120 Pages

Solution Manual

Course: CS 153, Spring 2008

School: UC Riverside

Word Count: 38951

Rating:

Document Preview

INSTRUCTOR'S MANUAL TO ACCOMPANY OPERATING SYSTEM CONCEPTS SIXTH EDITION ABRAHAM SILBERSCHATZ Bell Laboratories PETER BAER GALVIN Corporate Technologies GREG GAGNE Westminster College Copyright c 2001 A. Silberschatz, P. Galvin and Greg Gagne PREFACE This volume is an instructor's manual for the Sixth Edition of Operating-System Concepts by Abraham Silberschatz, Peter Baer Galvin, and Greg Gagne. It consists...

Unformatted Document Excerpt
Coursehero >> California >> UC Riverside >> CS 153

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

MANUAL INSTRUCTOR'S TO ACCOMPANY OPERATING SYSTEM CONCEPTS SIXTH EDITION ABRAHAM SILBERSCHATZ Bell Laboratories PETER BAER GALVIN Corporate Technologies GREG GAGNE Westminster College Copyright c 2001 A. Silberschatz, P. Galvin and Greg Gagne PREFACE This volume is an instructor's manual for the Sixth Edition of Operating-System Concepts by Abraham Silberschatz, Peter Baer Galvin, and Greg Gagne. It consists of answers to the exercises in the parent text. In cases where the answer to a question involves a long program, algorithm development, or an essay, no answer is given, but simply the keywords "No Answer" are added. Although we have tried to produce an instructor's manual that will aid all of the users of our book as much as possible, there can always be improvements (improved answers, additional questions, sample test questions, programming projects, alternative orders of presentation of the material, additional references, and so on). We invite you, both instructors and students, to help us in improving this manual. If you have better solutions to the exercises or other items which would be of use with Operating-System Concepts, we invite you to send them to us for consideration in later editions of this manual. All contributions will, of course, be properly credited to their contributor. Internet electronic mail should be addressed to avi@bell-labs.com. Physical mail may be sent to Avi Silberschatz, Information Sciences Research Center, MH 2T-310, Bell Laboratories, 600 Mountain Avenue, Murray Hill, NJ 07974, USA. A. S. P. B. G G. G. iii CONTENTS Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Computer-System Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Operating-System Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 CPU Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Process Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Deadlocks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Memory Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Virtual Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 File-System Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 File-System Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 I/O Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Mass-Storage Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Distributed System Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Distributed File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Distributed Coordination. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 The Linux System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Windows 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Appendix A The FreeBSD System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Appendix B The Mach System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 v Chapter 1 INTRODUCTION Chapter 1 introduces the general topic of operating systems and a handful of important concepts (multiprogramming, time sharing, distributed system, and so on). The purpose is to show why operating systems are what they are by showing how they developed. In operating systems, as in much of computer science, we are led to the present by the paths we took in the past, and we can better understand both the present and the future by understanding the past. Additional work that might be considered is learning about the particular systems that the students will have access to at your institution. This is still just a general overview, as specific interfaces are considered in Chapter 3. Answers to Exercises 1.1 What are the three main purposes of an operating system? Answer: To provide an environment for a computer user to execute programs on computer hardware in a convenient and efficient manner. To allocate the separate resources of the computer as needed to solve the problem given. The allocation process should be as fair and efficient as possible. As a control program it serves two major functions: (1) supervision of the execution of user programs to prevent errors and improper use of the computer, and (2) management of the operation and control of I/O devices. 1.2 List the four steps that are necessary to run a program on a completely dedicated machine. Register to View AnswerReserve machine time. b. Manually load program into memory. c. Load starting address and begin execution. d. Monitor and control execution of program from console. 1 2 Chapter 1 Introduction 1.3 What is the main advantage of multiprogramming? Answer: Multiprogramming makes efficient use of the CPU by overlapping the demands for the CPU and its I/O devices from various users. It attempts to increase CPU utilization by always having something for the CPU to execute. 