计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法. 授课老师 : 王浩宇
|
|
- Geraldine Hubbard
- 5 years ago
- Views:
Transcription
1 计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法 授课老师 : 王浩宇 haoyuwang@bupt.edu.cn 1
2 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Summary 2
3 Everything is bits Each bit is 0 or 1 By encoding/interpreting sets of bits in various ways Computers determine what to do (instructions) and represent and manipulate numbers, sets, strings, etc Why bits? Electronic Implementation Easy to store with bitable elements Reliably transmitted on noisy and inaccurate wires 1.1V 0.9V V 0.0V 3
4 For example, can count in binary Base 2 Number Representation Represent as Represent as [0011] 2 Represent X 10 4 as X
5 Encoding Byte Values Byte = 8 bits Binary to Decimal: 010 to Hexadecimal 0016 to FF16 Base 16 number representation Use characters 0 to 9 and A to F Write FA1D37B16 in C as 0xFA1D37B 0xfa1d37b A B C D E F
6 Example Data Representations C Data Type Typical 32-bit Typical 64-bit x86-64 char short int long float double long double 10/16 pointer
7 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Addition, negation, multiplication, shifting Summary Representations in memory, pointers, strings 7
8 Boolean Algebra Developed by George Boole in 19th Century Algebraic representation of logic And Encode True as 1 and False as 0 A&B = 1 when both A=1 and B=1 Or A B = 1 when either A=1 or B=1 Not ~A = 1 when A=0 Exclusive-Or (Xor) A^B = 1 when either A=1 or B=1, but not both 8
9 General Boolean Algebras Operate on Bit Vectors Operations applied bitwise & ^ ~ All of the Properties of Boolean Algebra Apply 9
10 Bit-Level Operations in C Operations &,, ~, ^ Available in C Apply to any integral data type long, int, short, char, unsigned View arguments as bit vectors Arguments applied bit-wise 10
11 Contrast: Logic Operations in C Contrast to Logical Operators &&,,! View 0 as False Anything nonzero as True Always return 0 or 1 Early termination 11
12 Shift Operations Left Shift: x << y Shift bit-vector x left y positions Throw away extra bits on left Fill with 0 s on right Right Shift: x >> y Shift bit-vector x right y positions Throw away extra bits on right Logical shift Fill with 0 s on left Arithmetic shift Replicate most significant bit on left Undefined Behavior Shift amount < 0 or word size Argument x << 3 Log. >> 2 Arith. >> 2 Argument x << 3 Log. >> 2 Arith. >>
13 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Addition, negation, multiplication, shifting Summary Representations in memory, pointers, strings Summary 13
14 Typical ranges for integral data types 14
15 Encoding Integers - Unsigned w 1 B2U(X) x i 2 i i 0 B2U w :{0,1} w -> {0,, 2 w -1} 对于任意整数 x, 当 0 =< x < 2 w 的时候, 存在唯一的二进制序列与其对应 反过来也是一样的, 对于任意一个 w 位的二进制序列, 都存在唯一一个整数 x 满足 0 =< x < 2 w, 与这个二进制序列对应 U2B(x) = B2U -1 (x) 15
16 Encoding Integers - Two s Complement( 补码 ) w 2 B2T(X) x w 1 2 w 1 x i 2 i i 0 Sign Bit TMin = 2 w TMax = 2 w Minus B2T w : {0,1} w -> {-2 w-1,, 2 w-1-1} 对于任意整数 x, 当 -2 w-1 =< x < 2 w-1 的时候, 存在唯一的二进制序列与其对应 反过来, 对于任意一个 w 位的二进制序列, 都存在唯一一个整数 x 满足 -2 w-1 =< x < 2 w-1, 与这个二进制序列对应 T2B(x) = B2T -1 (x) 16
17 Two-complement Encoding Example (Cont.) x = 15213: y = : Weight Sum
18 Values for Different Word Sizes W UMax ,535 4,294,967,295 18,446,744,073,709,551,615 TMax ,767 2,147,483,647 9,223,372,036,854,775,807 TMin ,768-2,147,483,648-9,223,372,036,854,775,808 Observations TMin = TMax + 1 Asymmetric range UMax = 2 * TMax + 1 C Programming #include <limits.h> Declares constants, e.g., ULONG_MAX LONG_MAX LONG_MIN Values platform specific 18
19 有符号数为什么使用补码表示? 原码 (Sign-Magnitude) 最高有效位是符号位, 用来确定剩下的位应该是正权还是负权 比如如果是 8 位二进制 : 0 有两种表示法 [+0] 原 = 0000 ; [-0] 原 = 1000 数据表示范围 整数 : -2 n <X<2 n ( 若数值位 n=3 即 :-8<X<8) 优点 与真值对应关系简单 缺点 参与运算复杂, 需要将数值位与符号位分开考虑 19
20 补码的意义 要将指向 5 点的时钟调整到 3 点整, 应如何处理? 5-2=3 5+10=3(12 自动丢失 12 就是模 ) 20 20
21 补码的意义 继续推导 : 5-2=5+10(MOD 12) 5+(-2)=5+10(MOD 12) -2=10(MOD 12) 结论 : 在模为 12 的情况下,-2 的补码就是 10 一个负数用其补码代替, 同样可以得到正确的运算结果 21 21
