User Tools

Site Tools


faq

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
faq [2021/04/05 15:42] jxufaq [2021/04/05 15:43] jxu
Line 271: Line 271:
  
 (b) The key for each entry is unique, that is, two different entries will not have a same key. The key for each entry is a character string. No advance knowledge can be assumed about other characteristics of the keys.  (b) The key for each entry is unique, that is, two different entries will not have a same key. The key for each entry is a character string. No advance knowledge can be assumed about other characteristics of the keys. 
 +
  
 (c) The number of entries in the system can be very large, but the system can still fit into main memory. (c) The number of entries in the system can be very large, but the system can still fit into main memory.
 +
    
 (d) Search, insertion and deletion operations on the entries in the system are equally likely. (d) Search, insertion and deletion operations on the entries in the system are equally likely.
Line 278: Line 280:
 (e) The primary system performance criteria is speed, that is, under normal circumstances the search, insertion, and deletion operations should be as fast as possible. However, since this is an embedded automotive information system, the system is also expected to be robust in the sense that one should still be able to guarantee good, predictable, and verifiable performance of the system even under worst-case scenarios, possibly even including when under malicious attacks.  (e) The primary system performance criteria is speed, that is, under normal circumstances the search, insertion, and deletion operations should be as fast as possible. However, since this is an embedded automotive information system, the system is also expected to be robust in the sense that one should still be able to guarantee good, predictable, and verifiable performance of the system even under worst-case scenarios, possibly even including when under malicious attacks. 
 …” …”
 +
  
  
  
faq.txt · Last modified: 2021/04/26 22:20 by jxu