On-the-Fly Array Initialization in Less Space
نویسندگان
چکیده
We show that for all given n, t, w ∈ {1, 2, . . .} with n < 2, an array of n entries of w bits each can be represented on a word RAM with a word length of w bits in at most nw + dn(t/(2w))e bits of uninitialized memory to support constant-time initialization of the whole array and O(t)-time reading and writing of individual array entries. At one end of this tradeoff, we achieve initialization and access (i.e., reading and writing) in constant time with nw+dn/we bits for arbitrary fixed t, to be compared with nw+Θ(n) bits for the best previous solution, and at the opposite end, still with constant-time initialization, we support O(logn)-time access with just nw + 1 bits, which is optimal for arbitrary access times if the initialization executes fewer than n steps.
منابع مشابه
Data Structure Choices for On-the-Fly Model Checking of Real-Time Systems
This paper studies the performance of sparsematrix-based data structures to represent clock zones (convex sets of clock values) in an on-the-fly predicate equation system model checker for timed automata. We analyze the impact of replacing the dense difference bound matrix (DBM) with both the linked-list CRDZone and array-list CRDArray data structure. From analysis on the pairedexample-by-examp...
متن کاملDevelopment a New Technique Based on Least Square Method to Synthesize the Pattern of Equally Space Linear Arrays
Using the sampled data of a desired pattern is a common technique in pattern synthesizing of array factor (AF) of antenna arrays. Based on the obtained data matrix, Least Square Method (LSM) is used to calculate the exciting coefficient of array elements. The most important parameter, which involves the accuracy and complexity of calculation, is the sampling rate of the desired pattern. Classic...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملReduction of olive fly, Bactrocera oleae (Rossi, 1790), damage by selecting native and exotic olive cultivars
Olive fly is the most dangerous pest in olive groves worldwide. Therefore the study of the most susceptible and resistant cultivars to olive fly can bring new information to diminish the olive flies harmful impacts. The main goal of the present study is to verify the olfactory response of olive fly to olive volatiles from five native Iranian cultivars (Fishomi, Mari, Rowghani, Shengeh, and Zard...
متن کاملDEVELOPING A NEW INITIALIZATION PROCEDURE FOR DISTILLATION COLUMN SIMULATION
The simulation of distillation columns is an essential step in design, optimization, and rating. In this paper, a new procedure has been proposed for the initial estimation of column profiles based on modified Kremser’s group method for simple and/or complex columns. The effect of this initialization algorithm on simulation procedure has been studied through two examples. The results show sig...
متن کامل