22 补码的意义 进一步结论 : 在计算机中, 机器能表示的数据位数是固定的, 其运算都是有模运算 若是 n 位整数 ( 包含符号位 ), 则其模为 2 n ; 若是小数, 则其模为 2 若运算结果超出了计算机所能表示的数值范围, 则只保留它的小于模的低 n-1 位的数值, 超过 n-1 位的高位部分就自动舍弃了 22 22
23 由原码求补码 由原码求补码的简便原则 ( 负数 ) 除符号位以外, 其余各位按位取反, 末位加 1; 从最低位开始, 遇到的第一个 1 以前的各位保持不变, 之后各位取反 例 :[X] 原 = [X] 补 =
24 补码的表示 24
25 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Addition, negation, multiplication, shifting Summary Representations in memory, pointers, strings 25
26 Mapping Between Signed & Unsigned Two s Complement x T2B T2U X B2U Unsigned ux Maintain Same Bit Pattern Unsigned ux U2B U2T X B2T Two s Complement x Maintain Same Bit Pattern Mappings between unsigned and two s complement numbers: Keep bit representations and reinterpret 26
27 Mapping Signed Unsigned Bits Signed Unsigned T2U U2T
28 Mapping Signed Unsigned Bits Signed Unsigned = /
29 Relation between Signed & Unsigned Two s Complement x T2B T2U X B2U Unsigned ux Maintain Same Bit Pattern ux x w Large negative weight becomes Large positive weight 29
30 Relation between Signed & Unsigned WHY? 30
31 Relation between Signed & Unsigned B2U w (x) - B2T w (x) = x w-1 2 w-1 - (-x w-1 2 w-1 ) = x w-1 2 w B2U w (x) = x w-1 2 w + B2T w (x) 令 x 为 T2B w (x), B2U w (T2B w (x)) = x w-1 2 w + B2T w (T2B w (x)) = x w-1 2 w + x T2U w (x) = x w-1 2 w + x 31
32 Conversion Visualized 2 s Comp. Unsigned Ordering Inversion Negative Big Positive TMax UMax UMax 1 TMax + 1 TMax Unsigned Range 2 s Complement Range TMin 32
33 Relation between Signed & Unsigned U2T w = B2T w (U2B w (x)) WHY? 33
34 Relation between Signed & Unsigned U2T w = B2T w (U2B w (x)) B2U w (u) - B2T w (u) = u w-1 2 w-1 - (-u w-1 2 w-1 ) = u w-1 2 w B2T w (u) = B2U w (u) - u w-1 2 w 令 u 为 U2B w (u), B2T w (U2B w (u)) = B2U w (U2B w (u)) - u w-1 2 w = u - u w-1 2 w U2T w (u) = u - u w-1 2 w 34
35 Relation between Signed & Unsigned 35
36 Signed vs. Unsigned in C 36
37 Signed vs. Unsigned in C Constants By default are considered to be signed integers Unsigned if have U as suffix 0U, U Casting Explicit casting between signed & unsigned same as U2T and T2U int tx, ty; unsigned ux, uy; tx = (int) ux; uy = (unsigned) ty; Implicit casting also occurs via assignments and procedure calls tx = ux; uy = ty; 37
38 Casting Surprises Expression Evaluation If there is a mix of unsigned and signed in single expression, signed values implicitly cast to unsigned Including comparison operations <, >, ==, <=, >= Examples for W = 32: TMIN = -2,147,483,648, TMAX = 2,147,483,647 Constant 1 Constant 2 Relation Evaluation 0 0 0U == unsigned < signed U > unsigned > signed U U < unsigned > signed (unsigned) > unsigned U < unsigned (int) U > signed 38
39 Summary Casting Signed Unsigned: Basic Rules Bit pattern is maintained But reinterpreted Can have unexpected effects: adding or subtracting 2 w Expression containing signed and unsigned int int is cast to unsigned!! 39
40 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Addition, negation, multiplication, shifting Summary Representations in memory, pointers, strings 40
41 Sign Extension Task: Given w-bit signed integer x Convert it to w+k-bit integer with same value Rule: Make k copies of sign bit: X = x w 1,, x w 1, x w 1, x w 2,, x 0 k copies of MSB X w X k w 41
42 Sign Extension WHY? X = x w 1,, x w 1, x w 1, x w 2,, x 0 k copies of MSB 42
43 Sign Extension Example short int x = 15213; int ix = (int) x; short int y = ; int iy = (int) y; Decimal Hex Binary x B 6D ix B 6D y C iy FF FF C Converting from smaller to larger integer data type C automatically performs sign extension 43
44 Truncation 44
45 Truncation: Simple Example 45
46 Summary: Expanding, Truncating: Basic Rules Expanding (e.g., short int to int) Unsigned: zeros added Signed: sign extension Both yield expected result Truncating (e.g., unsigned to unsigned short) Unsigned/signed: bits are truncated Result reinterpreted Unsigned: mod operation Signed: similar to mod For small numbers yields expected behavior 46
47 练习题 (1) 47
48 练习题 (2) 48
