计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法. 授课老师 : 王浩宇

Size: px
Start display at page:

Download "计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法. 授课老师 : 王浩宇"

Transcription

1 计算机组成原理第二讲 第二章 : 运算方法和运算器 数据与文字的表示方法 (1) 整数的表示方法 授课老师 : 王浩宇 haoyuwang@bupt.edu.cn 1

2 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Summary 2

3 Everything is bits Each bit is 0 or 1 By encoding/interpreting sets of bits in various ways Computers determine what to do (instructions) and represent and manipulate numbers, sets, strings, etc Why bits? Electronic Implementation Easy to store with bitable elements Reliably transmitted on noisy and inaccurate wires 1.1V 0.9V V 0.0V 3

4 For example, can count in binary Base 2 Number Representation Represent as Represent as [0011] 2 Represent X 10 4 as X

5 Encoding Byte Values Byte = 8 bits Binary to Decimal: 010 to Hexadecimal 0016 to FF16 Base 16 number representation Use characters 0 to 9 and A to F Write FA1D37B16 in C as 0xFA1D37B 0xfa1d37b A B C D E F

6 Example Data Representations C Data Type Typical 32-bit Typical 64-bit x86-64 char short int long float double long double 10/16 pointer

7 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Addition, negation, multiplication, shifting Summary Representations in memory, pointers, strings 7

8 Boolean Algebra Developed by George Boole in 19th Century Algebraic representation of logic And Encode True as 1 and False as 0 A&B = 1 when both A=1 and B=1 Or A B = 1 when either A=1 or B=1 Not ~A = 1 when A=0 Exclusive-Or (Xor) A^B = 1 when either A=1 or B=1, but not both 8

9 General Boolean Algebras Operate on Bit Vectors Operations applied bitwise & ^ ~ All of the Properties of Boolean Algebra Apply 9

10 Bit-Level Operations in C Operations &,, ~, ^ Available in C Apply to any integral data type long, int, short, char, unsigned View arguments as bit vectors Arguments applied bit-wise 10

11 Contrast: Logic Operations in C Contrast to Logical Operators &&,,! View 0 as False Anything nonzero as True Always return 0 or 1 Early termination 11

12 Shift Operations Left Shift: x << y Shift bit-vector x left y positions Throw away extra bits on left Fill with 0 s on right Right Shift: x >> y Shift bit-vector x right y positions Throw away extra bits on right Logical shift Fill with 0 s on left Arithmetic shift Replicate most significant bit on left Undefined Behavior Shift amount < 0 or word size Argument x << 3 Log. >> 2 Arith. >> 2 Argument x << 3 Log. >> 2 Arith. >>

13 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Addition, negation, multiplication, shifting Summary Representations in memory, pointers, strings Summary 13

14 Typical ranges for integral data types 14

15 Encoding Integers - Unsigned w 1 B2U(X) x i 2 i i 0 B2U w :{0,1} w -> {0,, 2 w -1} 对于任意整数 x, 当 0 =< x < 2 w 的时候, 存在唯一的二进制序列与其对应 反过来也是一样的, 对于任意一个 w 位的二进制序列, 都存在唯一一个整数 x 满足 0 =< x < 2 w, 与这个二进制序列对应 U2B(x) = B2U -1 (x) 15

16 Encoding Integers - Two s Complement( 补码 ) w 2 B2T(X) x w 1 2 w 1 x i 2 i i 0 Sign Bit TMin = 2 w TMax = 2 w Minus B2T w : {0,1} w -> {-2 w-1,, 2 w-1-1} 对于任意整数 x, 当 -2 w-1 =< x < 2 w-1 的时候, 存在唯一的二进制序列与其对应 反过来, 对于任意一个 w 位的二进制序列, 都存在唯一一个整数 x 满足 -2 w-1 =< x < 2 w-1, 与这个二进制序列对应 T2B(x) = B2T -1 (x) 16

17 Two-complement Encoding Example (Cont.) x = 15213: y = : Weight Sum

18 Values for Different Word Sizes W UMax ,535 4,294,967,295 18,446,744,073,709,551,615 TMax ,767 2,147,483,647 9,223,372,036,854,775,807 TMin ,768-2,147,483,648-9,223,372,036,854,775,808 Observations TMin = TMax + 1 Asymmetric range UMax = 2 * TMax + 1 C Programming #include <limits.h> Declares constants, e.g., ULONG_MAX LONG_MAX LONG_MIN Values platform specific 18

19 有符号数为什么使用补码表示? 原码 (Sign-Magnitude) 最高有效位是符号位, 用来确定剩下的位应该是正权还是负权 比如如果是 8 位二进制 : 0 有两种表示法 [+0] 原 = 0000 ; [-0] 原 = 1000 数据表示范围 整数 : -2 n <X<2 n ( 若数值位 n=3 即 :-8<X<8) 优点 与真值对应关系简单 缺点 参与运算复杂, 需要将数值位与符号位分开考虑 19

20 补码的意义 要将指向 5 点的时钟调整到 3 点整, 应如何处理? 5-2=3 5+10=3(12 自动丢失 12 就是模 ) 20 20

21 补码的意义 继续推导 : 5-2=5+10(MOD 12) 5+(-2)=5+10(MOD 12) -2=10(MOD 12) 结论 : 在模为 12 的情况下,-2 的补码就是 10 一个负数用其补码代替, 同样可以得到正确的运算结果 21 21

22 补码的意义 进一步结论 : 在计算机中, 机器能表示的数据位数是固定的, 其运算都是有模运算 若是 n 位整数 ( 包含符号位 ), 则其模为 2 n ; 若是小数, 则其模为 2 若运算结果超出了计算机所能表示的数值范围, 则只保留它的小于模的低 n-1 位的数值, 超过 n-1 位的高位部分就自动舍弃了 22 22

23 由原码求补码 由原码求补码的简便原则 ( 负数 ) 除符号位以外, 其余各位按位取反, 末位加 1; 从最低位开始, 遇到的第一个 1 以前的各位保持不变, 之后各位取反 例 :[X] 原 = [X] 补 =

24 补码的表示 24

25 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Addition, negation, multiplication, shifting Summary Representations in memory, pointers, strings 25

26 Mapping Between Signed & Unsigned Two s Complement x T2B T2U X B2U Unsigned ux Maintain Same Bit Pattern Unsigned ux U2B U2T X B2T Two s Complement x Maintain Same Bit Pattern Mappings between unsigned and two s complement numbers: Keep bit representations and reinterpret 26

27 Mapping Signed Unsigned Bits Signed Unsigned T2U U2T

28 Mapping Signed Unsigned Bits Signed Unsigned = /

29 Relation between Signed & Unsigned Two s Complement x T2B T2U X B2U Unsigned ux Maintain Same Bit Pattern ux x w Large negative weight becomes Large positive weight 29

