# Register now to access 7 million high quality study materials (What's Course Hero?) Course Hero is the premier provider of high quality online educational resources. With millions of study documents, online tutors, digital flashcards and free courseware, Course Hero is helping students learn more efficiently and effectively. Whether you're interested in exploring new subjects or mastering key topics for your next exam, Course Hero has the tools you need to achieve your goals.

1 Page

### hw2

Course: CS 199301, Fall 2009
School: Cal Poly Pomona
Rating:

Word Count: 343

#### Document Preview

2 CS Homework 241 Winter 1993 Craig A. Rich Recall the variables used in analyzing page replacement strategies: K is the number of virtual pages referenced (or number of time steps). r is a reference string r(0)r(1)r(2) . . . r(K - 1) consisting of virtual page numbers. m(t) is the number of physical pages available in memory (RAM) at time 0 t &lt; K; it may be called m if constant over time. S(m, t) is...

Register Now

#### Unformatted Document Excerpt

Coursehero >> California >> Cal Poly Pomona >> CS 199301

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.
2 CS Homework 241 Winter 1993 Craig A. Rich Recall the variables used in analyzing page replacement strategies: K is the number of virtual pages referenced (or number of time steps). r is a reference string r(0)r(1)r(2) . . . r(K - 1) consisting of virtual page numbers. m(t) is the number of physical pages available in memory (RAM) at time 0 t < K; it may be called m if constant over time. S(m, t) is the set of virtual pages whose contents appear in memory (RAM) consisting of m physical pages at time 0 t < K. S(t) is the set of virtual pages whose contents appear in memory at time 0 t < K. S(t) is the number of such pages. Z(t) is the set of virtual pages whose contents are replaced between time t and time t + 1. A page replacement strategy has the stack property if S(m, t) S(m + 1, t) for all physical memory sizes m and times t when using that replacement strategy. LRU, OPT, LFU, LIFO, and MRU are page replacement strategies which the have stack property; FIFO does not have the stack property (e.g., it exhibits Belady's anomaly). If a page replacement strategy has the stack property, then S(t) can be "stacked by priority" S1 (t), S2 (t), S3 (t), . . ., defined by the following: If r(t) S(t), then let p be such that r(t) = Sp (t); otherwise let p be S(t) + 1. if i = 1; r(t), Si (t + 1) = min({S1 (t), . . . , Sp-1 (t)} - {S1 (t + 1), . . . , Si-1 (t + 1)}), if 1 < i p; Si (t), if i > p. 1 Consider the reference string r = 1 2 1 (3 1 2)5 3 4 5 4 (6 4 2 7 5)3. For each page replace...