Carnegie Mellon. Bryant and O Hallaron, Computer Systems: A Programmer s Perspective, Third Edition
Carnegie Mellon 1 Bits, Bytes and Integers Part 1 15-213/18-213/15-513: Introduction to Computer Systems 2 nd Lecture, Aug. 31, 2017 Today s Instructor: Randy Bryant 2 Announcements Recitations are on
More informationBits, Bytes and Integers Part 1
Bits, Bytes and Integers Part 1 15-213/18-213/15-513: Introduction to Computer Systems 2 nd Lecture, Jan. 18, 2018 Instructors: Franz Franchetti Seth Copen Goldstein Brian Railing 1 Announcements Waitlist
More informationPrevious on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet
ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet 前 4 个字节都是一样的 0 8 16 31 类型代码检验和 ( 这 4 个字节取决于 ICMP 报文的类型 ) ICMP 的数据部分 ( 长度取决于类型 ) ICMP 报文 首部 数据部分 IP 数据报 ICMP: Internet Control Message
More informationBits, Bytes, and Integers
Bits, Bytes, and Integers with contributions from Dr. Bin Ren, College of William & Mary 1 Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned
More informationBits, Bytes, and Integers
Bits, Bytes, and Integers B&O Readings: 2.1-2.3 CSE 361: Introduc=on to Systems So@ware Instructor: I- Ting Angelina Le e Note: these slides were originally created by Markus Püschel at Carnegie Mellon
More informationCommand Dictionary CUSTOM
命令模式 CUSTOM [(filename)] [parameters] Executes a "custom-designed" command which has been provided by special programming using the GHS Programming Interface. 通过 GHS 程序接口, 执行一个 用户设计 的命令, 该命令由其他特殊程序提供 参数说明
More information实验三十三 DEIGRP 的配置 一 实验目的 二 应用环境 三 实验设备 四 实验拓扑 五 实验要求 六 实验步骤 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程
实验三十三 DEIGRP 的配置 一 实验目的 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程 二 应用环境 由于 RIP 协议的诸多问题, 神州数码开发了与 EIGRP 完全兼容的 DEIGRP, 支持变长子网 掩码 路由选择参考更多因素, 如带宽等等 三 实验设备 1. DCR-1751 三台 2. CR-V35FC 一条 3. CR-V35MT 一条 四 实验拓扑
More informationCommand Dictionary -- DAMSTAB
命令模式 DAMSTAB [(divlist)] /SDIC /SDIHC /SDIHR /SDI194C[SP] /SDI194P[SP] /SDI216C[SP] /SDI216P[SP] /SDIPtype [/L:l1,l2] [/B:b1[,b2]] [/N:n1,n2] [/STOP[AT][:n]] [/DLL:draftloadline] [/LIMITHEEL:angle] [/WRITE:runfile]
More informationICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容
Content 内容 A1 A2 A3 A4 A5 A6 A7 A8 A9 Login via ICTI CARE Website 通过 ICTI 关爱网站登录 Completing the Application Form 填写申请表 Application Form Created 创建的申请表 Receive Acknowledgement Email 接收确认电子邮件 Receive User
More informationTriangle - Delaunay Triangulator
Triangle - Delaunay Triangulator eryar@163.com Abstract. Triangle is a 2D quality mesh generator and Delaunay triangulator. Triangle was created as part of the Quake project in the school of Computer Science
More informationCS140 Lecture 08: Data Representation: Bits and Ints. John Magee 13 February 2017
CS140 Lecture 08: Data Representation: Bits and Ints John Magee 13 February 2017 Material From Computer Systems: A Programmer's Perspective, 3/E (CS:APP3e) Randal E. Bryant and David R. O'Hallaron, Carnegie
More information三 依赖注入 (dependency injection) 的学习
三 依赖注入 (dependency injection) 的学习 EJB 3.0, 提供了一个简单的和优雅的方法来解藕服务对象和资源 使用 @EJB 注释, 可以将 EJB 存根对象注入到任何 EJB 3.0 容器管理的 POJO 中 如果注释用在一个属性变量上, 容器将会在它被第一次访问之前赋值给它 在 Jboss 下一版本中 @EJB 注释从 javax.annotation 包移到了 javax.ejb
More informationLecture 5-6: Bits, Bytes, and Integers
CSCI-UA.0201-003 Computer Systems Organization Lecture 5-6: Bits, Bytes, and Integers Mohamed Zahran (aka Z) mzahran@cs.nyu.edu http://www.mzahran.com Slides adapted from: Jinyang Li Bryant and O Hallaron
More informationComputer Systems CEN591(502) Fall 2011
Computer Systems CEN591(502) Fall 2011 Sandeep K. S. Gupta Arizona State University 4 th lecture Data representation in computer systems (Slides adapted from CSAPP book) Announcements Programming assignment
More informationLogitech G302 Daedalus Prime Setup Guide 设置指南
Logitech G302 Daedalus Prime Setup Guide 设置指南 Logitech G302 Daedalus Prime Contents / 目录 English................. 3 简体中文................. 6 2 Logitech G302 Daedalus Prime 1 On 2 USB Your Daedalus Prime
More informationOpenCascade 的曲面.