30 Relation between Signed & Unsigned WHY? 30

31 Relation between Signed & Unsigned B2U w (x) - B2T w (x) = x w-1 2 w-1 - (-x w-1 2 w-1 ) = x w-1 2 w B2U w (x) = x w-1 2 w + B2T w (x) 令 x 为 T2B w (x), B2U w (T2B w (x)) = x w-1 2 w + B2T w (T2B w (x)) = x w-1 2 w + x T2U w (x) = x w-1 2 w + x 31

32 Conversion Visualized 2 s Comp. Unsigned Ordering Inversion Negative Big Positive TMax UMax UMax 1 TMax + 1 TMax Unsigned Range 2 s Complement Range TMin 32

33 Relation between Signed & Unsigned U2T w = B2T w (U2B w (x)) WHY? 33

34 Relation between Signed & Unsigned U2T w = B2T w (U2B w (x)) B2U w (u) - B2T w (u) = u w-1 2 w-1 - (-u w-1 2 w-1 ) = u w-1 2 w B2T w (u) = B2U w (u) - u w-1 2 w 令 u 为 U2B w (u), B2T w (U2B w (u)) = B2U w (U2B w (u)) - u w-1 2 w = u - u w-1 2 w U2T w (u) = u - u w-1 2 w 34

35 Relation between Signed & Unsigned 35

36 Signed vs. Unsigned in C 36

37 Signed vs. Unsigned in C Constants By default are considered to be signed integers Unsigned if have U as suffix 0U, U Casting Explicit casting between signed & unsigned same as U2T and T2U int tx, ty; unsigned ux, uy; tx = (int) ux; uy = (unsigned) ty; Implicit casting also occurs via assignments and procedure calls tx = ux; uy = ty; 37

38 Casting Surprises Expression Evaluation If there is a mix of unsigned and signed in single expression, signed values implicitly cast to unsigned Including comparison operations <, >, ==, <=, >= Examples for W = 32: TMIN = -2,147,483,648, TMAX = 2,147,483,647 Constant 1 Constant 2 Relation Evaluation 0 0 0U == unsigned < signed U > unsigned > signed U U < unsigned > signed (unsigned) > unsigned U < unsigned (int) U > signed 38

39 Summary Casting Signed Unsigned: Basic Rules Bit pattern is maintained But reinterpreted Can have unexpected effects: adding or subtracting 2 w Expression containing signed and unsigned int int is cast to unsigned!! 39

40 Today: Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned and signed Conversion, casting Expanding, truncating Addition, negation, multiplication, shifting Summary Representations in memory, pointers, strings 40

41 Sign Extension Task: Given w-bit signed integer x Convert it to w+k-bit integer with same value Rule: Make k copies of sign bit: X = x w 1,, x w 1, x w 1, x w 2,, x 0 k copies of MSB X w X k w 41

42 Sign Extension WHY? X = x w 1,, x w 1, x w 1, x w 2,, x 0 k copies of MSB 42

43 Sign Extension Example short int x = 15213; int ix = (int) x; short int y = ; int iy = (int) y; Decimal Hex Binary x B 6D ix B 6D y C iy FF FF C Converting from smaller to larger integer data type C automatically performs sign extension 43

44 Truncation 44

45 Truncation: Simple Example 45

46 Summary: Expanding, Truncating: Basic Rules Expanding (e.g., short int to int) Unsigned: zeros added Signed: sign extension Both yield expected result Truncating (e.g., unsigned to unsigned short) Unsigned/signed: bits are truncated Result reinterpreted Unsigned: mod operation Signed: similar to mod For small numbers yields expected behavior 46

47 练习题 (1) 47

48 练习题 (2) 48

Carnegie Mellon. Bryant and O Hallaron, Computer Systems: A Programmer s Perspective, Third Edition

Carnegie Mellon. Bryant and O Hallaron, Computer Systems: A Programmer s Perspective, Third Edition Carnegie Mellon 1 Bits, Bytes and Integers Part 1 15-213/18-213/15-513: Introduction to Computer Systems 2 nd Lecture, Aug. 31, 2017 Today s Instructor: Randy Bryant 2 Announcements Recitations are on

More information

Bits, Bytes and Integers Part 1

Bits, Bytes and Integers Part 1 Bits, Bytes and Integers Part 1 15-213/18-213/15-513: Introduction to Computer Systems 2 nd Lecture, Jan. 18, 2018 Instructors: Franz Franchetti Seth Copen Goldstein Brian Railing 1 Announcements Waitlist

More information

Previous on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet

Previous on Computer Networks Class 18. ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet ICMP: Internet Control Message Protocol IP Protocol Actually a IP packet 前 4 个字节都是一样的 0 8 16 31 类型代码检验和 ( 这 4 个字节取决于 ICMP 报文的类型 ) ICMP 的数据部分 ( 长度取决于类型 ) ICMP 报文 首部 数据部分 IP 数据报 ICMP: Internet Control Message

More information

Bits, Bytes, and Integers

Bits, Bytes, and Integers Bits, Bytes, and Integers with contributions from Dr. Bin Ren, College of William & Mary 1 Bits, Bytes, and Integers Representing information as bits Bit-level manipulations Integers Representation: unsigned

More information

Bits, Bytes, and Integers

Bits, Bytes, and Integers Bits, Bytes, and Integers B&O Readings: 2.1-2.3 CSE 361: Introduc=on to Systems So@ware Instructor: I- Ting Angelina Le e Note: these slides were originally created by Markus Püschel at Carnegie Mellon

More information

Command Dictionary CUSTOM

Command Dictionary CUSTOM 命令模式 CUSTOM [(filename)] [parameters] Executes a "custom-designed" command which has been provided by special programming using the GHS Programming Interface. 通过 GHS 程序接口, 执行一个 用户设计 的命令, 该命令由其他特殊程序提供 参数说明

More information

实验三十三 DEIGRP 的配置 一 实验目的 二 应用环境 三 实验设备 四 实验拓扑 五 实验要求 六 实验步骤 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程

实验三十三 DEIGRP 的配置 一 实验目的 二 应用环境 三 实验设备 四 实验拓扑 五 实验要求 六 实验步骤 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程 实验三十三 DEIGRP 的配置 一 实验目的 1. 掌握 DEIGRP 的配置方法 2. 理解 DEIGRP 协议的工作过程 二 应用环境 由于 RIP 协议的诸多问题, 神州数码开发了与 EIGRP 完全兼容的 DEIGRP, 支持变长子网 掩码 路由选择参考更多因素, 如带宽等等 三 实验设备 1. DCR-1751 三台 2. CR-V35FC 一条 3. CR-V35MT 一条 四 实验拓扑