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

MN State - C - 160
Chem 160 Fall 2004 Small group and lecture Tentative Course ScheduleDate Aug. 23 Aug. 25 Aug. 27 Aug. 30 Sept. 1 Sept. 3 Sept. 8 Sept. 10 Sept. 13 Sept. 15 Sept. 17 Sept. 20 Sept. 22 Sept. 24 Sept. 27 Sept. 29 Oct. 1 Oct. 4 Oct. 6 Oct. 8 Oct. 11 Oct. 13
N.C. State - EC - 201
North Carolina State University Department of Economics EC 201: Introduction to Microeconomics Summer 2008, Section 2 Prof. Fanis TsoulouhasOffice: 4144 Nelson Mailing address: Box 8110 URL: http:/ec201.tsoulouhas.info E-mail: fanis_tsoulouhas@ncsu.eduC
Virginia Tech - USA - 1918
Kerr: Cop Pictures Dodge at End of Rope [events of June 22-28, 1918]1Cop Pictures Dodge at End of Rope, the Victim of Mob:Associate Protests Innocence of WIIU Leader Who Comes to Trial on Monday on Charge of Evading the Draft[events of June 22-28, 191
Virginia Tech - USA - 1923
Haessler: Police Report that Real Bullets Were Fired at William Z. Foster [Sept. 8, 1923]1Police Report that Real Bullets Were Fired at W.Z. Fosterby Carl HaesslerPublished in Voice of Labor [Chicago: WPA], v. 11, no. 617 (Sept. 8, 1923), pg. 1.(Fede
Virginia Tech - USA - 1923
Title Goes Here1The Militants' Next Stepin the campaign for Amalgamation and a Labor Party must be the publication ofA National Workers Dailyin the English languageA Nationwide Campaign opened to raise a \$100,000 FundThe time for this step is not o
Virginia Tech - USA - 1923
Engdahl: The Yellow Streak in Coal [1923]1The Yellow Streak in Coal.by J. Louis EngdahlPublished in The Liberator [New York], v. 9, whole no. 65 (Sept. 1923), pp. 23-25.&quot;COAL!&quot; is the word that is drawing biggest upon the fear of America, with the pa
Virginia Tech - USA - 1923
Johnstone: Attempt to Murder Foster [event of Aug. 27, 1923]1Attempt to Murder Foster!Gunmen Burst in on Union Meeting and Open Fire on Labor Leader as He Commenced Speaking at Protest Meeting Against Expulsion of Garments Unionists by Perlstein. [even
Virginia Tech - USA - 1923
Debs: Getting Together [April 1923]1Getting Together.by Eugene V. DebsPublished in The Labor Herald [Chicago], v. 2, no. 2 (April 1923), pp. 3-4.The urgent, imperative need of thoroughgoing working-class unity was never so glaringly manifested as it
Virginia Tech - USA - 1923
Virginia Tech - USA - 1922
William Z. Foster Defeats Colorado Ranger Autocrat [event of Dec. 31, 1922]1W.Z. Foster Defeats Ranger Autocrat:Labor Leader Returns to Denver and State Official Who Deported Him in Violation of Law Resigns.[event of Dec. 31, 1922]Published in the Mi
Virginia Tech - USA - 1922
Foster: The Bankruptcy of the American Labor Movement [1922]1The Bankruptcy of the American Labor Movement.by William Z. FosterWritten October 1922. Published as &quot;No. 4&quot; in the &quot;Labor Heral Library&quot; by the Trade Union Educational League, 1922.CHAPTER
Virginia Tech - USA - 1922
Foster: The Crisis on the Railroads [June 17, 1922]1The Crisis on the Railroadsby William Z. FosterA typeset leaflet dated June 17, 1922 and designated &quot;for immediate release&quot; by the Workers Party Press Service, 166 W Washington Street, Room 307, Chic
Virginia Tech - USA - 1922
Foster: The Principles and Program of TUEL [March 1922]1The Principles and Program of the Trade Union Educational Leagueby William Z. FosterPublished in The Labor Herald [Chicago], March 1922. Reprinted as a 4 page leaflet by TUEL, specimen in Cominte
Virginia Tech - USA - 1921
Felts in Bluefield, WV to Burns in Washington, DC [Sept. 29, 1921]1Letter to William J. Burns, Director of the Bureau of Investigation, US Dept. of Justice in Washington, DC from T.L. Felts, Baldwin-Felts Detectives, in Bluefield, West Virginia,Septemb
Virginia Tech - USA - 1921
Cannon: The Story of Alex Howat [April 1921]1The Story of Alex Howat.by James P. CannonPublished in The Liberator, v. 4, no. 4 (April 1921), pp. 25-26.Alexander Howat is the President of District 14 of the United Mine Workers. He has been an ofcer of
Virginia Tech - USA - 1922
RILU: Resolutions and Decisions of 2nd World Congress [Nov. 1922]1Resolutions and Decisions of the Second World Congress of the Red International of Labor Unions:Moscow November 1922.Published as No. 6 in the Labor Herald Library (Chicago: Trade Union
