Computer Systems: A Programmer's Perspective (3rd Edition)
3rd Edition
ISBN: 9780134092669
Author: Bryant, Randal E. Bryant, David R. O'Hallaron, David R., Randal E.; O'Hallaron, Bryant/O'hallaron
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
Chapter 9.9, Problem 9.6PP
Program Plan Intro
Dynamic allocator:
Dynamic allocator keeps the heap as a group of several size blocks; each block is an attached portion of virtual memory which is allocated or free.
- An allocated block has been clearly kept for use by the application.
- A free block is offered to be allocated.
Two types of allocators:
- 1. Explicit allocators
- 2. Implicit allocators
Explicit allocators:
Explicit allocators need the application to explicitly free any allocated blocks.
Implicit allocators:
Implicit allocators is the method of automatically releasing vacant allocated blocks. This is also known as garbage collection.
Implicit free list:
In this method, a block contains one word header, payload and additional padding. The header encrypts the block size which contains header and padding; and also check the block is allocated or free.
- If the arrangement is double-word, the block size is constantly a multiple of “8” and the low-order bits of the block size are always zero.
- Thus, essential to store only the high-order “29 bits” of the block size, freeing the remaining “3 bits” to encrypt other information.
- Here, smallest significant bits is using to represent the block is allocated or free.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
C++
Problem 1) Find how many non-zero element are in a matrix (two-dimensional array)- use as an example:
10 -4 0
7 8 3
0 0 1
Read the values from input (cin) using for loops and use for loops to find the answer.
C++
(4) [8]Write code for a function multBy3divBy4, that for argument int x, computes 3*x/4, but follows the bit-level integer coding rules (text p.128) like in problem 3 of the assignment 1. (you may assume ints are 32 bits).
(Note: The operation in your code 3*x is allowed to cause overflow.)
Question 2
Using the incomplete programming code given, complete the code using dynamic programming with memory function, to reproduce the results in the following Table 1. (C++)
#include<iostream>using namespace std;
// max knapsack capacity // *** WRITE YOUR CODE HERE ***// num of items // *** WRITE YOUR CODE HERE ***// weight of each item // *** WRITE YOUR CODE HERE ***// value of each item // *** WRITE YOUR CODE HERE ***// variable for dynamic programming matrix // *** WRITE YOUR CODE HERE ***
//==========================================// Dynamic programming function: recursive// =========================================
// ALGORITHM F(i,j) // int value // if F[i,j] is not filled yet (-1): // (start with j = W, i = n) // if capacity j < current item's weight w[i]: // value = recall F(i-1, j) // else: // we can include current item,…
Chapter 9 Solutions
Computer Systems: A Programmer's Perspective (3rd Edition)
Ch. 9.2 - Prob. 9.1PPCh. 9.3 - Prob. 9.2PPCh. 9.6 - Prob. 9.3PPCh. 9.6 - Prob. 9.4PPCh. 9.8 - Practice Problem 9.5 (solution page 882) Write a C...Ch. 9.9 - Prob. 9.6PPCh. 9.9 - Prob. 9.7PPCh. 9.9 - Prob. 9.8PPCh. 9.9 - Prob. 9.9PPCh. 9.9 - Prob. 9.10PP
Ch. 9 - Prob. 9.11HWCh. 9 - Repeat Problem 9.11 for the following address....Ch. 9 - Repeat Problem 9.11 for the following address....Ch. 9 - Given an input file hello.txt that consists of the...Ch. 9 - Determine the block sizes and header values that...Ch. 9 - Prob. 9.16HWCh. 9 - Prob. 9.17HWCh. 9 - Prob. 9.18HWCh. 9 - Prob. 9.19HWCh. 9 - Write your own version of malloc and free, and...
Knowledge Booster
Similar questions
- 10:22 Q4: [Principal Component Analysis] a. Write the pseudo-code of the Principal Component Analysis algorithm b. A study revels that the average temperature and energy demanded are correlated in nature. The study help to forecast the energy demand as a function of the average temperature. The average temperature let x °F and the day's energy demand denoted as 'y' (MWH) were recorded. Compute the principal component of the given data using PCA Algorithm as a function of Covariance matrix, Eigen values and eigenvectors of the covariance matrix, and Feature vectors Q6: [Aprori Algorithm] a. b. Observation No Average Temperature (X) Energy Demand (Y) 1 69 146 2 of 4 Q5: [Search Algorithm] a. Write the pseudo-code of the following search algorithm i. Uniform cost search II. Iterative Deepening Search b. Discuss the working principle, strength, and limitation of the following search algorithm i. Uniform cost search ii. Iterative Deepening Search C. Consider the following initial state of…arrow_forward(b) Given the following diagram that represents a singular linked list: start last (i) Give C++ statements to create the above node which can store any data types (ii) Modify the above linked list to be a circular linked list by giving a correct C++ statement. (iii) Show C++ statements to display the content of each node in the above circular linked list.arrow_forward(c) An electronic rainfall depth measurement device is developed to collect the data from the past 7 days as shown in Table 1 to study the weather condition at UniMAP. Table 1 [Jadual 1] Location: UniMAP Day Rainfall Depth (mm) 5.9 1 2 6.7 3 2.4 7.8 5.2 4 5 1.8 7 3.5 (i) Write a program in C to receive the values of rainfall depth and display the number of days with light rain ( 7.6 mm) from the record in Table 1. (ii) Rewrite the program in (c)(i) to identify and display the day with the lowest value of rainfall depth, the day with the highest value of rainfall depth and the average value of rainfall depth for the past 7 days.arrow_forward