More information

Command Dictionary -- DAMSTAB

Command Dictionary -- DAMSTAB 命令模式 DAMSTAB [(divlist)] /SDIC /SDIHC /SDIHR /SDI194C[SP] /SDI194P[SP] /SDI216C[SP] /SDI216P[SP] /SDIPtype [/L:l1,l2] [/B:b1[,b2]] [/N:n1,n2] [/STOP[AT][:n]] [/DLL:draftloadline] [/LIMITHEEL:angle] [/WRITE:runfile]

More information

ICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容

ICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容 Content 内容 A1 A2 A3 A4 A5 A6 A7 A8 A9 Login via ICTI CARE Website 通过 ICTI 关爱网站登录 Completing the Application Form 填写申请表 Application Form Created 创建的申请表 Receive Acknowledgement Email 接收确认电子邮件 Receive User

More information

Triangle - Delaunay Triangulator

Triangle - Delaunay Triangulator Triangle - Delaunay Triangulator eryar@163.com Abstract. Triangle is a 2D quality mesh generator and Delaunay triangulator. Triangle was created as part of the Quake project in the school of Computer Science

More information

CS140 Lecture 08: Data Representation: Bits and Ints. John Magee 13 February 2017

CS140 Lecture 08: Data Representation: Bits and Ints. John Magee 13 February 2017 CS140 Lecture 08: Data Representation: Bits and Ints John Magee 13 February 2017 Material From Computer Systems: A Programmer's Perspective, 3/E (CS:APP3e) Randal E. Bryant and David R. O'Hallaron, Carnegie

More information

三 依赖注入 (dependency injection) 的学习

三 依赖注入 (dependency injection) 的学习 三 依赖注入 (dependency injection) 的学习 EJB 3.0, 提供了一个简单的和优雅的方法来解藕服务对象和资源 使用 @EJB 注释, 可以将 EJB 存根对象注入到任何 EJB 3.0 容器管理的 POJO 中 如果注释用在一个属性变量上, 容器将会在它被第一次访问之前赋值给它 在 Jboss 下一版本中 @EJB 注释从 javax.annotation 包移到了 javax.ejb

More information

Lecture 5-6: Bits, Bytes, and Integers

Lecture 5-6: Bits, Bytes, and Integers CSCI-UA.0201-003 Computer Systems Organization Lecture 5-6: Bits, Bytes, and Integers Mohamed Zahran (aka Z) mzahran@cs.nyu.edu http://www.mzahran.com Slides adapted from: Jinyang Li Bryant and O Hallaron

More information

Computer Systems CEN591(502) Fall 2011

Computer Systems CEN591(502) Fall 2011 Computer Systems CEN591(502) Fall 2011 Sandeep K. S. Gupta Arizona State University 4 th lecture Data representation in computer systems (Slides adapted from CSAPP book) Announcements Programming assignment

More information

Logitech G302 Daedalus Prime Setup Guide 设置指南

Logitech G302 Daedalus Prime Setup Guide 设置指南 Logitech G302 Daedalus Prime Setup Guide 设置指南 Logitech G302 Daedalus Prime Contents / 目录 English................. 3 简体中文................. 6 2 Logitech G302 Daedalus Prime 1 On 2 USB Your Daedalus Prime

More information

OpenCascade 的曲面.

OpenCascade 的曲面. 在 OpenSceneGraph 中绘制 OpenCascade 的曲面 eryar@163.com 摘要 Abstract : 本文对 OpenCascade 中的几何曲面数据进行简要说明, 并结合 OpenSceneGraph 将这些曲面显示 关键字 Key Words:OpenCascade OpenSceneGraph Geometry Surface NURBS 一 引言 Introduction

More information

The relational Algebra & calculus cont. Reference : UC Berkeley

The relational Algebra & calculus cont. Reference : UC Berkeley The relational Algebra & calculus cont Reference : UC Berkeley Formal Relational Query Languages Two mathematical Query Languages form the basis for real languages (e.g. SQL), and for implementation: ❶

More information

Representing and Manipulating Integers Part I

Representing and Manipulating Integers Part I Representing and Manipulating Integers Part I Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Introduction The advent of the digital age Analog

More information

AvalonMiner Raspberry Pi Configuration Guide. AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide

AvalonMiner Raspberry Pi Configuration Guide. AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide AvalonMiner 树莓派配置教程 AvalonMiner Raspberry Pi Configuration Guide 简介 我们通过使用烧录有 AvalonMiner 设备管理程序的树莓派作为控制器 使 用户能够通过控制器中管理程序的图形界面 来同时对多台 AvalonMiner 6.0 或 AvalonMiner 6.01 进行管理和调试 本教程将简要的说明 如何把 AvalonMiner

More information

Chapter 1 (Part 2) Introduction to Operating System

Chapter 1 (Part 2) Introduction to Operating System Chapter 1 (Part 2) Introduction to Operating System 张竞慧办公室 : 计算机楼 366 室电邮 :jhzhang@seu.edu.cn 主页 :http://cse.seu.edu.cn/personalpage/zjh/ 电话 :025-52091017 1.1 Computer System Components 1. Hardware provides

More information

Chapter 11 SHANDONG UNIVERSITY 1

Chapter 11 SHANDONG UNIVERSITY 1 Chapter 11 File System Implementation ti SHANDONG UNIVERSITY 1 Contents File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and

More information

如何查看 Cache Engine 缓存中有哪些网站 /URL

如何查看 Cache Engine 缓存中有哪些网站 /URL 如何查看 Cache Engine 缓存中有哪些网站 /URL 目录 简介 硬件与软件版本 处理日志 验证配置 相关信息 简介 本文解释如何设置处理日志记录什么网站 /URL 在 Cache Engine 被缓存 硬件与软件版本 使用这些硬件和软件版本, 此配置开发并且测试了 : Hardware:Cisco 缓存引擎 500 系列和 73xx 软件 :Cisco Cache 软件版本 2.3.0

More information

PCU50 的整盘备份. 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 光标条停在 SINUMERIK 下方的空白处, 如下图, 按回车键 PCU50 会进入到服务画面, 如下图

PCU50 的整盘备份. 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 光标条停在 SINUMERIK 下方的空白处, 如下图, 按回车键 PCU50 会进入到服务画面, 如下图 PCU50 的整盘备份 本文只针对操作系统为 Windows XP 版本的 PCU50 PCU50 启动硬件自检完后, 出现下面文字时, 按向下光标键 OS Loader V4.00 Please select the operating system to start: SINUMERIK Use and to move the highlight to your choice. Press Enter

More information

BITS, BYTES, AND INTEGERS

BITS, BYTES, AND INTEGERS BITS, BYTES, AND INTEGERS CS 045 Computer Organization and Architecture Prof. Donald J. Patterson Adapted from Bryant and O Hallaron, Computer Systems: A Programmer s Perspective, Third Edition ORIGINS

