AAAA Java

Assignment:
Please download the starter code from here (https://canvas.vt.edu/courses/185343/files/33260937?
wrap=1)
(https://canvas.vt.edu/courses/185343/files/33260937/download?download_frd=1) .
For your last project, you will write a memory management package for storing variable length records in a large memory space, and you will use a hash table to access the records by a simple key value. (The records will be a serialized version of the seminar information.) For background on memory managers, see Chapter 11 in OpenDSA
(https://canvas.vt.edu/courses/190133/modules/items/2703411) . Your memory manager will use the buddy method for allocating space from the memory pool, as described in Module 11.9.1.1
(https://canvas.vt.edu/courses/190133/modules/items/2703420) .
Your memory pool will consist of a large array of bytes. Initially, this array will be some power of two specified by a command line parameter. If a request comes to store a record that there is no room to store, then you will replace the current byte array with a new one that is twice as long, and copy all of the contents of the old byte array to the new one before attempting again to satisfy the request. (check the sample output file for a suitable message to print in this case). When a record is to be removed from the database, its associated block of bytes is given back to the freeblock list maintained by the memory manager. Be sure when a block is released to merge it with its buddy if the buddy is free, as shown in the Buddy Method visualization at OpenDSA. Potentially, this could cause a cascade of buddy merges.
Aside from the memory manager’s memory pool and freeblock list, the other major data structure for your project will be a closed hash table ( Module 10.6
(https://canvas.vt.edu/courses/190133/assignments/1965092?module_item_id=2703402) ) for storing an integer as the search key (this will be the ID field for the records being stored), and a memory manager handle as the data. For information on hash tables, see the chapter on Hashing in the OpenDSA textbook ( Chapter 10 (https://canvas.vt.edu/courses/190133/modules/items/2703392) ).
You will use double hashing as described in Module 10.7.4
(https://canvas.vt.edu/courses/190133/assignments/1965093?module_item_id=2703404) . In particular, you will use the approach shown in the second slideshow of that section. The hash table size will always be a power of two. When hashing key value k (the ID value) h ( k ) = k mod M which is simply the ID mod the table size, and h ( k ) = ((( k/M ) mod ( M/ 2)) 2) + 1. The key difference from what OpenDSA describes is that your hash tables must be extensible. That is, you will start with a hash table of a certain size (defined when the program starts). This must be a power of two,
or the program should immediately terminate with an error message. If the hash table exceeds 50% full, then you will replace the array with another that is twice the size, and rehash all of the records from the old array For example, say that the hash table has 32 slots. Inserting 16 records is OK. When you try to insert the 17th record, you would first re-hash all of the original 16 records
into a table of 64 slots.
The hash table will somehow need to distinguish each record’s key from the rest of that record’s value. Ideally, it is shielded from the fact that records are stored in a memory manager. One possible design is to store the key (one field of the record) and some sort of reference to the rest of the record, Another is to store the memory manager’s “Handle” to the data record. (A handle is the value returned by the memory manager when a request is made to insert a new record into the memory pool. This handle is used to recover the record.) Another design is to hide all of these implementation details behind a Record object (with key and data), and let the Hash system get its necessary information through the Record’s methods.

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/web/24986.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

LLVM Cpu0 新后端8 尾调用优化 Stack Overflow Exception异常

想好好熟悉一下llvm开发一个新后端都要干什么,于是参考了老师的系列文章: LLVM 后端实践笔记 代码在这里(还没来得及准备,先用网盘暂存一下): 链接: https://pan.baidu.com/s/1V_tZkt9uvxo5bnUufhMQ_Q?…

java生成pdf通过接口下载

pom <!--生成pdf--> <dependency><groupId>com.itextpdf</groupId><artifactId>itextpdf</artifactId><version>5.5.11</version> </dependency>demo package com.example.controller;import com.itextpdf.text.*; im…

【iOS】JSONModel源码阅读笔记

文章目录 前言一、JSONModel使用二、JSONModel其他方法转换属性名称 三、源码分析- (instancetype)initWithDictionary:(NSDictionary*)dict error:(NSError **)err[self init]__setup____inspectProperties - (BOOL)__doesDictionary:(NSDictionary*)dict matchModelWithKeyMa…

android集成百度文心一言实现对话功能,实战项目讲解,人人都能拥有一款ai应用

大家好&#xff0c;今天给大家讲解下如何实现一个基于百度文心一言的app功能&#xff0c;app内部同时集成了讯飞的语音识别。本文适用于有android基础的小伙伴阅读&#xff0c;文章末尾放上本项目用到的全部实例代码&#xff0c;在使用前请务必看完本文章。 先来给大家看看效果…

微信小程序毕业设计-医院挂号系统项目开发实战(附源码+论文)

大家好&#xff01;我是程序猿老A&#xff0c;感谢您阅读本文&#xff0c;欢迎一键三连哦。 &#x1f49e;当前专栏&#xff1a;微信小程序毕业设计 精彩专栏推荐&#x1f447;&#x1f3fb;&#x1f447;&#x1f3fb;&#x1f447;&#x1f3fb; &#x1f380; Python毕业设计…

Linux 36.3 + JetPack v6.0@jetson-inference之图像分类

Linux 36.3 JetPack v6.0jetson-inference之图像分类 1. 源由2. imagenet2.1 命令选项2.2 下载模型2.3 操作示例2.3.1 单张照片2.3.2 视频 3. 代码3.1 Python3.2 C 4. 参考资料5. 补充5.1 第一次运行模型本地适应初始化5.2 samba软连接 1. 源由 从应用角度来说&#xff0c;图…

python-NLP常用数据集0.1.022

python-NLP常用数据集0.1.022 MRPC数据集XNLI数据集SQuAD数据集 MRPC数据集 Microsoft Research Paraphrase Corpus 3600个数据 下载地址&#xff1a;https://gist.github.com/W4ngatang/60c2bdb54d156a41194446737ce03e2e格式 Quality #1 ID #2 ID #1 String #2 String 1 1…

