Explain main requirements satisfy by page replacement policy, Computer Engineering

List out the main requirements between page replacement policies which should be satisfied by a page replacement policy?

The major requirements that should be satisfied by a page replacement policy are as:

1. Non-interference with the locality of program of reference: The page replacement policy should not remove a page which may be referenced in the instant future.

2. The page fault rate should not rise with an increase in the memory allocation for a program.

Posted Date: 5/7/2013 8:17:16 AM | Location : United States







Related Discussions:- Explain main requirements satisfy by page replacement policy, Assignment Help, Ask Question on Explain main requirements satisfy by page replacement policy, Get Answer, Expert's Help, Explain main requirements satisfy by page replacement policy Discussions

Write discussion on Explain main requirements satisfy by page replacement policy
Your posts are moderated
Related Questions
Q. Example to show a single digit ? Displaying a single digit (0 to 9) Presume that a value 5 is stored in BL register then to output BL as ASCII value add character ‘0' to

What are the Input devices Various devices are available for data input on graphics workstations. Most systems have a keyboard and one or more additional devices specially desi

Explain R-2R ladder D/A converter. Ans. R-2R ladder D/A converter: An R-2R ladder D/A converter is shown in Fig.(a). It uses resistors of only two values R and 2R. The inp

Q. Criteria for selecting a theme for a project? Topics for projects as we indicated earlier should emerge from the children's world. Teaching often becomes boring and unintere

Write an applet that sets the background colour to cyan and foreground colour to red and displays a message that illustrates the order in which various applet methods are called wh

The last character of the LDB name denote?? Application

Workday has set the stage to revolutionize the way companies manage and facilitatevarious aspects of their business operationsby utilizing cutting-edge cloud-based technologies in

We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi

Solve the problem in page 346 of the paper on cell formation by Boctor using the MIP method.  Use 4 cells and no more than 3 machines per cell. Solve the problem using the MIP m

Q. Make a generalize program that performs r-ary subtraction on two numbers using (r-1)'s and r's complement? Use input and output files.