More information

Integers Sep 3, 2002

Integers Sep 3, 2002 15-213 The course that gives CMU its Zip! Topics Numeric Encodings Unsigned & Two s complement Programming Implications C promotion rules Basic operations Integers Sep 3, 2002 Addition, negation, multiplication

More information

<properties> <jdk.version>1.8</jdk.version> <project.build.sourceencoding>utf-8</project.build.sourceencoding> </properties>

<properties> <jdk.version>1.8</jdk.version> <project.build.sourceencoding>utf-8</project.build.sourceencoding> </properties> SpringBoot 的基本操作 一 基本概念在 spring 没有出现的时候, 我们更多的是使用的 Spring,SpringMVC,Mybatis 等开发框架, 但是要将这些框架整合到 web 项目中需要做大量的配置,applicationContext.xml 以及 servlet- MVC.xml 文件等等, 但是这些文件还还不够, 还需要配置 web.xml 文件进行一系列的配置 以上操作是比较麻烦的,

More information

Integers. Today. Next time. ! Numeric Encodings! Programming Implications! Basic operations. ! Floats

Integers. Today. Next time. ! Numeric Encodings! Programming Implications! Basic operations. ! Floats Integers Today! Numeric Encodings! Programming Implications! Basic operations! Programming Implications Next time! Floats Fabián E. Bustamante, 2007 Integers in C! C supports several integral data types

More information

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition Chapter 7: Deadlocks Silberschatz, Galvin and Gagne 2013 Chapter Objectives To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks To present a number

More information

Systems 1. Integers. Unsigned & Twoʼs complement. Addition, negation, multiplication

Systems 1. Integers. Unsigned & Twoʼs complement. Addition, negation, multiplication Systems 1 Integers Topics Numeric Encodings Unsigned & Twoʼs complement Programming Implications C promotion rules Basic operations Addition, negation, multiplication Programming Implications Consequences

More information

Understanding IO patterns of SSDs

Understanding IO patterns of SSDs 固态硬盘 I/O 特性测试 周大 众所周知, 固态硬盘是一种由闪存作为存储介质的数据库存储设备 由于闪存和磁盘之间物理特性的巨大差异, 现有的各种软件系统无法直接使用闪存芯片 为了提供对现有软件系统的支持, 往往在闪存之上添加一个闪存转换层来实现此目的 固态硬盘就是在闪存上附加了闪存转换层从而提供和磁盘相同的访问接口的存储设备 一方面, 闪存本身具有独特的访问特性 另外一方面, 闪存转换层内置大量的算法来实现闪存和磁盘访问接口之间的转换

More information

Integers. Dr. Steve Goddard Giving credit where credit is due

Integers. Dr. Steve Goddard   Giving credit where credit is due CSCE 23J Computer Organization Integers Dr. Steve Goddard goddard@cse.unl.edu http://cse.unl.edu/~goddard/courses/csce23j Giving credit where credit is due Most of slides for this lecture are based on

More information

Jin-Soo Kim Systems Software & Architecture Lab. Seoul National University. Integers. Spring 2019

Jin-Soo Kim Systems Software & Architecture Lab. Seoul National University. Integers. Spring 2019 Jin-Soo Kim (jinsoo.kim@snu.ac.kr) Systems Software & Architecture Lab. Seoul National University Integers Spring 2019 4190.308: Computer Architecture Spring 2019 Jin-Soo Kim (jinsoo.kim@snu.ac.kr) 2 A

More information

Systems Programming and Computer Architecture ( )

Systems Programming and Computer Architecture ( ) Systems Group Department of Computer Science ETH Zürich Systems Programming and Computer Architecture (252-0061-00) Timothy Roscoe Herbstsemester 2016 1 3: Integers in C Computer Architecture and Systems

More information

nbns-list netbios-type network next-server option reset dhcp server conflict 1-34

nbns-list netbios-type network next-server option reset dhcp server conflict 1-34 目录 1 DHCP 1-1 1.1 DHCP 公共命令 1-1 1.1.1 dhcp dscp 1-1 1.1.2 dhcp enable 1-1 1.1.3 dhcp select 1-2 1.2 DHCP 服务器配置命令 1-3 1.2.1 address range 1-3 1.2.2 bims-server 1-4 1.2.3 bootfile-name 1-5 1.2.4 class 1-6

More information

Bits, Bytes, and Integers August 26, 2009

Bits, Bytes, and Integers August 26, 2009 15-213 The Class That Gives CMU Its Zip! Bits, Bytes, and Integers August 26, 2009 Topics Representing information as bits Bit-level manipulations Boolean algebra Expressing in C Representations of Integers

More information

Skill-building Courses Business Analysis Lesson 3 Problem Solving

Skill-building Courses Business Analysis Lesson 3 Problem Solving Skill-building Courses Business Analysis Lesson 3 Problem Solving Review Software Development Life Cycle/Agile/Scrum Learn best practices for collecting and cleaning data in Excel to ensure accurate analysis

More information

漂亮的测试. By Alberto Savoia 代码之美 第七章 史际帆

漂亮的测试. By Alberto Savoia 代码之美 第七章 史际帆 漂亮的测试 代码之美 第七章 By Alberto Savoia 史际帆 作者简介 :Alberto Savoia Alberto Savoia is co-founder and CTO of Agitar Software. Before Agitar, he was Senior Director of Engineering at Google; prior to that he was the

More information

Chapter2 Instruction Sets

Chapter2 Instruction Sets Coputer Architecture Chapter Instruction Sets Zheng Qinghua CS Departent of XJTU 05.3 Introduction to Instruction Set Architecture ISA is the structure of a coputer that a achine language prograer ust

More information

The Design of Everyday Things

The Design of Everyday Things The Design of Everyday Things Byron Li Copyright 2009 Trend Micro Inc. It's Not Your Fault Donald A. Norman & His Book Classification 03/17/11 3 Norman Door Why Learn to think from different aspects Contribute

More information

2. Introduction to Digital Media Format

2. Introduction to Digital Media Format Digital Asset Management 数字媒体资源管理 2. Introduction to Digital Media Format 任课 老师 : 张宏鑫 2014-09-30 Outline Image format and coding methods Audio format and coding methods Video format and coding methods

More information

Representa7on of integers: unsigned and signed Conversion, cas7ng Expanding, trunca7ng Addi7on, nega7on, mul7plica7on, shiaing

Representa7on of integers: unsigned and signed Conversion, cas7ng Expanding, trunca7ng Addi7on, nega7on, mul7plica7on, shiaing Today s Topics Representa7on of integers: unsigned and signed Conversion, cas7ng Expanding, trunca7ng Addi7on, nega7on, mul7plica7on, shiaing CSE351 Inaugural Edi7on Spring 2010 1 Encoding Integers C short

More information

CS 33. Data Representation, Part 2. CS33 Intro to Computer Systems VII 1 Copyright 2018 Thomas W. Doeppner. All rights reserved.

