Monitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next?
|
|
- Janis Hampton
- 5 years ago
- Views:
Transcription
1 Monitos Lectue 6 Monitos Summay: Last time A combination of data abstaction and mutual exclusion Automatic mutex Pogammed conditional synchonisation Widely used in concuent pogamming languages and libaies Java, ptheads, C#, Today Moe monito synchonisation Poblem solving using monitos in Java 2 A Typical Monito State wait(c) bounday (mutex) queue max 1 pocess executing code p c p c q q d pocesses blocked on c s queue d blocks calle on c s queue Running pocess Blocked pocess 3 4 Signal and What Happens Next? Signal and Continue bounday queue B SC: B=W<S waiting queue W unblocked pocess joins the bounday queue at the end p c p c q q d d signaling pocess S calls signal(c) signaling pocess continues 5 6 1
2 Java and Monitos Baie Monito Uneliable The essence of a monito is the combination of data abstaction class mutual exclusion synchonized condition vaiables default: implicit, one pe object opeations fo blocking and unblocking on condition vaiables included in Object Simple but not 100% eliable solution Spuious wakeup possible public synchonized void await() aived++; if (aived < N) else { aived = 0; 7 8 Baie Monito Outline Baie Monito One-Shot Dealing with spuious wakeup Waiting must be always inside a while loop public synchonized void await() aived++; if (aived < N) { while (...) else { aived = 0; public synchonized void await() aived++; if (aived < N) { while (!done) else { done = tue; aived = 0; 9 10 Baie Monito Taking Tuns Baie Monito Init public synchonized void await() aived++; if (aived < N) { final Tun mytun = tun; while (mytun == tun) else { tun = new Tun(); aived = 0; public class CyclicBaie { pivate int aived = 0; pivate int N; pivate static class Tun { pivate Tun tun; public CyclicBaie(int N) { this.n = N; tun = new Tun(); //pevious slide
3 Java 5 and Monitos Reades/Wites Poblem The essence of a monito is the combination of data abstaction class mutual exclusion explicit i locking package java.util.concuent.locks condition vaiables unlimited opeations fo blocking and unblocking on condition vaiables Eithe one wite o multiple eades, but not both Which tains ae Reades Wites Semaphoes Passing the baton Reades/Wites Poblem Reades/Wites Monito Anothe classic synchonisation poblem Two kinds of pocesses shae access to a database Reades examine the contents Multiple eades allowed concuently Wites examine and modify A wite must have mutex Invaiant (n==0 nw==0) nw<=1 Database is globally accessible Cannot be intenal to monito (citical section!) Encapsulate only the access potocol public inteface ReadesWites { public void statread() thows InteuptedException; public void endread(); public void statwite() thows InteuptedException; public void endwite(); Reades/Wites Monito Notation Maco Stat with an easie non-fai solution public class RWContolle implements RW { pivate final Lock lock = new ReentantLock(); pivate final Condition oktoread = lock.newcondition(); pivate final Condition oktowite = lock.newcondition(); public method( ) thows { lock.lock(); Thead ct = Thead.cuentThead(); ty { //Nomal main code hee finally { lock.unlock(); pivate int n = 0; pivate int nw = 0; //next slides SYNC method( ) thows { //Nomal main code hee
4 Reades/Wites Reading Signal a wite afte all eades left SYNC void statread() thows IE { while (nw > 0) oktoread.a n++; Reades/Wites Witing On leave: signal a wite and all eades SYNC void statwite() thows IE { while (n > 0 nw > 0) oktowite.a nw++; SYNC void endread() { n--; if (n == 0) oktowite.signal(); n==nw==0 SYNC void endwite() { nw--; oktowite.signal(); oktoread.signalall(); n==nw== Analysis Fainess Consideations Stavation Reades can continuously ead Waiting wites will not be woken R R R R R w Suitable policy? Fo example: No new eades when a wite is waiting Change tuns in some way Stict ode of aival Pefomance Fainess often equies moe book-keeping Depends highly on platfom Java signalall() might be inevitable fo condition echecking Fai Reades/Wites Reades/Wites Reading No new eades when a wite is waiting Avoids stavation Spuious wakeup can spoil fainess Quite efficient Count delayed eades and wites Simila to semaphoe passing the baton solution pivate int d = 0; pivate int dw = 0; We only need to modify statread() One exta fainess condition endread() is exactly the same SYNC void statread() thows IE { if (nw > 0 dw >0) { d++; do oktoread.a while (nw > 0); d--; n++;