1.4 What are the main differences between operating systems for mainframe computers and personal computers? Answer: The design goals of operating systems for those machines are quite different. PCs are inexpensive, so wasted resources like CPU cycles are inconsequential. Resources are wasted to improve usability and increase software user interface functionality. Mainframes are the opposite, so resource use is maximized, at the expensive of ease of use. 1.5 In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems. a. What are two such problems? b. Can we ensure the same degree of security in a time-shared machine as we have in a dedicated machine? Explain your answer. Register to View AnswerStealing or copying one's programs or data; using system resources (CPU, memory, disk space, peripherals) without proper accounting. b. Probably not, since any protection scheme devised by humans can inevitably be broken by a human, and the more complex the scheme, the more difficult it is to feel confident of its correct implementation. 1.6 Define the essential properties of the following types of operating systems: a. Batch b. Interactive c. Time sharing d. Real time e. Network f. Distributed Register to View AnswerBatch. Jobs with similar needs are batched together and run through the computer as a group by an operator or automatic job sequencer. Performance is increased by attempting to keep CPU and I/O devices busy at all times through buffering, off-line operation, spooling, and multiprogramming. Batch is good for executing large jobs that need little interaction; it can be submitted and picked up later. b. Interactive. This system is composed of many short transactions where the results of the next transaction may be unpredictable. Response time needs to be short (seconds) since the user submits and waits for the result. c. Time sharing. This systems uses CPU scheduling and multiprogramming to provide economical interactive use of a system. The CPU switches rapidly from one user to another. Instead of having a job defined by spooled card images, each program reads Answers to Exercises 3 its next control card from the terminal, and output is normally printed immediately to the screen. d. Real time. Often used in a dedicated application, this system reads information from sensors and must respond within a fixed amount of time to ensure correct performance. e. Network. f. Distributed.This system distributes computation among several physical processors. The processors do not share memory or a clock. Instead, each processor has its own local memory. They communicate with each other through various communication lines, such as a high-speed bus or telephone line. 1.7 We have stressed the need for an operating system to make efficient use of the computing hardware. When is it appropriate for the operating system to forsake this principle and to "waste" resources? Why is such a system not really wasteful? Answer: Single-user systems should maximize use of the system for the user. A GUI might "waste" CPU cycles, but it optimizes the user's interaction with the system. 1.8 Under what circumstances would a user be better off using a time-sharing system, rather than a personal computer or single-user workstation? Answer: When there are few other users, the task is large, and the hardware is fast, timesharing makes sense. The full power of the system can be brought to bear on the user's problem. The problem can be solved faster than on a personal computer. Another case occurs when lots of other users need resources at the same time. A personal computer is best when the job is small enough to be executed reasonably on it and when performance is sufficient to execute the program to the user's satisfaction. 1.9 Describe the differences between symmetric and asymmetric multiprocessing. What are three advantages and one disadvantage of multiprocessor systems? Answer: Symmetric multiprocessing treats all processors as equals, and I/O can be processed on any CPU. Asymmetric multiprocessing has one master CPU and the remainder CPUs are slaves. The master distributes tasks among the slaves, and I/O is usually done by the master only. Multiprocessors can save money by not duplicating power supplies, housings, and peripherals. They can execute programs more quickly and can have increased reliability. They are also more complex in both hardware and software than uniprocessor systems. 1.10 What is the main difficulty that a programmer must overcome in writing an operating system for a real-time environment? Answer: The main difficulty is keeping the operating system within the fixed time constraints of a real-time system. If the system does not complete a task in a certain time frame, it may cause a breakdown of the entire system it is running. Therefore when writing an operating system for a real-time system, the writer must be sure that his scheduling schemes don't allow response time to exceed the time constraint. 1.11 Consider the various definitions of operating system. Consider whether the operating system should include applications such as Web browsers and mail programs. Argue both that it should and that it should not, and support your answer. Answer: No answer. 1.12 What are the tradeoffs inherent in handheld computers? Answer: No answer. 