On-the-Fly Array Initialization in Less Space

نویسندگان

  • Torben Hagerup
  • Frank Kammer
چکیده

We show that for all given n, t, w ∈ {1, 2, . . .} with n < 2, an array of n entries of w bits each can be represented on a word RAM with a word length of w bits in at most nw + dn(t/(2w))e bits of uninitialized memory to support constant-time initialization of the whole array and O(t)-time reading and writing of individual array entries. At one end of this tradeoff, we achieve initialization and access (i.e., reading and writing) in constant time with nw+dn/we bits for arbitrary fixed t, to be compared with nw+Θ(n) bits for the best previous solution, and at the opposite end, still with constant-time initialization, we support O(logn)-time access with just nw + 1 bits, which is optimal for arbitrary access times if the initialization executes fewer than n steps.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Structure Choices for On-the-Fly Model Checking of Real-Time Systems

This paper studies the performance of sparsematrix-based data structures to represent clock zones (convex sets of clock values) in an on-the-fly predicate equation system model checker for timed automata. We analyze the impact of replacing the dense difference bound matrix (DBM) with both the linked-list CRDZone and array-list CRDArray data structure. From analysis on the pairedexample-by-examp...

متن کامل

Development a New Technique Based on Least Square Method to Synthesize the Pattern of Equally Space Linear Arrays

Using the sampled data of a desired pattern is a common technique in pattern synthesizing of array factor (AF) of antenna arrays. Based on the obtained data matrix, Least Square Method (LSM) is used to calculate the exciting coefficient of array elements. The most important parameter, which involves the accuracy and complexity of calculation, is the sampling rate of the desired pattern. Classic...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

Reduction of olive fly, Bactrocera oleae (Rossi, 1790), damage by selecting native and exotic olive cultivars

Olive fly is the most dangerous pest in olive groves worldwide. Therefore the study of the most susceptible and resistant cultivars to olive fly can bring new information to diminish the olive flies harmful impacts. The main goal of the present study is to verify the olfactory response of olive fly to olive volatiles from five native Iranian cultivars (Fishomi, Mari, Rowghani, Shengeh, and Zard...

متن کامل

DEVELOPING A NEW INITIALIZATION PROCEDURE FOR DISTILLATION COLUMN SIMULATION

  The simulation of distillation columns is an essential step in design, optimization, and rating. In this paper, a new procedure has been proposed for the initial estimation of column profiles based on modified Kremser’s group method for simple and/or complex columns. The effect of this initialization algorithm on simulation procedure has been studied through two examples. The results show sig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017