在 OpenSceneGraph 中绘制 OpenCascade 的曲面 eryar@163.com 摘要 Abstract : 本文对 OpenCascade 中的几何曲面数据进行简要说明, 并结合 OpenSceneGraph 将这些曲面显示 关键字 Key Words:OpenCascade OpenSceneGraph Geometry Surface NURBS 一 引言 Introduction
More informationThe relational Algebra & calculus cont. Reference : UC Berkeley
The relational Algebra & calculus cont Reference : UC Berkeley Formal Relational Query Languages Two mathematical Query Languages form the basis for real languages (e.g. SQL), and for implementation: ❶
More informationRepresenting and Manipulating Integers Part I
Representing and Manipulating Integers Part I Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Introduction The advent of the digital age Analog
More informationAvalonMiner Raspberry Pi Configuration Guide. AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide
AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide 简介 我们通过使用烧录有 AvalonMiner 设备管理程序的树莓派作为控制器 使 用户能够通过控制器中管理程序的图形界面 来同时对多台 AvalonMiner 6.0 或 AvalonMiner 6.01 进行管理和调试 本教程将简要的说明 如何把 AvalonMiner
More informationChapter 1 (Part 2) Introduction to Operating System
Chapter 1 (Part 2) Introduction to Operating System 张竞慧办公室 : 计算机楼 366 室电邮 :jhzhang@seu.edu.cn 主页 :http://cse.seu.edu.cn/personalpage/zjh/ 电话 :025-52091017 1.1 Computer System Components 1. Hardware provides
More informationChapter 11 SHANDONG UNIVERSITY 1
Chapter 11 File System Implementation ti SHANDONG UNIVERSITY 1 Contents File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and
More information如何查看 Cache Engine 缓存中有哪些网站 /URL
如何查看 Cache Engine 缓存中有哪些网站 /URL 目录 简介 硬件与软件版本 处理日志 验证配置 相关信息 简介 本文解释如何设置处理日志记录什么网站 /URL 在 Cache Engine 被缓存 硬件与软件版本 使用这些硬件和软件版本, 此配置开发并且测试了 : Hardware:Cisco 缓存引擎 500 系列和 73xx 软件 :Cisco Cache 软件版本 2.3.0
More informationPCU50 的整盘备份. 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 光标条停在 SINUMERIK 下方的空白处, 如下图, 按回车键 PCU50 会进入到服务画面, 如下图
PCU50 的整盘备份 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 OS Loader V4.00 Please select the operating system to start: SINUMERIK Use and to move the highlight to your choice. Press Enter
More informationBITS, BYTES, AND INTEGERS
BITS, BYTES, AND INTEGERS CS 045 Computer Organization and Architecture Prof. Donald J. Patterson Adapted from Bryant and O Hallaron, Computer Systems: A Programmer s Perspective, Third Edition ORIGINS
More informationIntegers Sep 3, 2002
15-213 The course that gives CMU its Zip! Topics Numeric Encodings Unsigned & Two s complement Programming Implications C promotion rules Basic operations Integers Sep 3, 2002 Addition, negation, multiplication
More information<properties> <jdk.version>1.8</jdk.version> <project.build.sourceencoding>utf-8</project.build.sourceencoding> </properties>
SpringBoot 的基本操作 一 基本概念在 spring 没有出现的时候, 我们更多的是使用的 Spring,SpringMVC,Mybatis 等开发框架, 但是要将这些框架整合到 web 项目中需要做大量的配置,applicationContext.xml 以及 servlet- MVC.xml 文件等等, 但是这些文件还还不够, 还需要配置 web.xml 文件进行一系列的配置 以上操作是比较麻烦的,
More informationIntegers. Today. Next time. ! Numeric Encodings! Programming Implications! Basic operations. ! Floats
Integers Today! Numeric Encodings! Programming Implications! Basic operations! Programming Implications Next time! Floats Fabián E. Bustamante, 2007 Integers in C! C supports several integral data types
More informationChapter 7: Deadlocks. Operating System Concepts 9 th Edition
Chapter 7: Deadlocks Silberschatz, Galvin and Gagne 2013 Chapter Objectives To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks To present a number
More informationSystems 1. Integers. Unsigned & Twoʼs complement. Addition, negation, multiplication
Systems 1 Integers Topics Numeric Encodings Unsigned & Twoʼs complement Programming Implications C promotion rules Basic operations Addition, negation, multiplication Programming Implications Consequences
More informationUnderstanding IO patterns of SSDs
固态硬盘 I/O 特性测试 周大 众所周知, 固态硬盘是一种由闪存作为存储介质的数据库存储设备 由于闪存和磁盘之间物理特性的巨大差异, 现有的各种软件系统无法直接使用闪存芯片 为了提供对现有软件系统的支持, 往往在闪存之上添加一个闪存转换层来实现此目的 固态硬盘就是在闪存上附加了闪存转换层从而提供和磁盘相同的访问接口的存储设备 一方面, 闪存本身具有独特的访问特性 另外一方面, 闪存转换层内置大量的算法来实现闪存和磁盘访问接口之间的转换
More informationIntegers. Dr. Steve Goddard Giving credit where credit is due
CSCE 23J Computer Organization Integers Dr. Steve Goddard goddard@cse.unl.edu http://cse.unl.edu/~goddard/courses/csce23j Giving credit where credit is due Most of slides for this lecture are based on
More informationJin-Soo Kim Systems Software & Architecture Lab. Seoul National University. Integers. Spring 2019
Jin-Soo Kim (jinsoo.kim@snu.ac.kr) Systems Software & Architecture Lab. Seoul National University Integers Spring 2019 4190.308: Computer Architecture Spring 2019 Jin-Soo Kim (jinsoo.kim@snu.ac.kr) 2 A
More informationSystems Programming and Computer Architecture ( )
Systems Group Department of Computer Science ETH Zürich Systems Programming and Computer Architecture (252-0061-00) Timothy Roscoe Herbstsemester 2016 1 3: Integers in C Computer Architecture and Systems
More informationnbns-list netbios-type network next-server option reset dhcp server conflict 1-34
目录 1 DHCP 1-1 1.1 DHCP 公共命令 1-1 1.1.1 dhcp dscp 1-1 1.1.2 dhcp enable 1-1 1.1.3 dhcp select 1-2 1.2 DHCP 服务器配置命令 1-3 1.2.1 address range 1-3 1.2.2 bims-server 1-4 1.2.3 bootfile-name 1-5 1.2.4 class 1-6
More informationBits, Bytes, and Integers August 26, 2009
15-213 The Class That Gives CMU Its Zip! Bits, Bytes, and Integers August 26, 2009 Topics Representing information as bits Bit-level manipulations Boolean algebra Expressing in C Representations of Integers
More informationSkill-building Courses Business Analysis Lesson 3 Problem Solving
Skill-building Courses Business Analysis Lesson 3 Problem Solving Review Software Development Life Cycle/Agile/Scrum Learn best practices for collecting and cleaning data in Excel to ensure accurate analysis
More information漂亮的测试. By Alberto Savoia 代码之美 第七章 史际帆
漂亮的测试 代码之美 第七章 By Alberto Savoia 史际帆 作者简介 :Alberto Savoia Alberto Savoia is co-founder and CTO of Agitar Software. Before Agitar, he was Senior Director of Engineering at Google; prior to that he was the
More informationChapter2 Instruction Sets
Coputer Architecture Chapter Instruction Sets Zheng Qinghua CS Departent of XJTU 05.3 Introduction to Instruction Set Architecture ISA is the structure of a coputer that a achine language prograer ust
More informationThe Design of Everyday Things
The Design of Everyday Things Byron Li Copyright 2009 Trend Micro Inc. It's Not Your Fault Donald A. Norman & His Book Classification 03/17/11 3 Norman Door Why Learn to think from different aspects Contribute
More information2. Introduction to Digital Media Format
Digital Asset Management 数字媒体资源管理 2. Introduction to Digital Media Format 任课 老师 : 张宏鑫 2014-09-30 Outline Image format and coding methods Audio format and coding methods Video format and coding methods
More informationRepresenta7on of integers: unsigned and signed Conversion, cas7ng Expanding, trunca7ng Addi7on, nega7on, mul7plica7on, shiaing
Today s Topics Representa7on of integers: unsigned and signed Conversion, cas7ng Expanding, trunca7ng Addi7on, nega7on, mul7plica7on, shiaing CSE351 Inaugural Edi7on Spring 2010 1 Encoding Integers C short
More informationCS 33. Data Representation, Part 2. CS33 Intro to Computer Systems VII 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.
