Academia.eduAcademia.edu

Virtual Memory

1,224 papers
512 followers
AI Powered
Virtual memory is a memory management technique that enables a computer to use hard disk space as an extension of RAM, allowing for larger addressable memory space than physically available. It facilitates efficient multitasking and process isolation by mapping virtual addresses to physical addresses, enhancing system performance and resource utilization.
viiList of Tables xivList of Figures xviChapter 1 Introduction 11.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.1.1 Why Study Virtual Memory? . . . . . . . . . . . .
Tarantula is an aggressive floating point machine targeted at technical, scientific and bioinformatics workloads, originally planned as a follow-on candidate to the EV8 processor [6, 5]. Tarantula adds to the EV8 core a vector unit... more
Demand prepaging was long ago proposed as a method for taking advantage of high disk bandwidths and avoiding long disk latencies by fetching, at each page fault, not only the demanded page but also other pages predicted to be used soon.... more
 This paper discusses the evolution of ACSE-like protocols in the multimedia communications domain. The ACSE standard has traditionally supported numerous data applications which do not claim quality of service (QoS) guarantees. In a... more
Animation in multimedia is said to be beneficial to learning especially when the learning material demands visual movements. The emergence of 3- Dimensional animated visuals has extended the presentation mode in multimedia learning. It is... more
The A-buffer (anti-aliased, area-averaged, accumulation buffer) is a general hidden surface mechanism suited to medium scale virtual memory computers. It resolves visibility among an arbitrary collection of opaque, transparent, and... more
The Minimum-weight Spanning Tree Problem (MSTP) is one of the most well known problems of combinatorial optimization. It deals with finding the spanning tree of an undirected, connected graph, such that the sum of the weights of the... more
Estudo qualitativo cujo método foi a História de Vida. O objetivo foi analisar os fatores que influenciaram a escolha pelo parto domiciliar, assistido por enfermeira obstetra, a partir da história de vida das mulheres que vivenciaram esta... more
This report briefly describes virtual storage, its structure, operation, and uses. Today's software is developed with virtual memory and its user-friendliness is strong and dynamic. The form of virtual memory is developed primarily based... more
We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software privacy. The memory management unit which provides... more
The Choices operating system architecture [3, 4, 15] uses class hierarchies and object-oriented programming to facilitate the construction of customized operating systems for shared memory and networked multiprocessors. The software is... more
Translation lookaside buffer (TLB) caches virtual to physical address translation information and is used in systems ranging from embedded devices to high-end servers. Since TLB is accessed very frequently and a TLB miss is extremely... more
by Ben Pfaff and 
1 more
Tool paper Tool paper • Series of 4 projects that provide backbone of lab component that accompanies OS course lab component that accompanies OS course • Suitable for Junior/Senior/1 st Grad students • Used by several institutions • Used... more
Spring is a highly modular, distributed, object-oriented operating system. This paper describes the goals of the Spring system and provides overviews of the Spring object model, the security model, and the naming architecture.... more
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient... more
Part Two: It includes questions about topics in the operating system with their answers. The topics are Main memory, Virtual memory, and Processes synchronization. Notes: 1: If this published useful for you, my recommend or follow it. 2:... more
needs and technology, Unix has been modified to provide a staggering number of different mechanisms for managing ob-The Mach operating system can be used as a system software kernel which can support a variety of operating jects and... more
This paper develops a modularization scheme based on the functional model of a system. The modularization approach makes use of the function-behavior-state (FBS) model of the system to derive the entity relations. The design structure... more
by Igor Korkin and 
1 more
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient... more
Menjelaskan tentang apa itu Page Replacement ? mengapa Diperlukan ? & bagaimana Algoritma yang digunakan dalam Page Replacement itu sendiri
Virtual memory is considered to be an unlimited resource in desktop or notebook computers with high storage capabilities. However, in wireless mobile devices, like palmtops and personal digital assistants (PDAs), storage memory is limited... more
The Pilot operating system provides a single-user, single-language environment for higher level software on a powerful personal computer. Its features include virtual memory, a large "fiat" file system, streams, network communication... more
While garbage collection's software engineering benefits are indisputable, its performance impact remains controversial. Garbage collection proponents argue that its benefits outweigh its costs, but it is widely believed that garbage... more
Traditionally there has been a clear distinction between computational (short-term) memory and filestore (long-term memory). This distinction has been maintained mainly due to limitations of technology. Recently there has been... more
The traditional virtual memory system is designed for decades assuming a magnetic disk as the secondary storage. Recently, flash memory becomes a popular storage alternative for many portable devices with the continuing improvements on... more
Sebagian besar algoritma manajemen memori memerlukan satu kebutuhan dasar yaitu instruksi yang akan dieksekusi harus berada di memori fisik. Pada beberapa kasus, keseluruhan program tidak diperlukan. Misalnya :
by Sa'ed Abed and 
1 more
In this paper, we present a methodology for managing the Distributed Virtual Memory (DVM). The methodology includes distributed algorithms for DVM management to detect the memory status which will enhance previous DVM techniques. The DVM... more
Tarantula is an aggressive floating point machine targeted at technical, scientific and bioinformatics workloads, originally planned as a follow-on candidate to the EV8 processor [6, 5]. Tarantula adds to the EV8 core a vector unit... more
Existing virtual memory systems usually work well with applications written in C and C++, but they do not provide adequate support for garbage-collected applications. The performance of garbage-collected applications is sensitive to heap... more
Machine learning induction algorithms are difficult to scale to very large databases because of their memory-bound nature. Using virtual memory results to a significant performance degradation. To overcome such shortcomings, we developed... more
With the advent of multi-processor systems-on-chip, the interest in process migration is again on the rise both in research and in product development. New challenges associated with the new scenario include increased sensitivity to... more
Existing algorithms that fuse level-2 and level-3 fingerprint match scores perform well when the number of features are adequate and the quality of images are acceptable. In practice, fingerprints collected under unconstrained environment... more
MMLite is a modular system architecture that is suitable for a wide variety of hardware and applications. The system provides a selection of object-based components that are dynamically assembled into a full application system. Amongst... more
In today's digital world, computer security issues have become increasingly important. In particular, researchers have proposed designs for secure processors which utilize hardware-based memory encryption and integrity verification to... more
The shift from single to multiple core architectures means that programmers must write concurrent, multithreaded programs in order to increase application performance. Unfortunately, multithreaded applications are susceptible to numerous... more
We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software privacy. The memory management unit which provides... more
Enix is a lightweight dynamic operating system for tightly constrained platforms for wireless sensor networks (WSN). Enix provides a cooperative threading model, which is applicable to event-based WSN applications with little run-time... more
Learning the various structures and levels of memory hierarchy by means of conventional procedures is a complex subject. A didactic simulator of cache memory (MSCSim) was proposed and developed as part of our undergraduate research, to... more
While caches are essential to reduce execution time and power consumption, they complicate the estimation of the Worst-Case Execution Time (WCET), crucial for many Real-Time Systems (RTS). Most research on static worst-case cache behavior... more
Heap size has a huge impact on the performance of garbage collected applications. A heap that barely meets the application's needs causes excessive GC overhead, while a heap that exceeds physical memory induces paging. Choosing the best... more
A tandem queueing system with blocking due to finite waiting room is considered. Maximum throughput is studied by an approximation for several cases. The service time can depend on the number of customers; intermediate arrivals can also... more
Intel Extended Memory 64 Technology (EM64T) and AMD 64-bit architecture (AMD64) are emerging 64-bit x86 architectures that are fully x86 compatible. Compared with the 32-bit x86 architecture, the 64-bit x86 architectures cater some new... more