- Practice 5.4 Matrix product Write a program that determine the matrix product from the matrix below: 5 2 3 X = 4 G 1 y = 5 L8 11arrow_forwardHomework \#4 Problem \#1 a) Read the data set admitfix.dat (RAW data file) using column format, and create the SAS data set admit sasdata in the Work library. b) Compute BMI using the formula: \[ B M I=\frac{\text { Weight }(l b) \times 703}{(\text { Height(in }))^{2}} \] c) Use PROC CONTENTS to see the variable attributes d) Use PROC PRINT to print the admit_sasdata, and look at the date variable. e) Now use the code below to print the data and look at the output. Do you see any difference? proc print; format date date9.; run; Problem \#2 a) Write a SAS program to read admitFix.dat data using INFILE statement and create an external raw data set (and a temp SAS dataset) with only the observations whose Actlevel = 'HIGH' b) Using PUT statement put the external data to the a folder (eg. / stat5200/MYdata), and call the raw data set as adm high dat Include the following variables (start Col. - End Col.): Name (5-20), Age (28-29), Height (42-43), Weight (49-51), Fee (59-63), Actlevel…arrow_forwardc) (6 points) For each of the following scenarios choose the "best" data structure from the following list or a combination of data structures: an unsorted array, linked list, DLL, circular LL, stack, queue. In each case, justify your answer briefly. i. Suppose that a grocery store decided that customers who come first will be served first. ii. A list must be maintained so that any element can be accessed randomly. iii. A program needs to remember operations it performed in opposite order.arrow_forward
- Example 7: Code the below problem using C++ Sample Input: 1. 4 1234 Sample Output: 16 Ayush has an array a of n integers. He wants to collapse the entire array into a single element. To do this, he can perform the operation described below any number of times. Each operation grants some points, and Ayush's total score will be the sum of the points granted over all operations he performs. Let aſi..j] denote the subarray of a starting at index i and ending at j. Define min; j to be the minimum value in a[i..j]. In one operation he can do the following: • Select any subarray a[i. j] of a of size at least 2 and replace this subarray by a single element equal to the sum of elements of the subarray. The number of points granted by such an operation, which will be added to his total score, is (j – i+1) · min;j. For example, consider an array a = [2, 3, 5]. If he selects the subarray a[1..2], his total score increases by 2 · 2 = 4 points. Now a = [5, 5]. Ayush performs operations until only a…arrow_forwarda)Write the python code about lot sizing with capacity constraints such asr=(20,40,100,35,80,75,25)c=(60,60,60,60,60,60,60)where r is demand and c is capacityb) think about an example which has not the same capscity values. How will be your answer changed at that time?arrow_forwardProblem: 9.19 LAB: Convert to binary - methodsWrite a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0Output x % 2 (remainder is either 0 or 1)x = x / 2Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string. Ex: If the input is: 6the output is: 110Your program must define and call the following two methods. The method integerToReverseBinary() should return a string of 1's and 0's representing the integer in binary (in reverse). The method reverseString() should return a string representing the input string in reverse. public static String integerToReverseBinary(int integerValue)public static String reverseString(String inputString) Java code:import java.util.Scanner; public class LabProgram {/* Define your method here */ public static String integerToReverseBinary(int…arrow_forward
- (python) 13. Identify and fix the errors in the following code. There are a total of 12 errors. define search_binary(xs, target): lb = 0 ub = len(xs)-1 while False: if lb == ub # If empty return -1 # Next probe should be in the middle of the list mid_index = (lb + ub)//2 // Find Middle # Fetch the item at that position item_at_mid == xs[mid_index] # How does the probed item compare to the target? if item_at_mid = target: return: mid_index # Found it! if item_at_mid < target: lb = mid_index + 1 # Use upper half if else: ub = mid_index - 1 # Use lower half list1 = [ -4, 33, -2, 0, 12, 3, -9, 34, 14, -7, 40 ) output("List:",list1) print("Sorted List:", list1.sort) print("Key is located at index " + float(search_binary(14, list1)))arrow_forward1. Assuming the base address of array A is in $X20, and base address of array B is in $X21. Also assume variables i and k are stored in register $X25 and $X26, respectively. What are the corresponding LEGV8 code for the following C code statements? a) A [ 8] = B[ 8] +B[ 2]- 16 b) A [i+ 4] = 4*A[ i] - k c) B[8] = 2*A[i-k]arrow_forwardProblem 3. (Encryption Program) Write a program called encrypt.py that accepts the public-key n (int) and e (int) as command-line arguments and a message to encrypt from standard input, encrypts each character in the message, and writes its fixed-width binary representation to standard output. 'A tuple is like a list, but is immutable. You create a tuple by enclosing comma-separated values within matched parentheses, eg, a = (1, 2, 3). If a is a tuple, a[i] is the ith element in it. 5 / 7 Project 4 (RSA Cryptosystem) >- "/workspace/project4 $ python3 encrypt.py 3599 1759 Cs110 000110000000010011010100001010100011001010100011001110000110010111100100 Directions: • Accept public-key n (int) and e (int) as command-line arguments. • Get the number of bits per character (call it width) needed for encryption, ie, number of bits needed to encode n. • Accept message to encrypt from standard input. • For each character c in message: - Use the built-in function ord() to turn c into an integer x.…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education