CS 33 Data Representation, Part 2 CS33 Intro to Computer Systems VII 1 Copyright 2018 Thomas W. Doeppner. All rights reserved. Signed Integers Two s complement b w-1 = 0 Þ non-negative number value = b
More informationSupplementary Materials on Semaphores
Supplementary Materials on Semaphores Contents Semaphores Basic synchronization patterns Producers-Consumers (Bounded Buffer) Readers-Writers The Dining Philosophers More Exercises for You Dijkstra Edsger
More informationMicrosoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司
Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 RemoteFX 中新的 USB 重定向特性 在 RDS 中所有设备重定向机制 VDI 部署场景讨论 : 瘦客户端和胖客户端 (Thin&Rich). 用户体验 : 演示使用新的 USB 重定向功能 81% 4 本地和远程的一致的体验 (Close
More informationTopics of this Slideset. CS429: Computer Organization and Architecture. Encoding Integers: Unsigned. C Puzzles. Integers
Topics of this Slideset CS429: Computer Organization and Architecture Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: July 5, 2018 at 11:55 Numeric Encodings:
More informationCS429: Computer Organization and Architecture
CS429: Computer Organization and Architecture Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: July 5, 2018 at 11:55 CS429 Slideset 3: 1 Topics of this Slideset
More informationIntroduction to Computer Science
Introduction to Computer Science 郝建业副教授 软件学院 http://www.escience.cn/people/jianye/index.html Lecturer Jianye HAO ( 郝建业 ) Email: jianye.hao@tju.edu.cn Tutor: Li Shuxin ( 李姝昕 ) Email: 957005030@qq.com Outline
More informationPackaging 10Apr2012 Rev V Specification MBXL HSG 1. PURPOSE 目的 2. APPLICABLE PRODUCT 适用范围
107-68703 Packaging 10Apr2012 Rev V Specification MBXL HSG 1. PURPOSE 目的 Define the packaging specifiction and packaging method of MBXL HSG. 订定 MBXL HSG 产品之包装规格及包装方式 2. APPLICABLE PRODUCT 适用范围 PKG TYPE
More information密级 : 博士学位论文. 论文题目基于 ScratchPad Memory 的嵌入式系统优化研究
密级 : 博士学位论文 论文题目基于 ScratchPad Memory 的嵌入式系统优化研究 作者姓名指导教师学科 ( 专业 ) 所在学院提交日期 胡威陈天洲教授计算机科学与技术计算机学院二零零八年三月 A Dissertation Submitted to Zhejiang University for the Degree of Doctor of Philosophy TITLE: The
More informationICS Instructor: Aleksandar Kuzmanovic TA: Ionut Trestian Recitation 2
ICS 2008 Instructor: Aleksandar Kuzmanovic TA: Ionut Trestian Recitation 2 Data Representations Sizes of C Objects (in Bytes) C Data Type Compaq Alpha Typical 32-bit Intel IA32 int 4 4 4 long int 8 4 4
More informationLecture 3 for pipelining
Lecture 3 for pipelining The control hazard How to solve the control hazard Pipelining Hazards Taxonomy of Hazards Structural hazards These are conflicts over hardware resources. OK, maybe add extra hardware
More informationTechnology: Anti-social Networking 科技 : 反社交网络
Technology: Anti-social Networking 科技 : 反社交网络 1 Technology: Anti-social Networking 科技 : 反社交网络 The Growth of Online Communities 社交网络使用的增长 Read the text below and do the activity that follows. 阅读下面的短文, 然后完成练习
More informationBits, Bytes and Integers
Bits, Bytes and Integers Computer Systems Organization (Spring 2016) CSCI-UA 201, Section 2 Instructor: Joanna Klukowska Slides adapted from Randal E. Bryant and David R. O Hallaron (CMU) Mohamed Zahran
More informationRepresenting and Manipulating Integers. Jo, Heeseung
Representing and Manipulating Integers Jo, Heeseung Unsigned Integers Encoding unsigned integers B [ bw 1, bw 2,..., b0 ] x = 0000 0111 1101 0011 2 D( B) w 1 b i i 0 2 i D(x) = 2 10 + 2 9 + 2 8 + 2 7 +
More informationArithmetic and Bitwise Operations on Binary Data
Arithmetic and Bitwise Operations on Binary Data CSCI 224 / ECE 317: Computer Architecture Instructor: Prof. Jason Fritts Slides adapted from Bryant & O Hallaron s slides 1 Boolean Algebra Developed by
More informationBut first, encode deck of cards. Integer Representation. Two possible representations. Two better representations WELLESLEY CS 240 9/8/15
Integer Representation Representation of integers: unsigned and signed Sign extension Arithmetic and shifting Casting But first, encode deck of cards. cards in suits How do we encode suits, face cards?