5 Reades/Wites Witing Reades/Wites Witing One exta fainess condition SYNC void statwite() thows IE { if (n > 0 nw > 0 d > 0) { dw++; do oktowite.a while (n > 0 nw > 0); dw--; nw++; On leave: Faily signal a eades, o One wite SYNC void endwite() { nw--; if (d > 0) oktoread.signalall(); else oktowite.signal(); Fai Reades/Wites Special Pais Stict ode of aival Faiest Least efficient at least in Java spuious wakeup Maintain queue of theads as they aive We also need to know thei type enum Type {Reade, Wite; class Pai { Queue<Pai> w = new AayDeque<Pai>(); pivate class Pai { public Type type; public Thead thead; public Pai(Type type, Thead thead) { this.type = type; this.thead = thead; public boolean equals(object obj) { if (obj instanceof Pai) etun thead.equals( ((Pai)obj).thead); else etun false; Reades/Wites Reading Reades/Wites Reading SYNC void statread() thows IE { while (nw > 0 (!w.isempty() &&!ct.equals(w.peek().thead))) { if (!w.contains( new Pai(Type.Reade,ct))) w.add(new Pai(Type.Reade,ct)); oktoread.a w.poll(); n++; if (!w.isempty() && w.peek().type == Type.Reade) oktoread.signalall(); Signal all wites afte all eades left Since thee ae no moe eades thee must be a waiting wite Wake up all to find the one waiting longest SYNC void endread() { n--; if (n == 0) oktowite.signalall();
6 Reades/Wites Witing Reades/Wites Witing SYNC void statwite() thows IE { while (n > 0 nw > 0 (!w.isempty() &&!ct.equals(w.peek().thead))) { if (!w.contains( new Pai(Type.Wite,ct))) w.add(new Pai(Type.Wite,ct)); oktowite.a w.poll(); nw++; On leave: wake up only the appopiate pocess type to find the fist SYNC void endwite() { nw--; if (!w.isempty() && w.peek().type == Type.Reade) oktoread.signalall(); else oktowite.signalall(); Resouce Allocation Single Resouce Allocato PtC A contolle contols access to copies of some esouce Clients make equests to take (acquie) o etun (elease) one esouce A equest should only succeed if thee is a esouce available, Othewise the equest must block monito ResouceAllocato<E> { pivate Condition fee; pivate int avail = N; pivate Queue<E> units = public E acquie() { if (avail == 0) wait(fee); else avail--; etun units.emove(); public void elease(e e) { units.add(e); if (empty(fee)) avail++; else signal(fee); Resouce Allocation Java Resouce Allocation Multiple public class ResouceAllocato<E> { pivate Queue<E> units = ; public synchonized E allocate() while (units.size() == 0) etun units.emove(); public synchonized void elease(e e) { units.add(e); notify(); Clients equiing multiple esouces should not ask fo esouces one at a time Why would this be bad? A contolle contols access to copies of some esouce Clients make equests to take o etun any numbe of the esouces A equest should only succeed if thee ae sufficiently many esouces available, Othewise the equest must block
7 Resouce Allocation Multiple Synchonisation Shootout public class ResouceAllocato<E> { pivate Queue<E> units = ; public sync Set<E> allocate(int n) while (units.size() < n) etun take(n); public sync void elease(set<e> et) { units.addall(et); Semaphoes vs Monitos Semaphoes Efficient Expessive: any synchonisation (await-statement) Easy to implement Monitos Can monitos implement semaphoes? Impotant theoetical question An illustative example, but not nomal pactice Implementing a low-level language constuct in a high-level language is not nomally a good idea Can semaphoes implement monitos? Implementing Monitos Monito Enty public class MonitoImpl { pivate Semaphoe e = new Semaphoe(1, tue); pivate Map<Thead,Semaphoe> semmap = new HashMap<Thead,Semaphoe>(); potected void lock(); potected void unlock(); potected CV newcv(); potected void wait(cv cv) thows IE; potected void signal(cv cv); Binay semaphoe (lock) fo enty potected void lock() { e.acquieuninteuptibly(); potected void unlock() { e.elease(); Condition Vaiables wait(cv) A condition vaiable is a queue of theads Pivate semaphoe fo blocking public inteface CV extends Queue<Thead> { pivate class CVImpl extends AayDeque<Thead> implements CV { potected CV newcv() { etun new CVImpl(); potected void wait(cv cv) thows IE { cv.add(thead.cuentthead()); Semaphoe e wait = new Semaphoe(0); e(0); semmap.put(thead.cuentthead(), wait); unlock(); ty { wait.acquie(); finally { lock();