CS 33. Data Representation, Part 2. CS33 Intro to Computer Systems VII 1 Copyright 2018 Thomas W. Doeppner. All rights reserved. CS 33 Data Representation, Part 2 CS33 Intro to Computer Systems VII 1 Copyright 2018 Thomas W. Doeppner. All rights reserved. Signed Integers Two s complement b w-1 = 0 Þ non-negative number value = b

More information

Supplementary Materials on Semaphores

Supplementary Materials on Semaphores Supplementary Materials on Semaphores Contents Semaphores Basic synchronization patterns Producers-Consumers (Bounded Buffer) Readers-Writers The Dining Philosophers More Exercises for You Dijkstra Edsger

More information

Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司

Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 Microsoft RemoteFX: USB 和设备重定向 姓名 : 张天民 职务 : 高级讲师 公司 : 东方瑞通 ( 北京 ) 咨询服务有限公司 RemoteFX 中新的 USB 重定向特性 在 RDS 中所有设备重定向机制 VDI 部署场景讨论 : 瘦客户端和胖客户端 (Thin&Rich). 用户体验 : 演示使用新的 USB 重定向功能 81% 4 本地和远程的一致的体验 (Close

More information

Topics of this Slideset. CS429: Computer Organization and Architecture. Encoding Integers: Unsigned. C Puzzles. Integers

Topics of this Slideset. CS429: Computer Organization and Architecture. Encoding Integers: Unsigned. C Puzzles. Integers Topics of this Slideset CS429: Computer Organization and Architecture Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: July 5, 2018 at 11:55 Numeric Encodings:

More information

CS429: Computer Organization and Architecture

CS429: Computer Organization and Architecture CS429: Computer Organization and Architecture Dr. Bill Young Department of Computer Science University of Texas at Austin Last updated: July 5, 2018 at 11:55 CS429 Slideset 3: 1 Topics of this Slideset

More information

Introduction to Computer Science

Introduction to Computer Science Introduction to Computer Science 郝建业副教授 软件学院 http://www.escience.cn/people/jianye/index.html Lecturer Jianye HAO ( 郝建业 ) Email: jianye.hao@tju.edu.cn Tutor: Li Shuxin ( 李姝昕 ) Email: 957005030@qq.com Outline

More information

Packaging 10Apr2012 Rev V Specification MBXL HSG 1. PURPOSE 目的 2. APPLICABLE PRODUCT 适用范围

Packaging 10Apr2012 Rev V Specification MBXL HSG 1. PURPOSE 目的 2. APPLICABLE PRODUCT 适用范围 107-68703 Packaging 10Apr2012 Rev V Specification MBXL HSG 1. PURPOSE 目的 Define the packaging specifiction and packaging method of MBXL HSG. 订定 MBXL HSG 产品之包装规格及包装方式 2. APPLICABLE PRODUCT 适用范围 PKG TYPE

More information

密级 : 博士学位论文. 论文题目基于 ScratchPad Memory 的嵌入式系统优化研究

密级 : 博士学位论文. 论文题目基于 ScratchPad Memory 的嵌入式系统优化研究 密级 : 博士学位论文 论文题目基于 ScratchPad Memory 的嵌入式系统优化研究 作者姓名指导教师学科 ( 专业 ) 所在学院提交日期 胡威陈天洲教授计算机科学与技术计算机学院二零零八年三月 A Dissertation Submitted to Zhejiang University for the Degree of Doctor of Philosophy TITLE: The

More information

ICS Instructor: Aleksandar Kuzmanovic TA: Ionut Trestian Recitation 2

ICS Instructor: Aleksandar Kuzmanovic TA: Ionut Trestian Recitation 2 ICS 2008 Instructor: Aleksandar Kuzmanovic TA: Ionut Trestian Recitation 2 Data Representations Sizes of C Objects (in Bytes) C Data Type Compaq Alpha Typical 32-bit Intel IA32 int 4 4 4 long int 8 4 4

More information

Lecture 3 for pipelining

Lecture 3 for pipelining Lecture 3 for pipelining The control hazard How to solve the control hazard Pipelining Hazards Taxonomy of Hazards Structural hazards These are conflicts over hardware resources. OK, maybe add extra hardware

More information

Technology: Anti-social Networking 科技 : 反社交网络

Technology: Anti-social Networking 科技 : 反社交网络 Technology: Anti-social Networking 科技 : 反社交网络 1 Technology: Anti-social Networking 科技 : 反社交网络 The Growth of Online Communities 社交网络使用的增长 Read the text below and do the activity that follows. 阅读下面的短文, 然后完成练习

More information

Bits, Bytes and Integers

Bits, Bytes and Integers Bits, Bytes and Integers Computer Systems Organization (Spring 2016) CSCI-UA 201, Section 2 Instructor: Joanna Klukowska Slides adapted from Randal E. Bryant and David R. O Hallaron (CMU) Mohamed Zahran

More information

Representing and Manipulating Integers. Jo, Heeseung

Representing and Manipulating Integers. Jo, Heeseung Representing and Manipulating Integers Jo, Heeseung Unsigned Integers Encoding unsigned integers B [ bw 1, bw 2,..., b0 ] x = 0000 0111 1101 0011 2 D( B) w 1 b i i 0 2 i D(x) = 2 10 + 2 9 + 2 8 + 2 7 +

More information

Arithmetic and Bitwise Operations on Binary Data

Arithmetic and Bitwise Operations on Binary Data Arithmetic and Bitwise Operations on Binary Data CSCI 224 / ECE 317: Computer Architecture Instructor: Prof. Jason Fritts Slides adapted from Bryant & O Hallaron s slides 1 Boolean Algebra Developed by

More information

But first, encode deck of cards. Integer Representation. Two possible representations. Two better representations WELLESLEY CS 240 9/8/15

But first, encode deck of cards. Integer Representation. Two possible representations. Two better representations WELLESLEY CS 240 9/8/15 Integer Representation Representation of integers: unsigned and signed Sign extension Arithmetic and shifting Casting But first, encode deck of cards. cards in suits How do we encode suits, face cards?

