.数据结构 假设有M个进程N类资源,则有如下数据结构: MAX[M*N] M个进程对N类资源的最大需求量 Available[N] 系统可用资源数 ALLOCATION[M*N] M个进程已经得到N类资源的资源量 NEED[M*N] M个进程还需要N类资源的资源量 2.银行家算法 设进程I提出请求Request[N],则银行家算法按如下规则进行判断。 (1)如果Request[N]<=NEED[I,N],则转(2);否则,出错。 (2)如果Request[N]<=Available,则转(3);否则,出错。 (3)系统试探分配资源,修改相关数据: Available=Available-REQUEST ALLOCATION=ALLOCATION+REQUEST NEED=NEED-REQUEST (4)系统执行安全性检查,如安全,则分配成立;否则试探险性分配作废,系统恢复原状,进程等待。 3.安全性检查 (1)设置两个工作向量WORK=Available;FINISH[M]=FALSE (2)从进程集合中找到一个满足下述条件的进程, FINISH[i]=FALSE NEED<=WORK 如找到,执行(3);否则,执行(4) (3)设进程获得资源,可顺利执行,直至完成,从而释放资源。 WORK=WORK+ALLOCATION FINISH=TRUE GO TO 2 (4)如所有的进程Finish[M]=true,则表示安全;否则系统不安全。
上传时间: 2014-01-05
上传用户:moshushi0009
数据结构 假设有M个进程N类资源,则有如下数据结构: MAX[M*N] M个进程对N类资源的最大需求量 Available[N] 系统可用资源数 ALLOCATION[M*N] M个进程已经得到N类资源的资源量 NEED[M*N] M个进程还需要N类资源的资源量 2.银行家算法 设进程I提出请求Request[N],则银行家算法按如下规则进行判断。 (1)如果Request[N]<=NEED[I,N],则转(2);否则,出错。 (2)如果Request[N]<=Available,则转(3);否则,出错。 (3)系统试探分配资源,修改相关数据: Available=Available-REQUEST ALLOCATION=ALLOCATION+REQUEST NEED=NEED-REQUEST (4)系统执行安全性检查,如安全,则分配成立;否则试探险性分配作废,系统恢复原状,进程等待。 3.安全性检查 (1)设置两个工作向量WORK=Available;FINISH[M]=FALSE (2)从进程集合中找到一个满足下述条件的进程, FINISH[i]=FALSE NEED<=WORK 如找到,执行(3);否则,执行(4) (3)设进程获得资源,可顺利执行,直至完成,从而释放资源。 WORK=WORK+ALLOCATION FINISH=TRUE GO TO 2 (4)如所有的进程Finish[M]=true,则表示安全;否则系统不安全。
上传时间: 2013-12-24
上传用户:alan-ee
aPLib is a 32-bit compression library based on the compression algorithm used in aPACK (my executable packer). aPLib is an easy-to-use alternative to many of the heavy-weight compression libraries Available.
标签: compression algorithm executa library
上传时间: 2013-11-30
上传用户:一诺88
The module LSQ is for unconstrained linear least-squares fitting. It is based upon Applied Statistics algorithm AS 274 (see comments at the start of the module). A planar-rotation algorithm is used to update the QR- factorization. This makes it suitable for updating regressions as more data become Available. The module contains a test for singularities which is simpler and quicker than calculating the singular-value decomposition. An important feature of the algorithm is that it does not square the condition number. The matrix X X is not formed. Hence it is suitable for ill- conditioned problems, such as fitting polynomials. By taking advantage of the MODULE facility, it has been possible to remove many of the arguments to routines. Apart from the new function VARPRD, and a back-substitution routine BKSUB2 which it calls, the routines behave as in AS 274.
标签: least-squares unconstrained Statisti Applied
上传时间: 2015-05-14
上传用户:aig85
A C++ N-grams Package 2.0 This is a simple C++ n-grams package that includes a header, the corresponding cpp file, and a sample driver program. It is a natural language processing tool for creating n-gram profiles for text documents. The details on usage is documented in the header right above each public function defined. This package is based on Dr. Vlado Keselj s Perl package Text::Ngrams which is Available in CPAN.
标签: includes correspo N-grams Package
上传时间: 2015-06-12
上传用户:wfl_yy
Copyright Copyright © 2004 O Reilly Media, Inc. Printed in the United States of America. Published by O Reilly MediaInc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O Reilly & Associates books may be purchased for educational, business, or sales promotional use. Online editions are also Available for most titles (http://safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com. Nutshell Handbook, the Nutshell Handbook logo, and the O Reilly logo are registered trademarks of O Reilly Media, Inc The Cookbook series designations, Java Servlet and JSP Cookbook, the image of a fennec fox, and related trade dress are trademarks of O Reilly & Associates, Inc. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc., in the United States
标签: Copyright America Printed Reilly
上传时间: 2014-08-20
上传用户:lps11188
YSS915 (KP2V2) is an LSI for processing Karaoke voice signals. This LSI has an A/D converter (1 channel) for the microphone echo, and a memory for the microphone echo and key control. These features allow achieving the functions needed for the Karaoke system by using only one LSI chip. As for the microphone echoes, many other types of echoes are Available in addition to ordinary ones so that YSS915 is applicable to various uses. In addition to these Karaoke programs, YSS915 is able to provide the Movie & Music programs, with which the surround effect is applied to the movie and music sources for giving the users more enjoyment. YSS915 is pin compatible with and register compatible with YSS903 (KP2V).
标签: processing LSI converter Karaoke
上传时间: 2015-06-23
上传用户:lijianyu172
A series of .c and .m files which allow one to perform univariate and bivariate wavelet analysis of discrete time series. Noother wavelet package is necessary -- everything is contained in this archive. The C-code computes the DWT and maximal overlap DWT. MATLAB routines are then used to compute such quantities as the wavelet variance, covariance, correlation, cross-covariance and cross-correlation. Approximate confidence intervals are Available for all quantities except the cross-covariance and cross-correlation. A set of commands is provided. For a description of this example, please see http://www.eurandom.tue.nl/whitcher/software/.
标签: univariate and bivariate analysis
上传时间: 2015-06-23
上传用户:chongcongying
Person-to-person realtime IP communications, like presence, VoIP and video applications, offer clear benefits for the enterprise as time- and money-savers. Unified functionality is now Available, where all of the above are integrated into one streamlined application and interconnect with other networks. This creates a very important business tool and usage is increasing.
标签: Person-to-person communications applications realtime
上传时间: 2015-06-28
上传用户:维子哥哥
MIB Browser allows you to view the hierarchy of SNMP MIB variables in the form of a tree and provides you with additional information about each node. With MIB Browser you can easily load (compile) standard and proprietary MIB files, view and manipulate data that is Available in an SNMP agent.
标签: MIB the hierarchy variables
上传时间: 2015-06-30
上传用户:eclipse