8 signal(cv) Monitos vs Semaphoes Signal the fist waiting thead on its pivate semaphoe Semaphoes can implement monitos Monitos can implement semaphoes potected void signal(cv cv) { if (cv.size() > 0) { Thead waite = cv.emove(); Semaphoe wait = semmap.get(waite); wait.elease(); The same expessive powe Can implement any await statement Impotant theoetical esult Nested Monito Calls Nested Monito Calls What happens if monito A calls monito B? A Fou appoaches Ban nested calls Release A s lock when enteing B Moe concuency B Fou appoaches continued: Maintain lock on A while in B; wait( ) in B eleases both locks Maintain lock on A while in B; etun to A on leaving B wait( ) in B eleases only B s lock less concuency can lead to deadlock easie to eason about safety popeties Odeing access The Java Case Recusion The Java Case Fist a special case What if A and B ae the same object? Reentant lock can be e-locked safely public class Reentant { public synchonized void a() { b(); System.out.pintln(TN+" in a()"); public synchonized void b() { System.out.pintln(TN+" in b()");... This woks in a simila way acoss multiple objects Theads collect the locks as they go If they aleady have the lock on the object then they ypoceed A wait( ) opeation eleases the lock fo the cuent object only. Othe locks ae still held. Note: this means that you will block while holding locks a good chance to deadlock!
9 The Java Case GUI Famewoks The same ules apply to eentant locks in package java.util.concuent.locks Note: collecting locks means that you will block while holding locks A good chance to deadlock! Pogamming discipline helps Remembe the dining philosophes? Odeing access/calls can help avoiding cicula waiting AWT Attempted to be thead-safe Result: deadlocks possible Swing Abandons thead-safety in geneal One main event-dispatching thead uns all Swing activity Some thead-safe methods ae povided Fo example: epaint() Swing Swing Example Thead-safe Swing Opeations modifying Swing components must un in the event-dispatching thead SwingUtilities.invokeLate(Runnable invokelate(runnable dorun) SwingUtilities.invokeAndWait(Runnable dorun) thows InteuptedException, InvocationTagetException Cemona JFlash window class JFlash public JFlash(Sting asting) { supe(asting); public void un() { // Pepae all the intenal components pack(); setvisible(tue); main thead SwingUtilities.invokeLate(window); Summay Java Next Time Monito based Signal and Continue semantics Native Java synchonized methods One implicit condition vaiable Java 5 Fully fledged monitos But moe explicit pogamming Shaed-memoy pogamming Only fo the insane pogamme? Message passing Could this be the holy gail of concuent pogamming? Fist look at the possibilities
Summary Semaphores. Passing the Baton any await statement. Synchronisation code not linked to the data
Lecture 4 Monitors Summary Semaphores Good news Simple, efficient, expressive Passing the Baton any await statement Bad news Low level, unstructured omit a V: deadlock omit a P: failure of mutex Synchronisation
More informationAny modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationA Novel Parallel Deadlock Detection Algorithm and Architecture
A Novel Paallel Deadlock Detection Aloithm and Achitectue Pun H. Shiu 2, Yudon Tan 2, Vincent J. Mooney III {ship, ydtan, mooney}@ece.atech.ed }@ece.atech.edu http://codesin codesin.ece.atech.eduedu,2
More informationLecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining
EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining
More informationEfficient Execution Path Exploration for Detecting Races in Concurrent Programs
IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent
More informationEECS 570. Lecture 6 Synchronization II. Winter 2019 Prof. Thomas Wenisch
Lectue 6 Synchonization II Winte 2019 Pof. Thomas Wenisch http://www.eecs.umich.edu/couses/eecs570/ Slides developed in pat by Pofs. Adve, Falsafi, Hill, Lebeck, Matin, Naayanasamy, Nowatzyk, Reinhadt,
More informationThe Java Virtual Machine. Compiler construction The structure of a frame. JVM stacks. Lecture 2
Compile constuction 2009 Lectue 2 Code geneation 1: Geneating code The Java Vitual Machine Data types Pimitive types, including intege and floating-point types of vaious sizes and the boolean type. The
More informationLecture 8 Introduction to Pipelines Adapated from slides by David Patterson
Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.