More information

Software Engineering. Zheng Li( 李征 ) Jing Wan( 万静 )

Software Engineering. Zheng Li( 李征 ) Jing Wan( 万静 ) Software Engineering Zheng Li( 李征 ) Jing Wan( 万静 ) 作业 Automatically test generation 1. 编写一个三角形程序, 任意输入三个整数, 判断三个整形边长能否构成三角形, 如果是三角形, 则判断它是一般三角形 等腰三角形或等边三角形, 并输出三角形的类型 2. 画出程序的 CFG, 计算圈复杂度 3. 设计一组测试用例满足测试准则

More information

TBarCode OCX Microsoft ActiveX compliant Barcode Control

TBarCode OCX Microsoft ActiveX compliant Barcode Control TBarCode OCX Microsoft ActiveX compliant Barcode Control Version 9.0 Tutorial 19 December 2008 TEC-IT Datenverarbeitung GmbH W agnerstrasse 6 A-4400 Steyr, Austria t ++43 (0)7252 72720 f ++43 (0)7252 72720

More information

Compile times - assert macros

Compile times - assert macros Compile times - assert macros 53 doctest 1.0 - CHECK(a == b); do { Result res; bool threw = false; try { res = ExpressionDecomposer() success) {

More information

Windows Batch VS Linux Shell. Jason Zhu

Windows Batch VS Linux Shell. Jason Zhu Windows Batch VS Linux Shell Jason Zhu Agenda System and Shell Windows batch and Linux Shell Dos and Linux Shell internal Commands Windows and Linux external commands Batch and Shell variable and special

More information

学习沉淀成长分享 EIGRP. 红茶三杯 ( 朱 SIR) 微博 : Latest update:

学习沉淀成长分享 EIGRP. 红茶三杯 ( 朱 SIR) 微博 :  Latest update: 学习沉淀成长分享 EIGRP 红茶三杯 ( 朱 SIR) 微博 :http://t.sina.com/vinsoney Latest update: 2012-06-01 课程目标 EIGRP 协议基础 EIGRP 基础配置 EIGRP 协议基础 EIGRP 的协议特点 EIGRP 的三张表 EIGRP 数据包 初始路由发现 EIGRP metric DUAL 算法 EIGRP 的协议特点 CISCO

More information

Apache Kafka 源码编译 Spark 大数据博客 -

Apache Kafka 源码编译 Spark 大数据博客 - 经过近一个月时间, 终于差不多将之前在 Flume 0.9.4 上面编写的 source sink 等插件迁移到 Flume-ng 1.5.0, 包括了将 Flume 0.9.4 上面的 TailSou rce TailDirSource 等插件的迁移 ( 当然, 我们加入了许多新的功能, 比如故障恢复 日志的断点续传 按块发送日志以及每个一定的时间轮询发送日志而不是等一个日志发送完才发送另外一个日志

More information

Bi-monthly report. Tianyi Luo

Bi-monthly report. Tianyi Luo Bi-monthly report Tianyi Luo 1 Work done in this week Write a crawler plus based on keywords (Support Chinese and English) Modify a Sina weibo crawler (340M/day) Offline learning to rank module is completed

More information

display portal server display portal user display portal user count display portal web-server

display portal server display portal user display portal user count display portal web-server 目录 1 Portal 1-1 1.1 Portal 配置命令 1-1 1.1.1 aaa-fail nobinding enable 1-1 1.1.2 aging-time 1-1 1.1.3 app-id (Facebook authentication server view) 1-2 1.1.4 app-id (QQ authentication server view) 1-3 1.1.5

More information

Oriented Scene Text Detection Revisited. Xiang Bai Huazhong University of Science and Technology

Oriented Scene Text Detection Revisited. Xiang Bai Huazhong University of Science and Technology The Invited Talk in Vision and Learning Seminar (VALSE) Xiamen, 2017-4-22 Oriented Scene Text Detection Revisited Xiang Bai Huazhong University of Science and Technology xbai@hust.edu.cn http://mclab.eic.hust.edu.cn/~xbai/

More information

NetScreen 概念与范例. ScreenOS 参考指南 第 7 卷 : 虚拟系统. ScreenOS 编号 SC 修订本 E

NetScreen 概念与范例. ScreenOS 参考指南 第 7 卷 : 虚拟系统. ScreenOS 编号 SC 修订本 E NetScreen 概念与范例 ScreenOS 参考指南 第 7 卷 : 虚拟系统 ScreenOS 5.0.0 编号 093-0930-000-SC 修订本 E Copyright Notice Copyright 2004 NetScreen Technologies, Inc. All rights reserved. NetScreen, NetScreen Technologies, GigaScreen,

More information

<?xml version="1.0"?> <?xml-stylesheet type="text/xsl" href="configuration.xsl"?> <configuration> <!--- global properties --> <property>

<?xml version=1.0?> <?xml-stylesheet type=text/xsl href=configuration.xsl?> <configuration> <!--- global properties --> <property> 1 重读配置文件 core-site.xml 要利用 Java 客户端来存取 HDFS 上的文件, 不得不说的是配置文件 hadoop-0.20.2/conf/core-site.xml 了, 最初我就是在这里吃了大亏, 所以我死活连不 上 HDFS, 文件无法创建 读取

More information

组播路由 - MSDP 和 PIM 通过走

组播路由 - MSDP 和 PIM 通过走 组播路由 - MSDP 和 PIM 通过走 Contents Introduction 拓扑控制 - 飞机来源注册 ( 步骤 1-3) 接受器参加组 ( 第 4 步 - 第 11 步 ) R4 PIM RP 修剪 (S, G) 步骤 12 摘要 Related Information Introduction 本文描述独立于协议的组播 (PIM) 和多播源发现协议 (MSDP) 的操作与使用一简单的组播拓扑

More information

OTAD Application Note

OTAD Application Note OTAD Application Note Document Title: OTAD Application Note Version: 1.0 Date: 2011-08-30 Status: Document Control ID: Release _OTAD_Application_Note_CN_V1.0 Copyright Shanghai SIMCom Wireless Solutions

More information

Build a Key Value Flash Disk Based Storage System. Flash Memory Summit 2017 Santa Clara, CA 1

Build a Key Value Flash Disk Based Storage System. Flash Memory Summit 2017 Santa Clara, CA 1 Build a Key Value Flash Disk Based Storage System Flash Memory Summit 2017 Santa Clara, CA 1 Outline Ø Introduction,What s Key Value Disk Ø A Evolution to Key Value Flash Disk Based Storage System Ø Three

More information

DEV Office 客户端开发增强

DEV Office 客户端开发增强 DEV261 2007 Office 客户端开发增强 课程内容概述 在 Office 2007 客户端众多新特性中, 和使用者关系最为密切的应该是在 UI 方面的增强 例如, Office 2007 摒弃了传统以计算机命令作为功能组织单位的菜单, 而替换为以用户命令为组织单位的 Ribbon,, 这使得用户可以根据当前正在操作的文档内容, 快速定位到想要执行的操作 对于每一个信息工作者而言,UI,