More informationSoftware Engineering. Zheng Li( 李征 ) Jing Wan( 万静 )
Software Engineering Zheng Li( 李征 ) Jing Wan( 万静 ) 作业 Automatically test generation 1. 编写一个三角形程序, 任意输入三个整数, 判断三个整形边长能否构成三角形, 如果是三角形, 则判断它是一般三角形 等腰三角形或等边三角形, 并输出三角形的类型 2. 画出程序的 CFG, 计算圈复杂度 3. 设计一组测试用例满足测试准则
More informationTBarCode OCX Microsoft ActiveX compliant Barcode Control
TBarCode OCX Microsoft ActiveX compliant Barcode Control Version 9.0 Tutorial 19 December 2008 TEC-IT Datenverarbeitung GmbH W agnerstrasse 6 A-4400 Steyr, Austria t ++43 (0)7252 72720 f ++43 (0)7252 72720
More informationCompile times - assert macros
Compile times - assert macros 53 doctest 1.0 - CHECK(a == b); do { Result res; bool threw = false; try { res = ExpressionDecomposer() success) {
More informationWindows Batch VS Linux Shell. Jason Zhu
Windows Batch VS Linux Shell Jason Zhu Agenda System and Shell Windows batch and Linux Shell Dos and Linux Shell internal Commands Windows and Linux external commands Batch and Shell variable and special
More information学习沉淀成长分享 EIGRP. 红茶三杯 ( 朱 SIR) 微博 : Latest update:
学习沉淀成长分享 EIGRP 红茶三杯 ( 朱 SIR) 微博 :http://t.sina.com/vinsoney Latest update: 2012-06-01 课程目标 EIGRP 协议基础 EIGRP 基础配置 EIGRP 协议基础 EIGRP 的协议特点 EIGRP 的三张表 EIGRP 数据包 初始路由发现 EIGRP metric DUAL 算法 EIGRP 的协议特点 CISCO
More informationApache Kafka 源码编译 Spark 大数据博客 -
经过近一个月时间, 终于差不多将之前在 Flume 0.9.4 上面编写的 source sink 等插件迁移到 Flume-ng 1.5.0, 包括了将 Flume 0.9.4 上面的 TailSou rce TailDirSource 等插件的迁移 ( 当然, 我们加入了许多新的功能, 比如故障恢复 日志的断点续传 按块发送日志以及每个一定的时间轮询发送日志而不是等一个日志发送完才发送另外一个日志
More informationBi-monthly report. Tianyi Luo
Bi-monthly report Tianyi Luo 1 Work done in this week Write a crawler plus based on keywords (Support Chinese and English) Modify a Sina weibo crawler (340M/day) Offline learning to rank module is completed
More informationdisplay portal server display portal user display portal user count display portal web-server
目录 1 Portal 1-1 1.1 Portal 配置命令 1-1 1.1.1 aaa-fail nobinding enable 1-1 1.1.2 aging-time 1-1 1.1.3 app-id (Facebook authentication server view) 1-2 1.1.4 app-id (QQ authentication server view) 1-3 1.1.5
More informationOriented Scene Text Detection Revisited. Xiang Bai Huazhong University of Science and Technology
The Invited Talk in Vision and Learning Seminar (VALSE) Xiamen, 2017-4-22 Oriented Scene Text Detection Revisited Xiang Bai Huazhong University of Science and Technology xbai@hust.edu.cn http://mclab.eic.hust.edu.cn/~xbai/
More informationNetScreen 概念与范例. ScreenOS 参考指南 第 7 卷 : 虚拟系统. ScreenOS 编号 SC 修订本 E
NetScreen 概念与范例 ScreenOS 参考指南 第 7 卷 : 虚拟系统 ScreenOS 5.0.0 编号 093-0930-000-SC 修订本 E Copyright Notice Copyright 2004 NetScreen Technologies, Inc. All rights reserved. NetScreen, NetScreen Technologies, GigaScreen,
More information<?xml version="1.0"?> <?xml-stylesheet type="text/xsl" href="configuration.xsl"?> <configuration> <!--- global properties --> <property>
1 重读配置文件 core-site.xml 要利用 Java 客户端来存取 HDFS 上的文件, 不得不说的是配置文件 hadoop-0.20.2/conf/core-site.xml 了, 最初我就是在这里吃了大亏, 所以我死活连不 上 HDFS, 文件无法创建 读取
More information组播路由 - MSDP 和 PIM 通过走
组播路由 - MSDP 和 PIM 通过走 Contents Introduction 拓扑控制 - 飞机来源注册 ( 步骤 1-3) 接受器参加组 ( 第 4 步 - 第 11 步 ) R4 PIM RP 修剪 (S, G) 步骤 12 摘要 Related Information Introduction 本文描述独立于协议的组播 (PIM) 和多播源发现协议 (MSDP) 的操作与使用一简单的组播拓扑
More informationOTAD Application Note
OTAD Application Note Document Title: OTAD Application Note Version: 1.0 Date: 2011-08-30 Status: Document Control ID: Release _OTAD_Application_Note_CN_V1.0 Copyright Shanghai SIMCom Wireless Solutions
More informationBuild a Key Value Flash Disk Based Storage System. Flash Memory Summit 2017 Santa Clara, CA 1
Build a Key Value Flash Disk Based Storage System Flash Memory Summit 2017 Santa Clara, CA 1 Outline Ø Introduction,What s Key Value Disk Ø A Evolution to Key Value Flash Disk Based Storage System Ø Three
More informationDEV Office 客户端开发增强
DEV261 2007 Office 客户端开发增强 课程内容概述 在 Office 2007 客户端众多新特性中, 和使用者关系最为密切的应该是在 UI 方面的增强 例如, Office 2007 摒弃了传统以计算机命令作为功能组织单位的菜单, 而替换为以用户命令为组织单位的 Ribbon,, 这使得用户可以根据当前正在操作的文档内容, 快速定位到想要执行的操作 对于每一个信息工作者而言,UI,
More informationInteger Encoding and Manipulation
CSE 2421: Systems I Low-Level Programming and Computer Organization Integer Encoding and Manipulation Presentation D Study: Bryant Chapter 2.1 2.3 Gojko Babić 01-24-2018 Unsigned & Signed Integer Encoding
More informationSupport for Title 21 CFR Part 11 and Annex 11 compliance: Agilent OpenLAB CDS version 2.1
Support for Title 21 CFR and compliance: Agilent OpenLAB CDS version 2.1 Whitepaper Overview US FDA in Title 21 of the Code of Federal Regulations (CFR), and its EU analog, Eudralex Chapter 4,, describe
More informationCS 33. Data Representation, Part 1. CS33 Intro to Computer Systems VII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.