4 Chapter 1 Introduction 1.13 Consider a computing cluster consisting of two nodes running a database. Describe two ways in which the cluster software can manage access to the data on the disk. Discuss the benefits and detriments of each. Answer: No answer. Chapter 2 COMPUTER-SYSTEM STRUCTURES Chapter 2 discusses the general structure of computer systems. It may be a good idea to review the basic concepts of machine organization and assembly language programming. The students should be comfortable with the concepts of memory, CPU, registers, I/O, interrupts, instructions, and the instruction execution cycle. Since the operating system is the interface between the hardware and user programs, a good understanding of operating systems requires an understanding of both hardware and programs. Answers to Exercises 2.1 Prefetching is a method of overlapping the I/O of a job with that job's own computation. The idea is simple. After a read operation completes and the job is about to start operating on the data, the input device is instructed to begin the next read immediately. The CPU and input device are then both busy. With luck, by the time the job is ready for the next data item, the input device will have finished reading that data item. The CPU can then begin processing the newly read data, while the input device starts to read the following data. A similar idea can be used for output. In this case, the job creates data that are put into a buffer until an output device can accept them. Compare the prefetching scheme with the spooling scheme, where the CPU overlaps the input of one job with the computation and output of other jobs. Answer: Prefetching is a user-based activity, while spooling is a system-based activity. Spooling is a much more effective way of overlapping I/O and CPU operations. 2.2 How does the distinction between monitor mode and user mode function as a rudimentary form of protection (security) system? Answer: By establishing a set of privileged instructions that can be executed only when in the monitor mode, the operating system is assured of controlling the entire system at all times. 2.3 What are the differences between a trap and an interrupt? What is the use of each function? Answer: An interrupt is a hardware-generated change-of-flow within the system. An interrupt handler is summoned to deal with the cause of the interrupt; control is then re- 5 6 Chapter 2 Computer-System Structures turned to the interrupted context and instruction. A trap is a software-generated interrupt. An interrupt can be used to signal the completion of an I/O to obviate the need for device polling. A trap can be used to call operating system routines or to catch arithmetic errors. 2.4 For what types of operations is DMA useful? Explain your answer. Answer: DMA is useful for transferring large quantities of data between memory and devices. It eliminates the need for the CPU to be involved in the transfer, allowing the transfer to complete more quickly and the CPU to perform other tasks concurrently. 2.5 Which of the following instructions should be privileged? a. Set value of timer. b. Read the clock. c. Clear memory. d. Turn off interrupts. e. Switch from user to monitor mode. Answer: The following instructions should be privileged: a. Set value of timer. b. Clear memory. c. Turn off interrupts. d. Switch from user to monitor mode. 2.6 Some computer systems do not provide a privileged mode of operation in hardware. Consider whether it is possible to construct a secure operating system for these computers. Give arguments both that it is and that it is not possible. Answer: An operating system for a machine of this type would need to remain in control (or monitor mode) at all times. This could be accomplished by two methods: a. Software interpretation of all user programs (like some BASIC, APL, and LISP systems, for example). The software interpreter would provide, in software, what the hardware does not provide. b. Require meant that all programs be written in high-level languages so that all object code is compiler-produced. The compiler would generate (either in-line or by function calls) the protection checks that the hardware is missing. 2.7 Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself. Describe two difficulties that you think could arise with such a scheme. Answer: The data required by the operating system (passwords, access controls, accounting information, and so on) would have to be stored in or passed through unprotected memory and thus be accessible to unauthorized users. 2.8 Protecting the operating system is crucial to ensuring that the computer system operates correctly. Provision of this protection is the reason behind dual-mode operation, memory protection, and the timer. To allow maximum flexibility, however, we would also like to place minimal constraints on the user. The following is a list of operations that are normally protected. What is the minimal set of instructions that must be protected? Answers to Exercises 7 a. Change to user mode. b. Change to monitor mode. c. Read from monitor memory. d. Write into monitor memory. e. Fetch an instruction from monitor memory. f. Turn on timer interrupt. g. Turn off timer interrupt. Answer: The minimal set of instructions that must be protected are: a. Change to monitor mode. b. Read from monitor memory. c. Write into monitor memory. d. Turn off timer interrupt. 2.9 Give two reasons why caches are useful. What problems do they solve? What problems do they cause? If a cache can be made as large as the device for which it is caching (for instance, a cache as large as a disk), why not make it that large and eliminate the device? Answer: Caches are useful when two or more components need to exchange data, and the components perform transfers at differing speeds. Cahces solve the transfer problem by providing a buffer of intermediate speed between the components. If the fast device finds the data it needs in the cache, it need not wait for the slower device. The data in the cache must be kept consistent with the data in the components. If a component has a data value change, and the datum is also in the cache, the cache must also be updated. This is especially a problem on multiprocessor systems where more than one process may be accessing a datum. A component may be eliminated by an equal-sized cache, but only if: (a) the cache and the component have equivalent state-saving capacity (that is, if the component retains its data when electricity is removed, the cache must retain data as well), and (b) the cache is affordable, because faster storage tends to be more expensive. 