More information

Integer Encoding and Manipulation

Integer Encoding and Manipulation CSE 2421: Systems I Low-Level Programming and Computer Organization Integer Encoding and Manipulation Presentation D Study: Bryant Chapter 2.1 2.3 Gojko Babić 01-24-2018 Unsigned & Signed Integer Encoding

More information

Support for Title 21 CFR Part 11 and Annex 11 compliance: Agilent OpenLAB CDS version 2.1

Support for Title 21 CFR Part 11 and Annex 11 compliance: Agilent OpenLAB CDS version 2.1 Support for Title 21 CFR and compliance: Agilent OpenLAB CDS version 2.1 Whitepaper Overview US FDA in Title 21 of the Code of Federal Regulations (CFR), and its EU analog, Eudralex Chapter 4,, describe

More information

CS 33. Data Representation, Part 1. CS33 Intro to Computer Systems VII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

CS 33. Data Representation, Part 1. CS33 Intro to Computer Systems VII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. CS 33 Data Representation, Part 1 CS33 Intro to Computer Systems VII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Number Representation Hindu-Arabic numerals developed by Hindus starting in

More information

Decode Zend. Darkness/Airsupply

Decode Zend. Darkness/Airsupply Decode Zend Darkness/Airsupply 关于 PHP 深入了解 PHP 目录 Decode 的关键 ---Opcode Opcode Hooker 技术介绍 分析 Zend Optimizer 开始 Decode 饶过混淆技术 简约不简单 跨平台 使用广泛 About PHP Inside PHP Php core 与 ZendCore 1 把原始的 php 脚本生成中间代码

More information

Chapter 2: Java OO II. Yang Wang wyang AT njnet.edu.cn

Chapter 2: Java OO II. Yang Wang wyang AT njnet.edu.cn Chapter 2: Java OO II Yang Wang wyang AT njnet.edu.cn Outline Abstraction Abstract Class Interface Inheritance Polymorphism Abstraction Abstraction What is Abstraction? An abstraction is a general idea

More information

1. DWR 1.1 DWR 基础 概念 使用使用 DWR 的步骤. 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架

1. DWR 1.1 DWR 基础 概念 使用使用 DWR 的步骤. 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架 1. DWR 1.1 DWR 基础 1.1.1 概念 1 什么是 DWR? Direct Web Remote, 直接 Web 远程 是一个 Ajax 的框架 2 作用 使用 DWR, 可以直接在 html 网页中调用 Java 对象的方法 ( 通过 JS 和 Ajax) 3 基本原理主要技术基础是 :AJAX+ 反射 1) JS 通过 AJAX 发出请求, 目标地址为 /dwr/*, 被 DWRServlet(

More information

U-CONTROL UMX610/UMX490/UMX250. The Ultimate Studio in a Box: 61/49/25-Key USB/MIDI Controller Keyboard with Separate USB/Audio Interface

U-CONTROL UMX610/UMX490/UMX250. The Ultimate Studio in a Box: 61/49/25-Key USB/MIDI Controller Keyboard with Separate USB/Audio Interface U-CONTROL UMX610/UMX490/UMX250 The Ultimate Studio in a Box: 61/49/25-Key USB/MIDI Controller Keyboard with Separate USB/Audio Interface 2 U-CONTROL UMX610/UMX490/UMX250 快速启动向导 3 其他的重要信息 ¼'' TS 1. 2. 3.

More information

TDS - 3. Battery Compartment. LCD Screen. Power Button. Hold Button. Body. Sensor. HM Digital, Inc.

TDS - 3. Battery Compartment. LCD Screen. Power Button. Hold Button. Body. Sensor. HM Digital, Inc. TDS - 3 Battery Compartment LCD Screen Power Button Hold Button Body Sensor Dual Range Measures from 0~999ppm, with a resolution of 1 ppm. From 1,000 to 9,990ppm, the resolution is 10 ppm, indicated by

More information

mod_callcenter callcenter.conf.xml 范例 odbc-dsn

mod_callcenter callcenter.conf.xml 范例 odbc-dsn mod_callcenter 本文英文部分是来自 https://freeswitch.org/confluence/display/freeswitch/mod_callcenter, 中文部分是通过分析 mod_callcenter.c 的代码根据个人 的理解整理而成 关于作者 鼎鼎 :cdevelop@qq.com qq:1280791187 本文会不定期更新, 最新版本在 http://www.ddrj.com/?p=79

More information

Arithmetic and Bitwise Operations on Binary Data

Arithmetic and Bitwise Operations on Binary Data Arithmetic and Bitwise Operations on Binary Data CSCI 2400: Computer Architecture ECE 3217: Computer Architecture and Organization Instructor: David Ferry Slides adapted from Bryant & O Hallaron s slides

More information

CS 33. Data Representation, Part 2. CS33 Intro to Computer Systems VIII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.

CS 33. Data Representation, Part 2. CS33 Intro to Computer Systems VIII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. CS 33 Data Representation, Part 2 CS33 Intro to Computer Systems VIII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Numeric Ranges Unsigned Values UMin = 0 000 0 UMax = 2 w 1 111 1 Two s Complement

More information

CloudStack 4.3 API 开发指南!

CloudStack 4.3 API 开发指南! CloudStack 4.3 API 开发指南 CloudStack4.3 离发布也不远了, 自从 CloudStack4.1 以后, 其耦合度 一步步下降, 这使开发变得更加容易, 今天我们就以 CloudStack4.3 版本为基础, 来感受 一下如何添加 一个新的 API 首先,CloudStack4.3 里所有的 API 都可认为是 一个插件提供的服务, 诸如 ACL, 网络, 主机以及管理服务器

More information

Keygen Codes For Photoshop Cs6 ->>> DOWNLOAD

Keygen Codes For Photoshop Cs6 ->>> DOWNLOAD Keygen Codes For Photoshop Cs6 ->>> DOWNLOAD 1 / 5 2 / 5 Photoshop Cs6 Crack Serial Ke....op_sp_fanyi{font-size:1em;word-break:normal;}.op_sp_fanyi.op_sp_fanyi_read{display: inline-block;*display: inline;*zoom:1;marginleft:4px;*position:relative;*top:-2px;}.op_sp_fanyi_how_read,.op_sp_fanyi_mp3_play{display:block;w

More information

测试 SFTP 的 问题在归档配置页的 MediaSense

测试 SFTP 的 问题在归档配置页的 MediaSense 测试 SFTP 的 问题在归档配置页的 MediaSense Contents Introduction Prerequisites Requirements Components Used 问题 : 测试 SFTP 按钮发生故障由于 SSH 算法协商故障解决方案 Bug Reled Informion Introduction 本文描述如何解决可能发生的安全壳 SSH 算法协商故障, 当您配置一个安全文件传输协议

More information

NyearBluetoothPrint SDK. Development Document--Android

NyearBluetoothPrint SDK. Development Document--Android NyearBluetoothPrint SDK Development Document--Android (v0.98) 2018/09/03 --Continuous update-- I Catalogue 1. Introduction:... 3 2. Relevant knowledge... 4 3. Direction for use... 4 3.1 SDK Import... 4

More information

SHANDONG UNIVERSITY 1

SHANDONG UNIVERSITY 1 Chapter 12 Mass-Storage Systems SHANDONG UNIVERSITY 1 Contents Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space p Management RAID Structure Disk

More information

朱晔和你聊 Spring 系列 S1E2: SpringBoot 并不神秘

朱晔和你聊 Spring 系列 S1E2: SpringBoot 并不神秘 朱晔和你聊 Spring 系列 S1E2: SpringBoot 并不神秘 文本我们会一步一步做一个例子来看看 SpringBoot 的自动配置是如何实现的, 然后来看一 些 SpringBoot 留给我们的扩展点 自己制作一个 SpringBoot Starter 我们知道 SpringBoot 提供了非常多的启动器, 引入了启动器依赖即可直接享受到自动依赖 配置和自动属性配置 : https://github.com/spring-projects/spring-boot/tree/master/spring-boot-project/springboot-starters

More information

Python for Everybody. Exploring Data Using Python. Charles R. Severance

Python for Everybody. Exploring Data Using Python. Charles R. Severance Python for Everybody Exploring Data Using Python Charles R. Severance Credits Editorial Support: Elliott Hauser, Sue Blumenberg Cover Design: Aimee Andrion Printing History -Jul- First Complete Python.

More information

Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制

Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制 Congestion Control Mechanisms for Ad-hoc Social Networks 自组织社会网络中的拥塞控制机制 by Hannan-Bin-Liaqat (11117018) to School of Software in partial fulfillment of the requirements for the degree of Doctor of Philosophy

More information

Integer Arithmetic. CS 347 Lecture 03. January 20, 1998

Integer Arithmetic. CS 347 Lecture 03. January 20, 1998 Integer Arithmetic CS 347 Lecture 03 January 20, 1998 Topics Numeric Encodings Unsigned & Two s complement Programming Implications C promotion rules Consequences of overflow Basic operations Addition,

More information

Wireless Presentation Pod

Wireless Presentation Pod Wireless Presentation Pod WPP20 www.yealink.com Quick Start Guide (V10.1) Package Contents If you find anything missing, contact your system administrator. WPP20 Wireless Presentation Pod Quick Start Guide

More information

Stratix V 器件中的收发器配置. Stratix V 器件含有一个专用的收发器物理编码子层 (PCS) 和物理介质附加子层 (PMA) 电路 要实现一个协议, 请使用表 4-1 中所列出的 PHY IP

Stratix V 器件中的收发器配置. Stratix V 器件含有一个专用的收发器物理编码子层 (PCS) 和物理介质附加子层 (PMA) 电路 要实现一个协议, 请使用表 4-1 中所列出的 PHY IP 4 订阅 Stratix V 器件含有一个专用的收发器物理编码子层 (PCS) 和物理介质附加子层 (PMA) 电路 要实现一个协议, 请使用表 4-1 中所列出的 PHY IP Stratix V 器件支持以下通信协议 : 10GBASE-R 和 10GBASE-KR Interlaken PCI Express (PCIe ) Gen1 Gen2 和 Gen3 CPRI 和 OBSAI 确定性延迟

More information

Safe Memory-Leak Fixing for C Programs

Safe Memory-Leak Fixing for C Programs Safe Memory-Leak Fixing for C Programs Qing Gao, Yingfei Xiong, Yaqing Mi, Lu Zhang, Weikun Yang, Zhaoing Zhou, Bing Xie, Hong Mei Institute of Software, Peking Unversity 内存管理 安全攸关软件的开发必然涉及内存管理问题 软件工程经典问题,

More information

计算机科学与技术专业本科培养计划. Undergraduate Program for Specialty in Computer Science & Technology

计算机科学与技术专业本科培养计划. Undergraduate Program for Specialty in Computer Science & Technology 计算机科学与技术学院 计算机科学与技术学院下设 6 个研究所 : 计算科学理论研究所 数据工程研究所 并行分布式计算研究所 数据存储研究所 数字媒体研究所 信息安全研究所 ;2 个中心 : 嵌入式软件与系统工程中心和教学中心 外存储系统国家专业实验室 教育部信息存储系统重点实验室 中国教育科研网格主结点 国家高性能计算中心 ( 武汉 ) 服务计算技术与系统教育部重点实验室 湖北省数据库工程技术研究中心

More information

Representing Integers. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

Representing Integers. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University Representing Integers Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Unsigned Integers Encoding unsigned integers B [ bw 1, bw2,..., b0 ] x = 0000

More information

S 1.6V 3.3V. S Windows 2000 Windows XP Windows Vista S USB S RGB LED (PORT1 PORT2 PORT3) S I 2 C. + 表示无铅 (Pb) 并符合 RoHS 标准 JU10 JU14, JU24, JU25

S 1.6V 3.3V. S Windows 2000 Windows XP Windows Vista S USB S RGB LED (PORT1 PORT2 PORT3) S I 2 C. + 表示无铅 (Pb) 并符合 RoHS 标准 JU10 JU14, JU24, JU25 19-4694; Rev 0; 6/09 MAX7360 评估板 (EV kit) 提供经过验证的设计, 用于评估 MAX7360 集成 ESD 保护电路的 I 2 C 接口 低 EMI 按键开关控制器和 8 路 LED 驱动器 /GPIO 评估板还包含 Windows 2000 Windows XP 和 Windows Vista 兼容软件, 提供简易的图形用户接口 (GUI) 来验证 MAX7360

More information

PTZ PRO 2. Setup Guide 设置指南

PTZ PRO 2. Setup Guide 设置指南 PTZ PRO 2 Setup Guide 设置指南 3 ENGLISH 8 简体中文 2 KNOW YOUR PRODUCT 1 4 9 5 10 6 7 11 8 2 13 14 3 12 15 Camera 1. 10X lossless zoom 2. Camera LED 3. Kensington Security Slot Remote 4. Mirror 5. Zoom in 6.

More information

A bottom-up parser traces a rightmost derivation in reverse. Bottom-Up Parsing. Bottom-up parsing is more general than topdown.

A bottom-up parser traces a rightmost derivation in reverse. Bottom-Up Parsing. Bottom-up parsing is more general than topdown. Bottom-Up Parsing Bottom-Up Parsing Bottom-up parsing is more general than topdown parsing And just as efficient Builds on ideas in top-down parsing Bottom-up is the preferred method Originated from Prof.

More information