CS 33 Data Representation, Part 1 CS33 Intro to Computer Systems VII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Number Representation Hindu-Arabic numerals developed by Hindus starting in
More informationDecode Zend. Darkness/Airsupply
Decode Zend Darkness/Airsupply 关于 PHP 深入了解 PHP 目录 Decode 的关键 ---Opcode Opcode Hooker 技术介绍 分析 Zend Optimizer 开始 Decode 饶过混淆技术 简约不简单 跨平台 使用广泛 About PHP Inside PHP Php core 与 ZendCore 1 把原始的 php 脚本生成中间代码
More informationChapter 2: Java OO II. Yang Wang wyang AT njnet.edu.cn
Chapter 2: Java OO II Yang Wang wyang AT njnet.edu.cn Outline Abstraction Abstract Class Interface Inheritance Polymorphism Abstraction Abstraction What is Abstraction? An abstraction is a general idea
More information1. DWR 1.1 DWR 基础 概念 使用使用 DWR 的步骤. 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架
1. DWR 1.1 DWR 基础 1.1.1 概念 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架 2 作用 使用 DWR, 可以直接在 html 网页中调用 Java 对象的方法 ( 通过 JS 和 Ajax) 3 基本原理主要技术基础是 :AJAX+ 反射 1) JS 通过 AJAX 发出请求, 目标地址为 /dwr/*, 被 DWRServlet(
More informationU-CONTROL UMX610/UMX490/UMX250. The Ultimate Studio in a Box: 61/49/25-Key USB/MIDI Controller Keyboard with Separate USB/Audio Interface
U-CONTROL UMX610/UMX490/UMX250 The Ultimate Studio in a Box: 61/49/25-Key USB/MIDI Controller Keyboard with Separate USB/Audio Interface 2 U-CONTROL UMX610/UMX490/UMX250 快速启动向导 3 其他的重要信息 ¼'' TS 1. 2. 3.
More informationTDS - 3. Battery Compartment. LCD Screen. Power Button. Hold Button. Body. Sensor. HM Digital, Inc.
TDS - 3 Battery Compartment LCD Screen Power Button Hold Button Body Sensor Dual Range Measures from 0~999ppm, with a resolution of 1 ppm. From 1,000 to 9,990ppm, the resolution is 10 ppm, indicated by
More informationmod_callcenter callcenter.conf.xml 范例 odbc-dsn
mod_callcenter 本文英文部分是来自 https://freeswitch.org/confluence/display/freeswitch/mod_callcenter, 中文部分是通过分析 mod_callcenter.c 的代码根据个人 的理解整理而成 关于作者 鼎鼎 :cdevelop@qq.com qq:1280791187 本文会不定期更新, 最新版本在 http://www.ddrj.com/?p=79
More informationArithmetic and Bitwise Operations on Binary Data
Arithmetic and Bitwise Operations on Binary Data CSCI 2400: Computer Architecture ECE 3217: Computer Architecture and Organization Instructor: David Ferry Slides adapted from Bryant & O Hallaron s slides
More informationCS 33. Data Representation, Part 2. CS33 Intro to Computer Systems VIII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.
CS 33 Data Representation, Part 2 CS33 Intro to Computer Systems VIII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Numeric Ranges Unsigned Values UMin = 0 000 0 UMax = 2 w 1 111 1 Two s Complement
More informationCloudStack 4.3 API 开发指南!
