

CS425 Summer 2016 Jason Arnold Chapter 4: Introduction to SQL

CS425 Summer 2016 Jason Arnold Chapter 4: Introduction to SQL CS425 Summer 2016 Jaso Arod Chapter 4: Itroductio to SQL Modified from: Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See www.db-book.com for coditios o re-use Chapter 4: Itroductio

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

CS425 Summer 2016 Jason Arnold Chapter 6: Advanced SQL

CS425 Summer 2016 Jason Arnold Chapter 6: Advanced SQL CS425 Summer 2016 Jaso Arod Chapter 6: Advaced SQL modified from: Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See www.db-book.com for coditios o re-use Chapter 6: Advaced SQL Accessig

More information

Lecture 21 Concurrency Control Part 1

Lecture 21 Concurrency Control Part 1 CMSC 461, Database Management Systems Spring 2018 Lecture 21 Concurrency Control Part 1 These slides are based on Database System Concepts 6 th edition book (whereas some quotes and figures are used from

More information

Deadlocks Detection and Avoidance. Prof. Sirer CS 4410 Cornell University

Deadlocks Detection and Avoidance. Prof. Sirer CS 4410 Cornell University Deadlocks Detectio ad Avoidace Prof. Sirer CS 4410 Corell Uiversity System Model There are o-shared computer resources Maybe more tha oe istace Priters, Semaphores, Tape drives, CPU Processes eed access

More information

Lecture 13 Concurrency Control

Lecture 13 Concurrency Control Lecture 13 Concurrency Control Shuigeng Zhou December 23, 2009 School of Computer Science Fudan University Outline Lock-Based Protocols Multiple Granularity Deadlock Handling Insert and Delete Operations

More information

Chapter 5: CPU Scheduling

Chapter 5: CPU Scheduling Chapter 5: CPU Scheduig Chapter 5: CPU Scheduig Basic Cocepts Scheduig Criteria Scheduig Agorithms Mutipe-Processor Scheduig Rea-Time Scheduig Thread Scheduig Operatig Systems Exampes Java Thread Scheduig

More information

Chapter 5: Transactions in Federated Databases

Chapter 5: Transactions in Federated Databases Federated Databases Chapter 5: in Federated Databases Saes R&D Human Resources Kemens Böhm Distributed Data Management: in Federated Databases 1 Kemens Böhm Distributed Data Management: in Federated Databases

More information

Chapter 13 : Concurrency Control

Chapter 13 : Concurrency Control Chapter 13 : Concurrency Control Chapter 13: Concurrency Control Lock-Based Protocols Timestamp-Based Protocols Validation-Based Protocols Multiple Granularity Multiversion Schemes Insert and Delete Operations

More information

MR-2010I %MktBSize Macro 989. %MktBSize Macro

MR-2010I %MktBSize Macro 989. %MktBSize Macro MR-2010I %MktBSize Macro 989 %MktBSize Macro The %MktBSize autocall macro suggests sizes for balaced icomplete block desigs (BIBDs). The sizes that it reports are sizes that meet ecessary but ot sufficiet

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Itroductio Database System Cocepts, 6 th Ed. Siberschatz, Korth ad Sudarsha See www.db-book.com for coditios o re-use Data, Database, ad DBMS Data [Emasri ad Navathe. Fudametas of Database Systems]

More information

! A lock is a mechanism to control concurrent access to a data item! Data items can be locked in two modes :

! A lock is a mechanism to control concurrent access to a data item! Data items can be locked in two modes : Lock-Based Protocols Concurrency Control! A lock is a mechanism to control concurrent access to a data item! Data items can be locked in two modes : 1 exclusive (X) mode Data item can be both read as well

More information

Lazy Type Changes in Object-oriented Database. Shan Ming Woo and Barbara Liskov MIT Lab. for Computer Science December 1999

Lazy Type Changes in Object-oriented Database. Shan Ming Woo and Barbara Liskov MIT Lab. for Computer Science December 1999 Lazy Type Chages i Object-orieted Database Sha Mig Woo ad Barbara Liskov MIT Lab. for Computer Sciece December 1999 Backgroud wbehavior of OODB apps compose of behavior of persistet obj wbehavior of objects

More information

Threads and Concurrency in Java: Part 2

Threads and Concurrency in Java: Part 2 Threads ad Cocurrecy i Java: Part 2 1 Waitig Sychroized methods itroduce oe kid of coordiatio betwee threads. Sometimes we eed a thread to wait util a specific coditio has arise. 2003--09 T. S. Norvell

More information

Chapter 15 : Concurrency Control

Chapter 15 : Concurrency Control Chapter 15 : Concurrency Control What is concurrency? Multiple 'pieces of code' accessing the same data at the same time Key issue in multi-processor systems (i.e. most computers today) Key issue for parallel

More information

Lock-based Concurrency Control

Lock-based Concurrency Control Lock-based oncurrency ontrol Self Study Materials hapter 16 : oncurrency ontrol A DBMS must ensure Only serializable (and recoverable) schedules are allowed, and no actions of committed transaction is

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information

Chapter 10 : Concurrency Control

Chapter 10 : Concurrency Control Chapter 10 : Concurrency Control modified from: Database System Concepts, 6 th Ed. See www.db-book.com for conditions on re-use Chapter 10: Concurrency Control Lock-Based Protocols Timestamp-Based Protocols

More information

Chapter 12 : Concurrency Control

Chapter 12 : Concurrency Control Chapter 12 : Concurrency Control Chapter 12: Concurrency Control Lock-Based Protocols Timestamp-Based Protocols Validation-Based Protocols Multiple Granularity Multiversion Schemes Insert and Delete Operations

More information

Introduction to FFT Processors

Introduction to FFT Processors Itroductio to FFT Processors Chih-ei Liu VLSI Siga Processig Lab Departmet of Eectroics Egieerig atioa Chiao-Tug Uiversity FFT Desig FFT Cosists of a series of compe additios ad compe mutipicatios Agorithm

More information

Recursion. A problem solving technique where an algorithm is defined in terms of itself. A recursive method is a method that calls itself

Recursion. A problem solving technique where an algorithm is defined in terms of itself. A recursive method is a method that calls itself Recursio 1 A probem sovig techique where a agorithm is defied i terms of itsef A recursive method is a method that cas itsef A recursive agorithm breaks dow the iput or the search space ad appies the same

More information

Weston Anniversary Fund

Weston Anniversary Fund Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Optimizing Triangular Parabolic Fuzzy EOQ Model with Shortage Using Nearest Interval Approximation

Optimizing Triangular Parabolic Fuzzy EOQ Model with Shortage Using Nearest Interval Approximation Iteratioa Joura o Future Revoutio i Computer Sciece & Commuicatio Egieerig ISSN: 454-448 Voume: 3 Issue: 9 96 Optimizig Triaguar Paraboic Fuzzy EO Mode with Shortage Usig Nearest Iterva Approximatio Faritha

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Homework 1 Solutions MA 522 Fall 2017

Homework 1 Solutions MA 522 Fall 2017 Homework 1 Solutios MA 5 Fall 017 1. Cosider the searchig problem: Iput A sequece of umbers A = [a 1,..., a ] ad a value v. Output A idex i such that v = A[i] or the special value NIL if v does ot appear

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

Chapter 16 : Concurrency Control

Chapter 16 : Concurrency Control Chapter 16 : Concurrency Control Database System Concepts 5 th Ed. Silberschatz, Korth and Sudarshan, 2005 See www.db-book.com for conditions on re-use Chapter 16: Concurrency Control Lock-Based Protocols

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Guide to Applying Online

Guide to Applying Online Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

CMSC Computer Architecture Lecture 15: Multi-Core. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 15: Multi-Core. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 15: Multi-Core Prof. Yajig Li Uiversity of Chicago Course Evaluatio Very importat Please fill out! 2 Lab3 Brach Predictio Competitio 8 teams etered the competitio,

More information

Implementing Consistency -- Paxos. Some slides from Michael Freedman

Implementing Consistency -- Paxos. Some slides from Michael Freedman Implemetig Cosistecy -- Paxos Some slides from Michael Freedma What do cliets see? Distributed stores use replicatio Fault tolerace ad scalability Does replicatio ecessitate icosistecy? Harder to program,

More information

CS 111: Program Design I Lecture # 7: First Loop, Web Crawler, Functions

CS 111: Program Design I Lecture # 7: First Loop, Web Crawler, Functions CS 111: Program Desig I Lecture # 7: First Loop, Web Crawler, Fuctios Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago September 18, 2018 What will this prit? x = 5 if x == 3: prit("hi!")

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8 BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Lecture 22 Concurrency Control Part 2

Lecture 22 Concurrency Control Part 2 CMSC 461, Database Management Systems Spring 2018 Lecture 22 Concurrency Control Part 2 These slides are based on Database System Concepts 6 th edition book (whereas some quotes and figures are used from

More information

CMPT 125 Assignment 2 Solutions

CMPT 125 Assignment 2 Solutions CMPT 25 Assigmet 2 Solutios Questio (20 marks total) a) Let s cosider a iteger array of size 0. (0 marks, each part is 2 marks) it a[0]; I. How would you assig a poiter, called pa, to store the address

More information

Introduction to FFT Processors. Chih-Wei Liu VLSI Signal Processing Lab Department of Electronics Engineering National Chiao-Tung University

Introduction to FFT Processors. Chih-Wei Liu VLSI Signal Processing Lab Department of Electronics Engineering National Chiao-Tung University Itroductio to FFT Processors Chihei Liu VLSI Siga Processig Lab Departmet of Eectroics Egieerig atioa ChiaoTug Uiversity FFT Desig FFT Cosists of a series of compe additios ad compe mutipicatios Agorithm

More information

2 nd Semester 2009/2010

2 nd Semester 2009/2010 Chapter 16: Concurrency Control Departamento de Engenharia Informática Instituto Superior Técnico 2 nd Semester 2009/2010 Slides baseados nos slides oficiais do livro Database System Concepts c Silberschatz,

More information

USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES

USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES Shih-Chie Chou Departmet of Computer Sciece ad Iformatio Egieerig, Natioal Dog Hwa Uiversity, Taiwa ABSTRACT The use of web services

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Chapter 10: Concurrency Control! Chapter 10 : Concurrency Control! Intuition of Lock-based Protocols! Lock-Based Protocols!

Chapter 10: Concurrency Control! Chapter 10 : Concurrency Control! Intuition of Lock-based Protocols! Lock-Based Protocols! Chapter 10: Concurrency Control Chapter 10 : Concurrency Control Lock-Based Protocols Timestamp-Based Protocols Validation-Based Protocols Multiple Granularity Multiversion Schemes Insert and Delete Operations

More information

Chapter 10 : Concurrency Control!

Chapter 10 : Concurrency Control! Chapter 10 : Concurrency Control! modified from:! Database System Concepts, 6 th Ed.! Silberschatz, Korth and Sudarshan See www.db-book.com for conditions on re-use! Chapter 10: Concurrency Control! Lock-Based

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria.

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria. Computer Sciece Foudatio Exam August, 005 Computer Sciece Sectio A No Calculators! Name: SSN: KEY Solutios ad Gradig Criteria Score: 50 I this sectio of the exam, there are four (4) problems. You must

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

CS307&CS356: Operating Systems. Dept. of Computer Science & Engineering Chentao Wu

CS307&CS356: Operating Systems. Dept. of Computer Science & Engineering Chentao Wu CS307&CS356: Operatig Systems Dept. of Computer Sciece & Egieerig Chetao Wu wuct@cs.sjtu.edu.c Dowoad ectures ftp://pubic.sjtu.edu.c User: wuct Password: wuct123456 http://www.cs.sjtu.edu.c/~wuct/os/ Chapter

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Synchronization: Synchronization Needs Two synchronization needs Mutua excusion Whenever mutipe threads access a shared data, you need to worry

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Pipeliig Sigle-Cycle Disadvatages & Advatages Clk Uses the clock cycle iefficietly the clock cycle must

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Outerjoins, Constraints, Triggers

Outerjoins, Constraints, Triggers Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Module 8-7: Pascal s Triangle and the Binomial Theorem

Module 8-7: Pascal s Triangle and the Binomial Theorem Module 8-7: Pascal s Triagle ad the Biomial Theorem Gregory V. Bard April 5, 017 A Note about Notatio Just to recall, all of the followig mea the same thig: ( 7 7C 4 C4 7 7C4 5 4 ad they are (all proouced

More information

Getting Started. Getting Started - 1

Getting Started. Getting Started - 1 Gettig Started Gettig Started - 1 Issue 1 Overview of Gettig Started Overview of Gettig Started This sectio explais the basic operatios of the AUDIX system. It describes how to: Log i ad log out of the

More information

top() Applications of Stacks

top() Applications of Stacks CS22 Algorithms ad Data Structures MW :00 am - 2: pm, MSEC 0 Istructor: Xiao Qi Lecture 6: Stacks ad Queues Aoucemets Quiz results Homework 2 is available Due o September 29 th, 2004 www.cs.mt.edu~xqicoursescs22

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza

More information

Informed Search. Russell and Norvig Chap. 3

Informed Search. Russell and Norvig Chap. 3 Iformed Search Russell ad Norvig Chap. 3 Not all search directios are equally promisig Outlie Iformed: use problem-specific kowledge Add a sese of directio to search: work toward the goal Heuristic fuctios:

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

EE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering

EE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering EE 4363 1 Uiversity of Miesota Midterm Exam #1 Prof. Matthew O'Keefe TA: Eric Seppae Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Twi Cities Campus EE 4363 Itroductio to Microprocessors

More information

Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach

Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach Cogestio Avoidace Mechaism for Optica Labe Switched Networks: A Dyamic QoS-based Approach Yassie Khifi, Noureddie Boudriga ad Mohammad S. Obaidat Uiversity of November 7th at Carthage, Tuisia ad Momouth

More information

Embedded System Design Framework for Minimizing Code Size and Guaranteeing Real-Time Requirements

Embedded System Design Framework for Minimizing Code Size and Guaranteeing Real-Time Requirements Proceedigs of IEEE Rea-Time Systems Symposium (RTSS), pp. 201-211, Dec. 2002. Embedded System Desig Framework for Miimizig Code Size ad Guarateeig Rea-Time Requiremets Isik Shi, Isup Lee Dept. of Computer

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately. Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their

More information

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4

More information

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1 CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()

More information

A graphical view of big-o notation. c*g(n) f(n) f(n) = O(g(n))

A graphical view of big-o notation. c*g(n) f(n) f(n) = O(g(n)) ca see that time required to search/sort grows with size of We How do space/time eeds of program grow with iput size? iput. time: cout umber of operatios as fuctio of iput Executio size operatio Assigmet:

More information

Data Management Updates

Data Management Updates Data Management Updates Jenny Darcy Data Management Aiance CRP Meeting, Thursday, November 1st, 2018 Presentation Objectives New staff Update on Ingres (JCCS) conversion project Fina IRB cosure at study

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW. Prof. Yanjing Li University of Chicago

CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW. Prof. Yanjing Li University of Chicago CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW Prof. Yajig Li Uiversity of Chicago Admiistrative Stuff Lab2 due toight Exam I: covers lectures 1-9 Ope book, ope otes, close device

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information