User Tools

Site Tools


faq

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
faq [2021/04/05 15:42] jxufaq [2021/04/05 15:44] jxu
Line 267: Line 267:
 Since the software company working for the consortium of automotive industries does not know the exact details of what kind of high performance, robust embedded automotive information systems applications will be built using the two basic software systems with significantly different designs that allows any user, or any higher level automotive information system application, to perform search, insertion, and deletion operations, the only system characteristics, requirements, and constraints that have been specified by the software company are those specified in Section 1.1. of Assignment 3, that is: Since the software company working for the consortium of automotive industries does not know the exact details of what kind of high performance, robust embedded automotive information systems applications will be built using the two basic software systems with significantly different designs that allows any user, or any higher level automotive information system application, to perform search, insertion, and deletion operations, the only system characteristics, requirements, and constraints that have been specified by the software company are those specified in Section 1.1. of Assignment 3, that is:
  
-… +“(a) Each entry in the system consists of a key-value pair (k, v), where k is the key and v is the value. 
-(a) Each entry in the system consists of a key-value pair (k, v), where k is the key and v is the value. +
  
 (b) The key for each entry is unique, that is, two different entries will not have a same key. The key for each entry is a character string. No advance knowledge can be assumed about other characteristics of the keys.  (b) The key for each entry is unique, that is, two different entries will not have a same key. The key for each entry is a character string. No advance knowledge can be assumed about other characteristics of the keys. 
 +
  
 (c) The number of entries in the system can be very large, but the system can still fit into main memory. (c) The number of entries in the system can be very large, but the system can still fit into main memory.
 +
    
 (d) Search, insertion and deletion operations on the entries in the system are equally likely. (d) Search, insertion and deletion operations on the entries in the system are equally likely.
Line 278: Line 279:
 (e) The primary system performance criteria is speed, that is, under normal circumstances the search, insertion, and deletion operations should be as fast as possible. However, since this is an embedded automotive information system, the system is also expected to be robust in the sense that one should still be able to guarantee good, predictable, and verifiable performance of the system even under worst-case scenarios, possibly even including when under malicious attacks.  (e) The primary system performance criteria is speed, that is, under normal circumstances the search, insertion, and deletion operations should be as fast as possible. However, since this is an embedded automotive information system, the system is also expected to be robust in the sense that one should still be able to guarantee good, predictable, and verifiable performance of the system even under worst-case scenarios, possibly even including when under malicious attacks. 
 …” …”
 +
  
  
  
faq.txt · Last modified: 2021/04/26 22:20 by jxu