Virginia Tech - USA - 1922
RILU Constitution [as of 2nd Congress, Nov. 1922]1Constitution of the Red International of Labor Unions,as of 2nd World Congress - Nov. 1922.Published as No. 6 in the Labor Herald Library (Chicago: Trade Union Educational League, 1923).Introduction.
Virginia Tech - USA - 1921
Foster: Wherefore Stand Ye Divided? [May 28, 1921]1Wherefore Stand Ye Divided?by William Z. FosterPublished in The New Day [Chicago], v. 2, no. 22, whole no. 51 (May 28, 1921), pp. 3, 6.Whence comes the notorious weakness of radicalism in all its pha
Virginia Tech - USA - 1921
Browder: Note to Trotsky on Communists in American Unions [May 9, 1921]1Note to Leon Trotsky Regarding a Survey on Conditions in America Distributed in Advance of the 1st World Congress of RILU from Earl Browder, Delegate, in Moscow,May 9, 1921.Docume
Virginia Tech - USA - 1921
American Bureau, RILU: Appeal to American Workers [May 1921]1Appeal to American Workers[May 1921] Leaflet of the American Bureau International Council of Trade and Industrial Unions [Prontern]Copy in DoJ/BoI Investigative Files, NARA collection M-108
National Taiwan University - MBA - 810
Fisher College of Business, OSU: MBA 810 Final Exam, Winter 2001 Please answer the following 6 questions. You have two hours to complete the exam. If necessary, invoke assumptions but state them clearly. There are a total of 80 points. Good luck.1. Helen
SUNY Oswego - MUS - 101
What is Jazz Quotes from various writers on the evolution of Jazz Music Jazz music is an American art. Ira Gilter, Smithsonian Institute This is clear: Jazz arose not in Africa, not in Europe, and not in the Caribbean, but in the United States, thanks to
University of North Carolina, Wilmington - CHM - 102
Acid-Base Properties of IonsNeutral Ions Cations of the alkali and alkaline earth metals (e.g. Na+, K+, Ca2+) Conjugate bases of monoprotic strong acids (e.g. Cl-, Br-, NO3-) Acidic Ions Cations of the transition metals (e.g. Fe3+, Co2+, Mn4+) Conjugate
University of North Carolina, Wilmington - CHM - 102
CHM-102Practice ProblemsHCN (hydrocyanic acid) is a weak acid with a Ka of 6.2 x 10-10. (a) Write an equation showing the reaction of HCN with water.(b) Write the equilibrium expression for this reaction.(c) Determine the pH of a 0.15 M solution of HC
University of North Carolina, Wilmington - CHM - 102
CHM-102 Acid-Base Review Name(s)1. Copy the formulas for acids and bases listed below into the boxes that correctly identify the acid-base properties of the substances. Acids: HCl, HNO2, CH3CO2H, HClO4, H2SO4, HClO2 Bases: CH3NH2, NH3, KOH, C6H7N, Ca(OH)
University of North Carolina, Wilmington - CHM - 102
CHM-102-01Classroom Problems1. Calculate the boiling point of a solution prepared by dissolving 45 g of NaCl in 200 g of water. (Kb = 0.512 Ckg/mol)2.Naphthalene, the ingredient of old-fashioned moth balls, is a hydrocarbon with the empirical formula
University of North Carolina, Wilmington - CHM - 102
CHM-102 Review Materials:Exam 4 ReviewChapters covered: 16.5-16.11, 17 all, 20.1-20.5 Online homework: 16a, 16b, 17a, 17b, 20a, 20b Other: Be sure to bring your calculator, extra batteries, and two #2 pencils to the examImportant Equations from Chapter
University of North Carolina, Wilmington - CHM - 102
CHM-102 Review Materials:Exam 4 ReviewChapters covered: 16.5-16.11, 17 all, 20.1-20.5 Online homework: 16a, 16b, 17a, 17b, 20a, 20b Other: Be sure to bring your calculator, extra batteries, and two #2 pencils to the examImportant Equations from Chapter
University of North Carolina, Wilmington - CHM - 102
CHM-102Exam 3 ReviewReview Materials: Chapters covered: 14.5-14.7 (omit section on mechanisms with a fast initial step), 15.115.7, 16.116.5. Practice Test: 3 (1-15) Online Homework: 14b, 15a, 16a Be sure to bring your calculator and two #2 pencils to th
Ole Miss - ENGR - 311
trus3ra = 0 4rb = 3 4rc = 6 4rd = 3 2re = 0 0rab = 3 0rbc = 3 0red = 3 2rdc = 3 2rad = 3 -2rbd = 0 -2lab = 3lbc = 3led = 3.6056ldc = 3.6056lad = 3.6056lbd = 2uab = 1 0ubc = 1 0ued = 0.8321 0.5547udc = 0.8321 0.554
MO St. Louis - COURSE - 5890
Date: Monday, October 21, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on Public Key CryptographyPublic-key encipherment conceptEach user in a secure communication network has a private key, which he keeps s
Ole Miss - ENGR - 311
trus2ra = 3 -4 0rb = 3 2 0rc = -2 2 0rd = 0 0 8rab = 0 6 0rbc = -5 0 0rca = 5 -6 0rda = 3 -4 -8rdb = 3 2 -8rdc = -2 2 -8lab = 6lbc = 5lca = 7.8102lda = 9.4340ldb = 8.7750ldc = 8.4853uab = 0 1 0ubc = -1 0 0uca = 0.6402
Ole Miss - ENGR - 311
trus1V = -1H = 1ra = 5 5rb = 0 0rc = 10 0rab = -5 -5rac = 5 -5lab = 7.0711lac = 7.0711uab = -0.7071 -0.7071uac = 0.7071 -0.7071b = -1 1A = -0.7071 0.7071 -0.7071 -0.7071F = 0.0000 -1.4142bb = -1 1diary offtrus1V = -1
Ole Miss - ENGR - 311
%-% ENGR311%% Method of Joints:% Simple Space Truss Examples- Tripod%% Dr. Chris L. Mullen% 1-25-99%%- % Position Vectors for Jointsra=[3,-4,0]rb=[3,2,0]rc=[-2,2,0]rd=[0,0,8]% Relative Position Vectors Defining Member Orientationrab=rb-ra
University of Alabama in Huntsville - CPE - 631
CPE 631 Advanced Computer Systems Architecture: Homework #3,#4Issued: 04/09/2007 Due: 04/18/2007 Name:_ Q1 20 Q2 20 Q3 20 Q4 60 Q5 40 Total 160Question #1: (20 points) 1.1 (20 points) Consider the following code sequence executing on a CPU using the Tom
Youngstown - M - 1571
Calculus I FINAL EXAMINATION MATH 585H Name: 1. Consider the following functions of x where x is in the interval [0, 2]. Which one is not continuous at x = 1? a) |x 1| b)x2 9 x+3c) f (x) = cfw_x3 if x 1 2 2x 1 if x &lt; 1 xd)(x1)2 |x1|e) none of the a
Harvard - CSCIE - 259
i) Symbolic simplificaton of algebraic expressionsii) Robert Gauthieriii) I would like to take simple algebraic expressions and perform simple mathmatical operations on them such as addition,subtraction, and multiplication.iv) I would have a servlet
University of Alaska Fairbanks - ZOOL - 575
Introduction to Biosystematics - Zool 575Introduction to Biosystematics Lecture 24 - Confidence - AssessmentOutline1. Mechanistic comparison with Parsimony - branch lengths &amp; parameters 2. Performance comparison with Parsimony - Desirable attributes of
Oregon State University - PH - 211
Answer, Key Homework 9 David McIntyre 45123 May 10, 2004 This print-out should have 16 questions. Multiple-choice questions may continue on the next column or page find all choices before making your selection. The due time is Central time. Chapter 8 prob
SUNY Oswego - CSC - 350
Script started on XXX XXX XX 13:20:09 XXXX &gt; plWelcome to SWI-Prolog (Multi-threaded, Version 5.6.24)Copyright (c) 1990-2006 University of Amsterdam.SWI-Prolog comes with ABSOLUTELY NO WARRANTY. This is free software,and you are welcome to redistribu
SUNY Oswego - CSC - 350
t aitch 6:43pm &gt;plWelcome to SWI-Prolog (Version 2.7.16)Copyright (c) 1993-1996 University of Amsterdam. All rights reserved.For help, use ?- help(Topic). or ?- apropos(Word).1 ?- [all].proc.p compiled, 0.00 sec, 2,408 bytes.dict.p compiled, 0.00 s
North-West Uni. - MAW - 962
10th Annual Symposium About Language and Society - Austin April 12-14, 20021. a.1Meccan /aarb/-Insertion (MI). fiil fuul gaal a mad qur?aan hina a taram altagaah gaabalu `elephant' `beans' `he said' `Ahmad' `Koran' `here' `he respected' `he found it' `h
Lehigh - PHYS - 352
Homework 8 with Solutions (1) Using Stokes Vectors and Mller Matrices calculate the output polarization for an input polarzation of 45o after the following for elements in series i. Polarizer at 600 ii. Polarizer at 45o iii. /2 plate oriented with slow ax
Northeastern University - CSG - 252
Signature SchemesCSG 252 Fall 2006 Riccardo PucellaSignaturesSignatures in &quot;real life&quot; have a number of properties They specify the person &quot;responsible&quot; for a document E.g. that it has been produced by the person, or that the person agrees with the doc
Northeastern University - CSG - 252
Key Distribution and Agreement SchemesCSG 252 Fall 2006 Riccardo PucellaKey Establishment ProblemPK cryptosystems have advantages over SK cryptosystems PKCs do not need a secure channel to establish secret keys However, PKCs generally less efficient th
Northeastern University - CSG - 252
Hash FunctionsCSG 252 Fall 2006 Riccardo PucellaHashes provide assure of data integrity. Hash function: construct a short fingerprint of a message (often called a message digest) - e.g. 160 bits in size. Given message x, compute h(x), and store in a saf
Northeastern University - CSG - 252
Public Key CryptographyCSG 252 Fall 2006 Riccardo PucellaAll cryptosystems until now have used a shared key between senders and receivers. Disadvantage: need to somehow share a key before communicating. In 1976, Die and Hellman proposed a scheme where t
Northeastern University - CSG - 252
Block CiphersCSG 252 Fall 2006 Riccardo PucellaProduct CiphersA way to combine cryptosystems For simplicity, assume endomorphic cryptosystems Where C=P S1 = (P, P, K1, E1, D1) S2 = (P, P, K2, E2, D2) Product cryptosystem S1S2 is dened to be (P, P, K1K2
Northeastern University - CSG - 252
Shannons Theory of Secure CommunicationCSG 252 Fall 2006 Riccardo PucellaIntroductionLast time, we have seen various cryptosystems, and some cryptanalyses How do you ascertain the security of a cryptosystem? Some reasonable ideas: Computational Securit
Northeastern University - CSU - 520
VisionChapter 24Chapter 241Outline Perception generally Image formation Early vision 2D 3D Object recognitionChapter 242Perception generallyStimulus (percept) S, World W S = g(W ) E.g., g = &quot;graphics.&quot; Can we do vision as inverse graphics? W = g
Northeastern University - CSG - 224
The FrameNet Data and SoftwareCollin F. Baker International Computer Science Institute Berkeley, California, USA collinb@icsi.berkeley.eduHiroaki Sato Senshu University Kawasaki, Japan hiroaki@ics.senshu-u.ac.jpAbstractThe FrameNet project has develop
Northeastern University - CSG - 224
MessageU n d e r s t a n d i n g C o n f e r e n c e - 6: A Brief HistoryBeth Sundheim Naval Command, Control and Ocean Surveillance Center Research, Development, Test and Evaluation Division (NRaD) Code 44208 53140 Gatchell Road San Diego, CMifornia 92
Northeastern University - CSG - 224
SENSEVAL-3: Third International Workshop on the Evaluation of Systems for the Semantic Analysis of Text, Barcelona, Spain, July 2004 Association for Computational LinguisticsSENSEVAL-3 TASK Word-Sense Disambiguation of WordNet Glosses Kenneth C. Litkowsk
Northeastern University - CSG - 256
Designing Hardware for Microsoft Operating SystemsMicrosoft Extensible Firmware Initiative FAT32 File System SpecificationFAT: General Overview of On-Disk FormatVersion 1.03, December 6, 2000 Microsoft Corporation The FAT (File Allocation Table) file s
Lake County - CS - 554
CSE 512/CS 554 Homework Assignment 1 Due January 29, 2008 1. (a) If one worker can dig a post hole in one hour, can sixty workers dig the post hole in one minute? Why? (b) If one worker can drive a railroad spike with a sledgehammer in two minutes, can tw
Northeastern University - CSG - 399
Enforcing Security PoliciesRahul GeraBrief overviewSecurity policies and Execution Monitoring. Policies that can be enforced using EM. An automata based formalism for specifying those security policies. Mechanisms for enforcing policies defined by the
Northeastern University - CSG - 399
Adversary Modeling to Develop Forensic ObservablesBy John Lowry, Rico Valdez, Brad WoodPresented by: Ignacio Marin-Garcia imaringa@coe.neu.edu http:/www.coe.neu.edu/~imaringa/IntroductionThe current models are based in an asymmetrical system in which:
Northeastern University - CSG - 399
Model Checking for Authentication ProtocolsWill Marrero Edmmd Clarke Somesh Jha Present for Course CSG399 Jingsong Feng Northeastern UniversityIntroductionBAN logic need &quot;protocol idealization&quot; step when use its formalism. The model checking approach e
Northeastern University - CSG - 399
Access Controls and Trust ManagementZach KisselReferencesA State-Transition Model of Trust Management and Access Control Ajay Chander, Drew Dean, and John C. Mitchell Reconstructing Trust Management Ajay Chander, Drew Dean, and John C. MitchellOvervie
Northeastern University - CSG - 399
Constraint Solving for Protocol AnalysisPapers by Jonathan Millen and Vitaly Shmatikov&quot;Constraint Solving for Bounded-Process Cryptographic Protocol Analysis&quot;Presentation by James WexlerIntro to Constraint Satisfaction Problems Set of variables that
Northeastern University - CSG - 399
Is your braid secure?An Analysis of security protocols dependent upon Braid Group Cryptography. By: Wendy MintonReferences: New Key Agreement Protocol in Braid Group Cryptogra phy by Iris Anshel, Michael Anshel, Benji Fisher, and Do rian Goldfied. A Pra