2.10 Writing an operating system that can operate without interference from malicious or undebugged user programs requires some hardware assistance. Name three hardware aids for writing an operating system, and describe how they could be used together to protect the operating system. Register to View AnswerMonitor/user mode b. Privileged instructions c. Timer d. Memory protection 2.11 Some CPUs provide for more than two modes of operation. What are two possible uses of these multiple modes? Answer: No answer. 2.12 What are the main differences between a WAN and a LAN? Answer: No answer. 8 Chapter 2 Computer-System Structures 2.13 What network configuration would best suit the following environ- ments? a. A dormitory floor b. A university campus c. A state d. A nation Answer: No answer. Chapter 3 OPERATING-SYSTEM STRUCTURES Chapter 3 is concerned with the operating-system interfaces that users (or at least programmers) actually see: system calls. The treatment is somewhat vague since more detail requires picking a specific system to discuss. This chapter is best supplemented with exactly this detail for the specific system the students have at hand. Ideally they should study the system calls and write some programs making system calls. This chapter also ties together several important concepts including layered design, virtual machines, Java and the Java virtual machine, system design and implementation, system generation, and the policy/mechanism difference. Answers to Exercises 3.1 What are the five major activities of an operating system in regard to process management? Answer: The creation and deletion of both user and system processes The suspension and resumption of processes The provision of mechanisms for process synchronization The provision of mechanisms for process communication The provision of mechanisms for deadlock handling 3.2 What are the three major activities of an operating system in regard to memory management? Answer: Keep track of which parts of memory are currently being used and by whom. Decide which processes are to be loaded into memory when memory space becomes available. Allocate and deallocate memory space as needed. 9 10 Chapter 3 Operating-System Structures 3.3 What are the three major activities of an operating system in regard to secondary-storage management? Answer: Free-space management. Storage allocation. Disk scheduling. 3.4 What are the five major activities of an operating system in regard to file management? Answer: The creation and deletion of files The creation and deletion of directories The support of primitives for manipulating files and directories The mapping of files onto secondary storage The backup of files on stable (nonvolatile) storage media 3.5 What is the purpose of the command interpreter? Why is it usually separate from the kernel? Answer: It reads commands from the user or from a file of commands and executes them, usually by turning them into one or more system calls. It is usually not part of the kernel since the command interpreter is subject to changes. 3.6 List five services provided by an operating system. Explain how each provides convenience to the users. Explain also in which cases it would be impossible for user-level programs to provide these services. Answer: Program execution. The operating system loads the contents (or sections) of a file into memory and begins its execution. A user-level program could not be trusted to properly allocate CPU time. I/O operations. Disks, tapes, serial lines, and other devices must be communicated with at a very low level. The user need only specify the device and the operation to perform on it, while the system converts that request into device- or controller-specific commands. User-level programs cannot be trusted to only access devices they should have access to and to only access them when they are otherwise unused. File-system manipulation. There are many details in file creation, deletion, allocation, and naming that users should not have to perform. Blocks of disk space are used by files and must be tracked. Deleting a file requires removing the name file information and freeing the allocated blocks. Protections must also be checked to assure proper file access. User programs could neither ensure adherence to protection methods nor be trusted to allocate only free blocks and deallocate blocks on file deletion. Communications. Message passing between systems requires messages be turned into packets of information, sent to the network controller, transmitted across a communications medium, and reassembled by the destination system. Packet ordering and data correction must take place. Again, user programs might not coordinate access to the network device, or they might receive packets destined for other processes. Answers to Exercises 11 Err...

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Iowa State - EE - 434
EE 434 Lecture 4Digital Systems A previewQuiz 2A die is 2500u on a side, comes from an 8" wafer that costs $1200 in a process with a defect density of 1.2/cm2. Determine the cost per good die as limited by the hard faults in processing.2500And the nu
Colorado State - RESOURCES - 452
MIPS Assembly Language ProgrammingCS50 Discussion and Project BookDaniel J. Ellard September, 1994Contents1 Data Representation 1.1 Representing Integers . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1 Unsigned Binary Numbers . . . . . . .
East Los Angeles College - WAE - 006
Serendipities and SynchronicitiesPete StolleryThis piece was commissioned by the Reeling & Writhing Theatre Company, Glasgow as part of Standing Wave, a play about the life and music of Delia Derbyshire, who worked at the BBC Radiophonic Workshop in Lon
UMass (Amherst) - CS - 453
Wireshark Lab: 802.11Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights ReservedComputer Networking: A Topth down Approach, 4 edition.In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re
Western Kentucky University - WEB - 102
July 30, 2006ArchitectureA Church in France Is Almost a Triumph for Le Corbusier By NICOLAI OUROUSSOFFFirminy, FranceMORE than 40 years after he drowned off a remote beach in the south of France, Le Corbusier remains a transcendent force. Even if som
Western Kentucky University - WEB - 323
Maryland Sets a Health Cost for Wal-MartNew York TimesJanuary 13, 2006 By Michael Barbaro ANNAPOLIS, Md., Jan. 12 - The Maryland legislature passed a law Thursday that would require Wal-Mart Stores to increase spending on employee health insurance,
East Los Angeles College - PH - 2420
University of Colorado Denver - M - 4010
Solving Polynomial EquationsPart IIIFerrari and the BiquadraticFerrari's solution of the quartic (biquadratic) equation involved the introduction of a new variable and then specializing this variable to put the equation into a form that could easily be
udg.edu - IMA - 3105200728
A Project Management Primeror a guide on how to make projects work by Nick JenkinsNick Jenkins, 2005This work is licensed under the Creative Commons (Attribution-NonCommercial-ShareAlike) 2.5 License.To view a copy of this license, visit [http:/creativ
East Los Angeles College - CS - 230
cs230 midterm examrules: close book, 2 hours, no cheating Q1. Program A loop: lb beqz bne add con: add j . data str: .asciiz "abdlfjkwkjeelfkejlasdf" str: char: .asciiz "e" $t1, $t1, 1 loop $t0, str($t1) $t0, strEnd $t0, $t3, con $t2, $t2, 1 con: add j .
Illinois Tech - CS - 560
CS 115Week 11: Lecture OutlineObjectives: 1. To understand the basic List Operations. 2. To know how to use a key to establish the order of a sorted list. 3. To recognize the difference between an array and a list. 4. To know how to search for an item u
Illinois Tech - CS - 560
CS 115Week 10: Lecture OutlineObjectives: 1. To understand the difference between atomic and composite data types. 2. To understand the difference between unstructured and structured composite data types. 3. To understand how java implements arrays. 4.
Lake County - CONF - 134
Determinants of Beef and Pork Brand Equity by Joe L. Parcell and Ted SchroederSuggested citation format: Parcell, J. L., and T. Schroeder. 2003. Determinants of Beef and Pork Brand Equity. Proceedings of the NCR-134 Conference on Applied Commodity Price
Lake County - CONF - 134
Market Integration: Case Studies of Structural Change by Jason R.V. Franken and Joe L. ParcellSuggested citation format: Franken, J. R.V., and J. L. Parcell. 2003. Market Integration: Case Studies of Structural Change. Proceedings of the NCR-134 Conferen
Lake County - CONF - 134
Calendar vs. Weeks to Expiration Livestock Basis Forecasts: Which Is Better? by Glynn T. Tonsor, James R. Mintert, and Kevin C. DhuyvetterSuggested citation format: Tonsor, G. T., J. R. Mintert, and Kevin C. Dhuyvetter. 2003. Calendar vs. Weeks to Expira
Lake County - CONF - 134
Using Private Risk Management Instruments to Manage Counter-Cyclical Payment Risks under the New Farm Bill by John D. Anderson, Keith H. Coble, and J. Corey MillerSuggested citation format: Anderson, J. D., K. H. Coble, and J. C. Miller. 2003. "Using Pri
Lake County - CONF - 134
Keep up the Good Work? An Evaluation of the USDAs Livestock Price Forecasts by Dwight R. Sanders and Mark R. ManfredoSuggested citation format: Sanders, D. R., and M. R. Manfredo. 2003. Keep up the Good Work? An Evaluation of the USDAs Livestock Price Fo
Lake County - CONF - 134
Comparing the Performances of the Partial Equilibrium and Time-Series Approaches to Hedging by Henry L. Bryant and Michael S. HaighSuggested citation format: Bryant, H. L., and M. S. Haigh. 2003. Comparing the Performances of the Partial Equilibrium and
Lake County - CONF - 134
Risk Management Techniques for Agricultural Cooperatives: An Empirical Evaluation by Mark Manfredo, Timothy Richards, and Scott McdermottSuggested citation format: Manfredo, M., T. Richards, and S. Mcdermott. 2003. Risk Management Techniques for Agricult
Lake County - CONF - 134
An ARCH Analysis of the Hedging Performance of Imminently Maturing Futures ContractsRoger A. Dahlgran*Paper presented at the NCR-134 Conference on Applied Commodity Price Analysis, Forecasting, and Market Risk Management St. Louis, Missouri, April 21-22
Lake County - CONF - 134
Evaluation of Market Advisory Service Performance in Hogs by Rick L. Webber, Scott H. Irwin, Darrel L. Good, and Joao Martines-FilhoSuggested citation format: Webber, R. L., S. H. Irwin, D. L. Good, and J. Martines-Filho. 2003. Evaluation of Market Advis
Lake County - CONF - 134
Pricing Weather Derivatives for Agricultural Risk Management by Timothy J. Richards, Mark R. Manfredo, and Dwight R. SandersSuggested citation format: Richards, T. J., M. R. Manfredo, and D. R. Sanders. 2003. Pricing Weather Derivatives for Agricultural
Lake County - CONF - 134
USDA Interval Forecasts of Corn and Soybean Prices: Overconfidence or Rational Inaccuracy? by Olga Isengildina, Scott H. Irwin, and Darrel L. GoodSuggested citation format: Isengildina, O., S. H. Irwin, and D. L. Good. 2003. USDA Interval Forecasts of Co
Lake County - CONF - 134
The Feasibility of a Boxed Beef Futures Contract: Hedging Wholesale Beef Cuts by Fabio Mattos, Philip Garcia, Raymond Leuthold, and Tony HahnSuggested citation format: Mattos, F., P. Garcia, R. Leuthold, and T. Hahn. 2003. "The Feasibility of a Boxed Bee
N. Arizona - FILES - 1094
Northern Arizona University Center for International EducationFor information regarding Northern Arizona University Study Abroad application process please visit the Center for International Education website at: http:/international.nau.edu/ Steps to Tak
Purdue - MA - 166
North Texas - JAM - 0023
Rey Hummond2809 Christopher Drive Denton TX 76209 (940) 300-7639ReyHummond@yahoo.com Objective Seeking an entry-level actuarial position- Willing to relocate Progress Towards Actuarial Certification Completed Actuarial Exams P and FM Will complete VEE
University of Hawaii - Hilo - ENGLISH - 308
PublishingaWebsite ontheUHWebServerThatNamTranTonLastupdated:05/2008PUBLISHINGAWEBSITEONTHEUHWEBSERVERBasedonUHMnoasITSwebsite|http:/www.hawaii.edu/personalhp/FORSUPPORT: 9568883| help@hawaii.edu|http:/www.hawaii.edu/itsOverviewTheseinstructions
N. Illinois - MATH - 240
MATH 240 Prof. John Beachy 1 0 1. (15 pts) For A = 0 0 2 0 0 0EXAM II Solutions10/26/2007 Show all necessary work. No calculators. 0 1 1 3 , nd the rank and nullity of A, and nd a basis for the nullspace of A. 0 0 00Since there are 2 nonzero rows, the
George Mason - PSY - 701
What happens when we encounter somethingnew? Chapter 8 Knowledge (Semantic Memory)Why Categories are UsefulWhy Categories are Useful Help to understand individual cases never "Pointers to knowledge"encountered Help to understand individual cases ne
George Mason - PSY - 701
What is Imagery? Mental imagery: experiencing a sensoryChapter 9 Visual Imageryimpression in the absence of sensory input Visual imagery: seeing in the absence of a visual stimulusImageless Thought Controversy The Behaviorists! Galton Asked people a
George Mason - MASON - 601
Competitive Analysis The purpose of the competitive analysis is to investigate current mobile devices and current classroom and learning technologies to mine potential features and build upon proven or promising designs for consideration in the mobile web
Lake County - WORKSHOP - 112000
Development of a Java-Based Watershed/Channel Model for High Energy Mountain WatershedsFrank H. WeirichThe University of Iowa, Iowa City, USAM. SayeeduzzamanThe University of Iowa, Iowa City, USAMark WilsonThe University of Iowa, Iowa City, USAABST
Lake County - WORKSHOP - 112000
IIHRActivitiesGeneralGoalsGeneralGoals River3DDevelopcommunitycodesandapplication portalsbasedonlongstandingexpertisein theareaofCFDandriverprocesses Developcommunitycodesandapplication portalsforwatershedmodeling jANSWERSFY00Accomplishments River3
Lake County - WORKSHOP - 112000
PapersWaterIntakePumpBays:ThreeDimensionalModeling, Validation,andApplication bySonghengLi,YongG.Lai,V.C.Patel, JoseMatosSilvaRockyReachDam:AComprehensiveLookattheCalibrationof byLarryJ.Weber,YongG.Lai,Jeffrey aNumericalModelAppliedtoFishPassage C.Blank
Lake County - WORKSHOP - 112000
Cactus and Grid ComputingThe Cactus Team Here today: Ed Seidel, Gabrielle Allen Albert Einstein Institutecactus@cactuscode.org Cactus, a new community simulation code framework Toolkit for any PDE systems, ray tracing, etc. Suite of solvers for Einste
Lake County - WORKSHOP - 112000
Environmental Hydrology Team MeetingPrimary Alliance Objectives in Year 4 Show how the Alliance has demonstratably changed the nations computational infrastructure Show explicitly how we have empowered communities to do things better Focus on deployment
Lake County - WORKSHOP - 112000
http:/marine.rutgers.edu/po/HaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelHaidvogelSimulation of the Southeastern Bering Sea and Gulf of Alaska Using Coupled R
Lake County - WORKSHOP - 112000
Observations on Architecture, Protocols, Services, APIs, SDKs, and the Role of the Grid ForumIan Foster With: Carl Kesselman, Steven Tuecke Thanks also to: Bill Johnston, Marty Humphrey, Rusty Lusk, Reagan Moore, and others1Overview1. 2. 3. 4. 5.The
Lake County - WORKSHOP - 112000
NCSA OPIE Presentation November 2000National Center for Supercomputing ApplicationsNational Center for Supercomputing ApplicationsWhat is OPIE The Open Portal Interface Environment is a system to combine data on the web presentation layer. Up to 9 fre
Lake County - WORKSHOP - 112000
HDF5 WorkEnvironmental Hydrology Team Workshop Nov 2, 2000 HDF Team http:/hdf.ncsa.uiuc.edu/HDF5University of Illinois at Urbana-ChampaignNCSAWhat is HDF5 HDF5 is a scientific file format Self-described Platform-independent http:/hdf.ncsa.uiuc.edu/H
Lake County - WORKSHOP - 112000
Deliverables for EH TeamCode WRF ROMS Enhancment HDF5, benchmarking on Intel boxes Benchmarking and Tuning Release Metric of Use Target Population University/goverrnment research community/ forecast units/SME/OCean coupling event handling SME/Ocean coup
Lake County - WORKSHOP - 112000
VisualizationPolly Baker Division Director: Data, Mining, and Visualization November 2, 2000National Computational ScienceOutline Hardware environments Production VR environments Follow-on environments for display and userinteraction Software VisB
Washington - PCC - 587
5686JOURNAL OF CLIMATEVOLUME 19Robust Responses of the Hydrological Cycle to Global WarmingISAAC M. HELDNational Oceanic and Atmospheric Administration/Geophysical Fluid Dynamics Laboratory, Princeton, New JerseyBRIAN J. SODENRosenstiel School for
Montana - NCR - 101
Additional considerationsIntroduction Conditions in controlled environment plant growth rooms and chambers (CE units) should be reported in detail for comparison of results and duplication of experiments. The minimum guidelines table, along with these no