【java】JVM前端编译器的局限性

目录 1. 不涉及编译优化2.功能限制3. 静态编译特性4. 与AOT编译器的对比 1. 不涉及编译优化 1.前端编译器的主要任务是将符合Java语法规范的Java代码转换为符合JVM规范的字节码文件2.并不会直接涉及编译优化等方面的技术。3.具体的优化细节通常是由HotSpot的JIT(Just In Time)…

IO数据流

数据流将“基本数据类型与字符串类型”作为数据源&#xff0c;从而允许程序以与机器无关的方式从底层输入输出流中操作Java基本数据类型与字符串类型。 DataInputStream和OutputStream提供了可以存取与机器无关的所有Java基础类型数据&#xff08;如&#xff1a;int、double、…

【Python入门与进阶】Pycharm配置与优化

1. 简介 PyCharm 是一款功能强大的 Python 集成开发环境(IDE),由 JetBrains 公司开发。它提供了丰富的代码编写、调试、测试等功能,广泛应用于Python 项目开发中。 - 智能代码提示和自动补全 - 支持多种Python框架和库 - 强大的调试和测试功能 - 集成版本控…

软件测试--第十一章 设计和维护测试用例

1.单选题 (2分) 下面有关测试设计的叙述,说法不正确的是( )。 A 测试用例的设计是一项技术性强.智力密集型的活动 B 在开展测试用例设计前,必须将测试需求进行详细展开 C 在一般的测试组织内,测试用例的评审可能不是正式的评审会 D 在测试用例设计时,只设计覆盖正常流程和操…

CAN协议简介

协议简介 can协议是一种用于控制网络的通信协议。它是一种基于广播的多主机总线网络协议&#xff0c;常用于工业自动化和控制领域。can协议具有高可靠性、实时性强和抗干扰能力强的特点&#xff0c;被广泛应用于汽车、机械、航空等领域。 can协议采用了先进的冲突检测和错误检测…

Application Load Balancer-ALB

Application Load Balancer-ALB 什么是ALB开通ALB服务实现IPv4服务的负载均衡创建ALB实例创建服务器组添加后端服务器配置监听设置域名解析&#xff08;可选&#xff09;释放ALB实例 什么是ALB 在介绍ALB之前首先介绍一下负载均衡SLB&#xff0c;可以说SLB是负载均衡家族之首 …

ubuntu20.04 安装OpenSSL 1.0.2o (借助腾讯AI完全OK)

文章目录 ubuntu20.04安装openssl-1.0.2o安装后看不到版本信息如何解决 腾讯云 AI 代码助手: 要确认 Linux 开发板的 CPU 是多少位的&#xff0c;可以使用以下方法&#xff1a; 打开终端。输入以下命令&#xff0c;然后按回车键&#xff1a; cat /proc/cpuinfo这将显示关于 CP…

Elastic Search(ES)Java 入门实操(3)数据同步

基本概念和数据查询代码&#xff1a; Elastic Search &#xff08;ES&#xff09;Java 入门实操&#xff08;1&#xff09;下载安装、概念-CSDN博客 Elastic Search&#xff08;ES&#xff09;Java 入门实操&#xff08;2&#xff09;搜索代码-CSDN博客 想要使用 ES 来查询数…

【WEB前端2024】3D智体编程:乔布斯3D纪念馆-第37课-自动切换纹理

【WEB前端2024】3D智体编程&#xff1a;乔布斯3D纪念馆-第37课-自动切换纹理 使用dtns.network德塔世界&#xff08;开源的智体世界引擎&#xff09;&#xff0c;策划和设计《乔布斯超大型的开源3D纪念馆》的系列教程。dtns.network是一款主要由JavaScript编写的智体世界引擎&…

jupyter notebook使用conda环境

pycharm中安装过可以使用的库在jupyter notebook中导入不进来 1 检查pycharm中安装的库的位置 2 检查jupyter notebook中安装的库的位置 3 查看jupyter notebook内核名字 可以看到jupyter notebook中内核名字叫ipykernel 4 安装ipykernel 在pycharm的terminal中 pip instal…

Web前端的宋体:深入剖析与未来展望

Web前端的宋体&#xff1a;深入剖析与未来展望 在数字时代的浪潮中&#xff0c;Web前端技术如一股清新的宋体之风&#xff0c;为互联网世界带来了独特的美学体验与交互魅力。然而&#xff0c;这看似简单的“宋体”二字&#xff0c;却蕴含着丰富的内涵与无尽的可能。那么&#…

【C语言】动态内存经典笔试题(下卷)

前言 如果说动态内存是C语言给我们的一个工具&#xff0c;那么只有掌握了工具的特点我们才能更好地使用。 紧随上卷&#xff0c;我们再来看看动态内存另外两道经典的笔试题。 &#xff08;建议没看过上卷的朋友可以先看完上卷再回来&#xff1a;【C语言】动态内存经典笔试题…

项目总结报告(Word模板)

2 项目工作成果 2.1 交付给用户的产品 2.2 交付给研发中心的产品 2.2.1 代码部分 2.2.2 文档部分 2.3 需求完成情况与功能及性能符合性统计 2.3.1 需求完成情况统计 2.3.2 功能符合性分析 2.3.3 性能符合性分析 3 项目工作分析 3.1 项目计划与进度实施分析 3.1.1 开发进度 3.1.…