More informationReachable State Spaces of Distributed Deadlock Avoidance Protocols
Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications
More informationHow many times is the loop executed? middle = (left+right)/2; if (value == arr[middle]) return true;
This lectue Complexity o binay seach Answes to inomal execise Abstact data types Stacks ueues ADTs, Stacks, ueues 1 binayseach(int[] a, int value) { while (ight >= let) { { i (value < a[middle]) ight =
More informationYou Are Here! Review: Hazards. Agenda. Agenda. Review: Load / Branch Delay Slots 7/28/2011
CS 61C: Geat Ideas in Compute Achitectue (Machine Stuctues) Instuction Level Paallelism: Multiple Instuction Issue Guest Lectue: Justin Hsia Softwae Paallel Requests Assigned to compute e.g., Seach Katz
More informationThe Processor: Improving Performance Data Hazards
The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationHigh performance CUDA based CNN image processor
High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu
More informationA Non-blocking Directory Protocol for Large-Scale Multiprocessors. Technical Report
A Non-blocking Diectoy Potocol fo Lage-Scale Multipocessos Technical Repot Depatment of Compute Science and Engineeing Univesity of Minnesota 4-192 EECS Building 200 Union Steet SE Minneapolis, MN 55455-0159
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationThis lecture. Abstract Data Types (ADTs) The Stack ADT ( 4.2) Stacks. Stack Interface in Java. Exceptions. Abstract data types Stacks Queues
This lectue Abstact data types Stacks ueues Abstact Data Types (ADTs) An abstact data type (ADT) is an abstaction o a data stuctue An ADT speciies: Data stoed Opeations on the data Eo conditions associated
More informationMultidimensional Testing
Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of
More informationPipes, connections, channels and multiplexors
Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok
More informationAccelerating Storage with RDMA Max Gurtovoy Mellanox Technologies
Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability
More informationdc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc
- CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish
More informationCOEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines
1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep
More informationReader & ReaderT Monad (11A) Young Won Lim 8/20/18
Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationECE331: Hardware Organization and Design
ECE331: Hadwae Oganization and Design Lectue 16: Pipelining Adapted fom Compute Oganization and Design, Patteson & Hennessy, UCB Last time: single cycle data path op System clock affects pimaily the Pogam
More informationDEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson
DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:
More informationIntroduction To Pipelining. Chapter Pipelining1 1
Intoduction To Pipelining Chapte 6.1 - Pipelining1 1 Mooe s Law Mooe s Law says that the numbe of pocessos on a chip doubles about evey 18 months. Given the data on the following two slides, is this tue?
More informationComputer Architecture. Pipelining and Instruction Level Parallelism An Introduction. Outline of This Lecture
Compute Achitectue Pipelining and nstuction Level Paallelism An ntoduction Adapted fom COD2e by Hennessy & Patteson Slide 1 Outline of This Lectue ntoduction to the Concept of Pipelined Pocesso Pipelined
More informationThe Screen Control Language (SCl) in Version 6 SAS/Ar: and SAS/FSp Software Chris Bailey, Yao Chen SAS Institute Inc., Cary, NC
The Sceen Contol Language (SCl) in Vesion 6 SAS/A: and SAS/FSp Softwae Chis Bailey, Yao Chen SAS Institute Inc., Cay, NC Abstact Explanations and examples povide the basis of this tutoial that explains
More informationComputer Science 141 Computing Hardware
Compute Science 141 Computing Hadwae Fall 2006 Havad Univesity Instucto: Pof. David Books dbooks@eecs.havad.edu [MIPS Pipeline Slides adapted fom Dave Patteson s UCB CS152 slides and May Jane Iwin s CSE331/431
More informationGCC-AVR Inline Assembler Cookbook Version 1.2
GCC-AVR Inline Assemble Cookbook Vesion 1.2 About this Document The GNU C compile fo Atmel AVR isk pocessos offes, to embed assembly language code into C pogams. This cool featue may be used fo manually
More informationRBAC Tutorial. Brad Spengler Open Source Security, Inc. Locaweb
RBAC Tutoial Bad Spengle Open Souce Secuity, Inc. Locaweb - 2012 Oveview Why Access Contol? Goals Achitectue Implementation Lookup example Subject example Questions/Requests Why Access Contol? Access Contol
More informationGARBAGE COLLECTION METHODS. Hanan Samet
gc0 GARBAGE COLLECTION METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu
More informationAutomatically Testing Interacting Software Components
Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationModular Shape Analysis for View-Serializable Libraries
Moula Shape Analysis fo View-Seializable Libaies N. Rinetzky 1, A. Bouajjani 2, G. Ramalingam 3, M. Sagiv 1, an E. Yahav 4 1 Tel Aviv Univesity {maon,msagiv@tau.ac.il 2 LIAFA, CNRS & Univesity of Pais
More informationOPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO
OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal
More informationA Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces
A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu
More informationDYNAMIC STORAGE ALLOCATION. Hanan Samet
ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu
More informationCOSC 6385 Computer Architecture. - Pipelining
COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped
More informationUCB CS61C : Machine Structures
inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called
More informationOperating Systems (2INC0) 2017/18
Operating Systems (2INC0) 2017/18 Condition Synchronization (07) Dr. Courtesy of Prof. Dr. Johan Lukkien System Architecture and Networking Group Agenda Condition synchronization motivation condition variables
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationUser Specified non-bonded potentials in gromacs
Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of
More informationCAM I/O Scheduler. Netflix, Inc. AsiaBSDCon 2015
CAM I/O Schedule ワーナーラーシュ フーメー Netflix, Inc. AsiaBSDCon 2015 東京 2015 年 4 月 15 日 http://people.feebsd.og/~imp/asiabsdcon2015/iosched-slides.pdf http://people.feebsd.og/~imp/asiabsdcon2015/pape.pdf Outline
More informationAll lengths in meters. E = = 7800 kg/m 3
Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More information(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.
Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationLecture #22 Pipelining II, Cache I
inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html
More informationScheduling Parallel Programs by Work Stealing with Private Deques
Scheduling Paallel Pogams by Wok Stealing with Pivate Deques Umut Aca, Athu Chaguéaud, Mike Rainey To cite this vesion: Umut Aca, Athu Chaguéaud, Mike Rainey. Scheduling Paallel Pogams by Wok Stealing
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationLecture # 04. Image Enhancement in Spatial Domain
Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency
More information5 4 THE BERNOULLI EQUATION
185 CHATER 5 the suounding ai). The fictional wok tem w fiction is often expessed as e loss to epesent the loss (convesion) of mechanical into themal. Fo the idealied case of fictionless motion, the last
More informationDYNAMIC STORAGE ALLOCATION. Hanan Samet
ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu
More informationCold Drawn Tube. Problem:
Cold Dawn Tube Poblem: An AISI 1 cold-dawn steel tube has an ID of 1.5 in and an OD of 1.75 in. What maximum extenal pessue can this tube take if the lagest pincipal nomal stess is not to exceed 8 pecent
More informationCENG 3420 Computer Organization and Design. Lecture 07: MIPS Processor - II. Bei Yu
CENG 3420 Compute Oganization and Design Lectue 07: MIPS Pocesso - II Bei Yu CEG3420 L07.1 Sping 2016 Review: Instuction Citical Paths q Calculate cycle time assuming negligible delays (fo muxes, contol
More informationQuery Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented
Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationModeling a shared medium access node with QoS distinction
Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:
More informationOn the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes
On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationUser Visible Registers. CPU Structure and Function Ch 11. General CPU Organization (4) Control and Status Registers (5) Register Organisation (4)
PU Stuctue and Function h Geneal Oganisation Registes Instuction ycle Pipelining anch Pediction Inteupts Use Visible Registes Vaies fom one achitectue to anothe Geneal pupose egiste (GPR) ata, addess,
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationWhat is a System:- Characteristics of a system:-
Unit 1 st :- What is a System:- A system is an odely gouping of intedependent components linked togethe accoding to a plan to achieve a specific objective. The study of system concepts has thee basic implications:
More informationarxiv: v1 [cs.lo] 3 Dec 2018
A high-level opeational semantics fo hadwae weak memoy models axiv:1812.00996v1 [cs.lo] 3 Dec 2018 Abstact Robet J. Colvin School of Electical Engineeing and Infomation Technology The Univesity of Queensland
More informationCMSC 330: Organization of Programming Languages. Threads Classic Concurrency Problems
: Organization of Programming Languages Threads Classic Concurrency Problems The Dining Philosophers Problem Philosophers either eat or think They must have two forks to eat Can only use forks on either