University of Hawaii - Hilo - ICS - 101
PowerPoint Day3 Objectives Review/New "functions modifying a PowerPoint Design Template to be "your own" (customizing) o change the color scheme o add own picture bullets (importing images) o changing font face, color o formatting placeholders o etc. hidi
UNL - MATH - 896
The beamer classManual for version 3.07.\begincfw_frame \frametitlecfw_There Is No Largest Prime Number \framesubtitlecfw_The proof uses \textitcfw_reductio ad absurdum. \begincfw_theorem There is no largest prime number. \endcfw_theorem \begincfw_proof
UNC Wilmington - CSC - 242
Chapter 10 And, Finally. The StackCopyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.Stack: An Abstract Data TypeAn important abstraction that you will encounter in many applications. We will describe three uses:
UNC Wilmington - CSC - 242
Chapter 11 Introduction to Programming in CCopyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.C: A High-Level LanguageGives symbolic names to values don't need to know which register or memory locationProvides a
NYU - CPS - 272
Reading Group4/27/20091 Morozov Sergei 2 Matthes Christian 3 Zilberman Eduardo 4 Bigio Saki 5 Nascimento Leandro 6 Zhu Shenghao 7 Presno Ignacio 8 Orlik Anna 9 Wang Peng 10 Flynn Sean 11 Tretvoll Hakon 12 Barillas Francisco 13 Modalsli Jrgen 14 Smith Ma
LSU - AAA - 8184
FederalTaxCreditsforEnergy-Efficient HomeImprovementsin2006-2008Cutting Taxes and Energy Costs A Win-Win UncleSamisencouragingtaxpayerstoinvestinenergy- efficient home improvements and systems that use renewable sources of energy (like the sun
Villanova - ECE - 8700
UNC - BWV - 853
Fuga VIIIa 3 vociJohann Sebastian Bach (16851750) BWV 8537121722Public Domain22732374247523586368737883Sheet music from www. MutopiaProject .org Free to download, with the freedom to distribute, modify and perform. Typeset using www.
Villanova - ECE - 8700
Northeastern - COM - 3355
Syntax of a subset of quirk20. [Revision 0]<program> := <classdec><type> := <primtype> | <typeid> | <type> []<primtype> := boolean | String | int<rtype> := <type> | void<classdec> := class <typeid> cfw_ <bodydecs> <bodydec> := <access> <constde
University of Illinois, Urbana Champaign - CS - 498
The Ethics of Privacy and SecurityMichael C. LouiProfessor of Electrical and Computer Engineering University Distinguished Teacher/Scholar University of Illinois at Urbana-Champaign October 5, 20051What will we do today? Short interactive lecture on
N.C. State - MA - 302
Instructor In-class Matlab Calculations Consider the vibrating string model. Describe the subroutine ode45() for systems. Examine the code file stringode.m 1. point out the input, execution and output sections 2. indicate the input variables 3. indicate
Washington - OC - 400
Lecture 4 What Controls the Composition of SeawaterSeawater is salty! Why? How is the composition of river water different from seawater? What controls the composition of riverwater? What happens when you evaporate riverwater? What controls the compositi
BU - CN - 550
c, , 143 () Kluwer Academic Publishers, Boston. Manufactured in The Netherlands.A Tutorial on Support Vector Machines for Pattern RecognitionCHRISTOPHER J.C. BURGESBell Laboratories, Lucent Technologies burges@lucent.comAbstract. The tutorial starts
Hudson VCC - BOTANY - 104
PhytochromeChapter 17 *Turn over for remaining questions!* Name _1. Light can be used by plants in two ways: as an energy source for photosynthesis, and as a trigger for photomorphogenesis. What is photomorphogenesis? (1 point)2. Phytochrome is a dimer
SPSU - SWE - 4724
Slide 11B.1Object-Oriented and Classical Software EngineeringSixth Edition, WCB/McGraw-Hill, 2005Stephen R. Schachsrs@vuse.vanderbilt.edu The McGraw-Hill Companies, 2005CHAPTER 11 Unit BSlide 11B.2CLASSICAL ANALYSIS The McGraw-Hill Companies, 200