CloudStack 4.3 API 开发指南 CloudStack4.3 离发布也不远了, 自从 CloudStack4.1 以后, 其耦合度 一步步下降, 这使开发变得更加容易, 今天我们就以 CloudStack4.3 版本为基础, 来感受 一下如何添加 一个新的 API 首先,CloudStack4.3 里所有的 API 都可认为是 一个插件提供的服务, 诸如 ACL, 网络, 主机以及管理服务器
More informationKeygen Codes For Photoshop Cs6 ->>> DOWNLOAD
Keygen Codes For Photoshop Cs6 ->>> DOWNLOAD 1 / 5 2 / 5 Photoshop Cs6 Crack Serial Ke....op_sp_fanyi{font-size:1em;word-break:normal;}.op_sp_fanyi.op_sp_fanyi_read{display: inline-block;*display: inline;*zoom:1;marginleft:4px;*position:relative;*top:-2px;}.op_sp_fanyi_how_read,.op_sp_fanyi_mp3_play{display:block;w
More information测试 SFTP 的 问题在归档配置页的 MediaSense
测试 SFTP 的 问题在归档配置页的 MediaSense Contents Introduction Prerequisites Requirements Components Used 问题 : 测试 SFTP 按钮发生故障由于 SSH 算法协商故障解决方案 Bug Reled Informion Introduction 本文描述如何解决可能发生的安全壳 SSH 算法协商故障, 当您配置一个安全文件传输协议
More informationNyearBluetoothPrint SDK. Development Document--Android
NyearBluetoothPrint SDK Development Document--Android (v0.98) 2018/09/03 --Continuous update-- I Catalogue 1. Introduction:... 3 2. Relevant knowledge... 4 3. Direction for use... 4 3.1 SDK Import... 4
More informationSHANDONG UNIVERSITY 1
Chapter 12 Mass-Storage Systems SHANDONG UNIVERSITY 1 Contents Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space p Management RAID Structure Disk
More information朱晔和你聊 Spring 系列 S1E2: SpringBoot 并不神秘
朱晔和你聊 Spring 系列 S1E2: SpringBoot 并不神秘 文本我们会一步一步做一个例子来看看 SpringBoot 的自动配置是如何实现的, 然后来看一 些 SpringBoot 留给我们的扩展点 自己制作一个 SpringBoot Starter 我们知道 SpringBoot 提供了非常多的启动器, 引入了启动器依赖即可直接享受到自动依赖 配置和自动属性配置 : https://github.com/spring-projects/spring-boot/tree/master/spring-boot-project/springboot-starters
More informationPython for Everybody. Exploring Data Using Python. Charles R. Severance
Python for Everybody Exploring Data Using Python Charles R. Severance Credits Editorial Support: Elliott Hauser, Sue Blumenberg Cover Design: Aimee Andrion Printing History -Jul- First Complete Python.
More informationCongestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制
Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制 by Hannan-Bin-Liaqat (11117018) to School of Software in partial fulfillment of the requirements for the degree of Doctor of Philosophy
More informationInteger Arithmetic. CS 347 Lecture 03. January 20, 1998
Integer Arithmetic CS 347 Lecture 03 January 20, 1998 Topics Numeric Encodings Unsigned & Two s complement Programming Implications C promotion rules Consequences of overflow Basic operations Addition,
More informationWireless Presentation Pod
Wireless Presentation Pod WPP20 www.yealink.com Quick Start Guide (V10.1) Package Contents If you find anything missing, contact your system administrator. WPP20 Wireless Presentation Pod Quick Start Guide
More informationStratix V 器件中的收发器配置. Stratix V 器件含有一个专用的收发器物理编码子层 (PCS) 和物理介质附加子层 (PMA) 电路 要实现一个协议, 请使用表 4-1 中所列出的 PHY IP
4 订阅 Stratix V 器件含有一个专用的收发器物理编码子层 (PCS) 和物理介质附加子层 (PMA) 电路 要实现一个协议, 请使用表 4-1 中所列出的 PHY IP Stratix V 器件支持以下通信协议 : 10GBASE-R 和 10GBASE-KR Interlaken PCI Express (PCIe ) Gen1 Gen2 和 Gen3 CPRI 和 OBSAI 确定性延迟
More informationSafe Memory-Leak Fixing for C Programs
Safe Memory-Leak Fixing for C Programs Qing Gao, Yingfei Xiong, Yaqing Mi, Lu Zhang, Weikun Yang, Zhaoing Zhou, Bing Xie, Hong Mei Institute of Software, Peking Unversity 内存管理 安全攸关软件的开发必然涉及内存管理问题 软件工程经典问题,
More information计算机科学与技术专业本科培养计划. Undergraduate Program for Specialty in Computer Science & Technology
计算机科学与技术学院 计算机科学与技术学院下设 6 个研究所 : 计算科学理论研究所 数据工程研究所 并行分布式计算研究所 数据存储研究所 数字媒体研究所 信息安全研究所 ;2 个中心 : 嵌入式软件与系统工程中心和教学中心 外存储系统国家专业实验室 教育部信息存储系统重点实验室 中国教育科研网格主结点 国家高性能计算中心 ( 武汉 ) 服务计算技术与系统教育部重点实验室 湖北省数据库工程技术研究中心
More informationRepresenting Integers. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University
Representing Integers Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Unsigned Integers Encoding unsigned integers B [ bw 1, bw2,..., b0 ] x = 0000
More informationS 1.6V 3.3V. S Windows 2000 Windows XP Windows Vista S USB S RGB LED (PORT1 PORT2 PORT3) S I 2 C. + 表示无铅 (Pb) 并符合 RoHS 标准 JU10 JU14, JU24, JU25
19-4694; Rev 0; 6/09 MAX7360 评估板 (EV kit) 提供经过验证的设计, 用于评估 MAX7360 集成 ESD 保护电路的 I 2 C 接口 低 EMI 按键开关控制器和 8 路 LED 驱动器 /GPIO 评估板还包含 Windows 2000 Windows XP 和 Windows Vista 兼容软件, 提供简易的图形用户接口 (GUI) 来验证 MAX7360
More informationPTZ PRO 2. Setup Guide 设置指南
PTZ PRO 2 Setup Guide 设置指南 3 ENGLISH 8 简体中文 2 KNOW YOUR PRODUCT 1 4 9 5 10 6 7 11 8 2 13 14 3 12 15 Camera 1. 10X lossless zoom 2. Camera LED 3. Kensington Security Slot Remote 4. Mirror 5. Zoom in 6.
More informationA bottom-up parser traces a rightmost derivation in reverse. Bottom-Up Parsing. Bottom-up parsing is more general than topdown.
Bottom-Up Parsing Bottom-Up Parsing Bottom-up parsing is more general than topdown parsing And just as efficient Builds on ideas in top-down parsing Bottom-up is the preferred method Originated from Prof.
More information