More informationAdministrivia. CMSC 411 Computer Systems Architecture Lecture 5. Data Hazard Even with Forwarding Figure A.9, Page A-20
Administivia CMSC 411 Compute Systems Achitectue Lectue 5 Basic Pipelining (cont.) Alan Sussman als@cs.umd.edu as@csu dedu Homewok poblems fo Unit 1 due today Homewok poblems fo Unit 3 posted soon CMSC
More informationDEVELOPMENT OF NEW VARIANT MJ2 RSA DIGITAL SIGNATURE SCHEME WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS
I.J.E.M.S., VOL. 1(1): 18-25 ISSN 2229-600X DEVELOPMENT OF NEW VARIANT MJ2 RSA DIGITAL SIGNATURE SCHEME WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS A. Ravi Pasad, M. Padmavathamma Depatment of Compute Science,
More informationCMCS Mohamed Younis CMCS 611, Advanced Computer Architecture 1
CMCS 611-101 Advanced Compute Achitectue Lectue 6 Intoduction to Pipelining Septembe 23, 2009 www.csee.umbc.edu/~younis/cmsc611/cmsc611.htm Mohamed Younis CMCS 611, Advanced Compute Achitectue 1 Pevious
More informationCS 2461: Computer Architecture 1 Program performance and High Performance Processors
Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks
More informationLecture 27: Voronoi Diagrams
We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the
More informationGetting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3
A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10
More informationDynamic Processor Scheduling with Client Resources for Fast Multi-resolution WWW Image Browsing
Dynamic Pocesso Scheduling with Resouces fo Fast Multi-esolution WWW Image Bowsing Daniel Andesen, Tao Yang, David Watson, and Athanassios Poulakidas Depatment of Compute Science Univesity of Califonia
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More informationCIS Operating Systems Application of Semaphores. Professor Qiang Zeng Spring 2018
CIS 3207 - Operating Systems Application of Semaphores Professor Qiang Zeng Spring 2018 Big picture of synchronization primitives Busy-waiting Software solutions (Dekker, Bakery, etc.) Hardware-assisted
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More information# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved
A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)
More informationCMSC 330: Organization of Programming Languages. The Dining Philosophers Problem
CMSC 330: Organization of Programming Languages Threads Classic Concurrency Problems The Dining Philosophers Problem Philosophers either eat or think They must have two forks to eat Can only use forks
More informationIS-IS Protocol Hardware Implementation for VPN Solutions
IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationCS 61C: Great Ideas in Computer Architecture Instruc(on Level Parallelism: Mul(ple Instruc(on Issue
CS 61C: Geat Ideas in Compute Achitectue Instuc(on Level Paallelism: Mul(ple Instuc(on Issue Instuctos: Kste Asanovic, Randy H. Katz hbp://inst.eecs.bekeley.edu/~cs61c/fa12 1 Paallel Requests Assigned
More informationFACE VECTORS OF FLAG COMPLEXES
FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.
More informationTime allowed : 3 hours Maximum Marks: 70
SAMPLE PAPER-2015 CLASS-XII COMPUTER SCIENCE(C++) Time allowed : 3 hous Maximum Maks: 70 Geneal Instuction 1. Please check that this question pape contains 7 questions. 2. Please wite down seial numbe
More informationImproved Utility-based Congestion Control for Delay-Constrained Communication
Impoved Utility-based Congestion Contol fo Delay-Constained Communication Stefano D Aonco, Laua Toni, Segio Mena, Xiaoqing Zhu, and Pascal Fossad axiv:5.2799v3 [cs.ni] 2 Jan 27 Abstact Due to the pesence
More informationDecentralized Optimal Power Pricing: S. Lumetta. L. Murphy X. Li. D. Culler I. Khalil. 571 Evans Hall. University of California at Berkeley
Decentalized Optimal Powe icing: The Development ofapaallel ogam æy S. Lumetta L. Muphy. Li D. Culle I. Khalil Depatment of Compute Science 571 Evans Hall Univesity of Califonia at Bekeley Bekeley, CA
More information(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)
1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,
More informationOn Adaptive Bandwidth Sharing with Rate Guarantees
On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationData mining based automated reverse engineering and defect discovery
Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationSecure Collaboration in Mediator-Free Environments
Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationIn order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions.
In ode to lean which questions have been answeed coectly: 1. Pint these pages. 2. Answe the questions. 3. Send this assessment with the answes via: a. FAX to (212) 967-3498. O b. Mail the answes to the
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More information