How lru technique is implemented, Software Engineering

Assignment Help:

How LRU technique is implemented

The LRU policy is more difficult to execute but has been more attractive on the assumption that the least recently used page is a better candidate for removal than the least recently used page is a better candidate for removal than the least recently loaded page as in FIFO. The LRU algorithm can be executed by associating a counter with every page that is in the major memory. When a page is referenced, its associated counter is set to zero. At fixed interval of time, the counters associated with all pages presently in memory are incremented by 1. The least recently used page in the page with the highest count. The counters are often known as aging registers, as their count indicates their age, that is how long ago their associated pages have been referenced.

 


Related Discussions:- How lru technique is implemented

Discuss in detail about delphi method, Discuss in detail about Delphi Metho...

Discuss in detail about Delphi Method. Procedure The co-ordinator represents a specification and assessment form to each expert. Co-ordinator calls a group discussion

What are the benefits of using bi dashboards, Question: (a) Explain wha...

Question: (a) Explain what is meant by Dimensional Modeling as used in Business Intelligence (BI) solutions. (b) There has been a request from the Managing Director of an In

Data Dictionary, The University needs to develop an online student registra...

The University needs to develop an online student registration system for new CAO entrants. This system will allow new students to enroll in their university course. Each student i

Compare and contrast reliability and availability, Q. Compare and contrast ...

Q. Compare and contrast reliability and availability? Ans. Reliability: The probability of failure-free system operation over a specified time in a given environment for a gi

In how many types requirements have been classified, In how many types requ...

In how many types requirements have been classified Requirements are classified in the below two types: i)  Functional requirements: They define the factors such as I/O fo

Explain basic information flow model, Q. Explain basic information flow mod...

Q. Explain basic information flow model & it's more sophisticated versions? Ans. A Information flow metrics are useful to the components of a system design. For any compone

What is open box testing, Open box testing is similar as white box testing....

Open box testing is similar as white box testing. It's a testing approach that consider the application's program structure, and derives test cases from the application's program l

Name the problem arising while development of software, What we called the ...

What we called the problem arising in development of software Problems arising in the development of software is called as crisis. It includes problems arising in the process o

Ftr, EXPLAIN ABOUT DEFECT AMPLIFICATION AND REMOVAL IN SOFTWARE ENGINEERING...

EXPLAIN ABOUT DEFECT AMPLIFICATION AND REMOVAL IN SOFTWARE ENGINEERING

System analysis , a) There are four steps or activities in needs engineerin...

a) There are four steps or activities in needs engineering: elicitation, specification, validation, and negotiation. Briefly explain the task of every of the four steps. Why needs

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd