How lru technique is implemented, Software Engineering

Assignment Help:

How LRU technique is implemented

The LRU policy is more difficult to execute but has been more attractive on the assumption that the least recently used page is a better candidate for removal than the least recently used page is a better candidate for removal than the least recently loaded page as in FIFO. The LRU algorithm can be executed by associating a counter with every page that is in the major memory. When a page is referenced, its associated counter is set to zero. At fixed interval of time, the counters associated with all pages presently in memory are incremented by 1. The least recently used page in the page with the highest count. The counters are often known as aging registers, as their count indicates their age, that is how long ago their associated pages have been referenced.

 


Related Discussions:- How lru technique is implemented

What is meant by information flow continuity, What is meant by Information ...

What is meant by Information flow Continuity? When we refine a fundamental model for a system, the information flow continuity must be maintained .ie, input & output to every r

Post-production design feedback for future designs, Q. Post-production desi...

Q. Post-production design feedback for future designs ? Post-production design feedback for future designs Implementation it is introducing the designed solution into

Software testing, Discuss the limitations of software testing. How do we sa...

Discuss the limitations of software testing. How do we say that complete testing is impossible?.

What is boundary value testing, A testing technique using input values at, ...

A testing technique using input values at, just below, and just above, the definite limits of an input domain; and with input values causing outputs to be at, just below, and just

What is inheritance, Q. What is Inheritance? Inheritance:- Inheritance...

Q. What is Inheritance? Inheritance:- Inheritance is defined as the property of objects by which instances of a class can have access to data and programs contained in a previ

How does the risk factor affect the spiral model, How does the risk factor ...

How does the risk factor affect the spiral model of software development? Ans: Risk Analysis phase is the most significant part of "Spiral Model". In this phase all possible (a

Write note on arm processor, Question 1 Explain the categories of Embedded...

Question 1 Explain the categories of Embedded Systems Question 2 Write a note on Serial Interface in 8051 Question 3 Explain the various types of addressing modes in 805

Define the process of requirements gathering tools, Define the process of R...

Define the process of Requirements Gathering Tools Requirements gathering is an art. Person who gathers requirements must have knowledge of what and when to gather information

Discuss the impact of "information era", Question 1 Discuss the impact of ...

Question 1 Discuss the impact of "information era" Question 2 Explain whether the linear sequential model of the software process is an accurate reflection of software developme

Defining intermediate representation, Problem 1 (i) Define the terms ...

Problem 1 (i) Define the terms Language Grammar Terminal symbols Non-Terminal symbols Alphabets >>Define sub parts (ii) Identify and write what these

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd