General :: Kernel Scheduling Algorithm

Sep 8, 2010

is linux kernel is priority preemptive kernel?if it is. where it is using round robin scheduling algorithm?when processes are scheduled for the processor process will be allocated as which sechudling alogorithm?

View 1 Replies


ADVERTISEMENT

Fedora :: How To Change CPU Scheduling Algorithm

May 3, 2011

I want to change linux scheduling algorithm for some of my processes but when I click on processes in ksysguard and click renice project, all of the processes use normal level cpu scheduling. Why is it such a thing and there is no priority?

View 2 Replies View Related

Programming :: Which Is Scheduling Algorithm Which Will Make Thread O?

May 4, 2011

I have a timer thread, and when it expires, it sets a flag. The only problem is, if any higher priority thread comes in between, then the timer is not expired in real time.Thus i want to set a highest priority to my thread. Now, i know 2 algos, which can make my thread in real time are: SCHED_FIFO and SCHED_RR.

So, here are my queries: 1) Which scheduling algo is best suited for this purpose? 2) Is it guaranted to work in real time if i use that algo (you suggest in 1) and set the max_priority by getting the maximum settable priority for that particular algorithm using, int sched_get_priority_max(int policy);

View 2 Replies View Related

General :: Modify Kernel With Non-Preemptive Scheduling

May 1, 2010

How to modify kernel to non-preemptive process scheduling only. Suggest any site that provides this kind of source code.

View 1 Replies View Related

General :: Kernel With Non-preemptive Process Scheduling?

May 1, 2010

how to modify kernel source to make its process scheduling to non-preemptive and FCFS ?

View 2 Replies View Related

General :: Cron Job Not Scheduling?

Jan 9, 2011

I have a cron job to schedule the task on the third sunday of the month.I saw the previous threads but didn't find any solution.

How the cron syntax can be written.

View 14 Replies View Related

General :: Installing Ns-2.1b5 In Fedora 14 For Implement Leach Algorithm?

Apr 27, 2011

i am new to ns2, i want to implement leach algorithm(MIT uAMPS) but i am unable to know how to install ns-2.1b5 version for it.but i successfully installed ns2.29 in fedora14.

otherwise please intimate what linux flavour will be suitable for ns-2.1b5

View 2 Replies View Related

General :: Earliest Deadline First Scheduling?

May 28, 2009

kindly give me example of earliest deadline first scheduling?

View 5 Replies View Related

General :: Do Scheduling Using /etc/crontab File?

Feb 11, 2011

i want to do scheduling using /etc/crontab file instead of using crontab -e that is crontab command on the terminal.i am appending to the crontab file in the /etc directory but the scheduling is not happening

View 7 Replies View Related

General :: Scheduling Script Using /etc/cron.d?

Mar 10, 2011

iam try to schedule my job in a file made in /etc/cron.d file as follows* * * * * tomcat6 /home/etika/Desktop/eka.sh /home/etika/Desktop/ea/etika.txt abc@gmail.comwhere eka.sh belongs to etika which is the root and etika.txt belong to tomcat6 this command is not running iam confused about the name of the owner written after the *'s please tell me whose name is written after the *'s(the schedule of the script) the owner of the script or the owner of the file which iam passing as an argument to the shell script

View 2 Replies View Related

General :: CGROUPs And Fair Group Scheduling?

Apr 23, 2010

I have played around a little bit with CGROUPS and the fair group scheduler ( using kernel version 2.6.31). When you have CGROUPS in a flat structure, with only one layer from the root-cgroup, everything works as you might expect when setting the cpu.shares parameter, i.e. a fraction of the total. But when I experimented with having deeper levels of CGROUPs it did'nt make any sense sometimes. For example, I had one CGROUP with the maximum number of shares (260000 something) , and two childgroups with quite little shares, 5000. Then I created some cpuhogging processes ( while(1); ) and put most of them in childgroups and one in the parentgroup. The logical thing would be if the parentgroups single process took almost all CPU-time, as it had the maximum number of shares, but instead the processes in the childgroups got the most CPU-time.

I have tried to figure out how it works by looking at the source code, but I can't really understand it. How does the hierarchical structure of the cgroup-tree interact with the flat aspect of it, i.e. siblings? Or do I misunderstand the whole concept?

View 1 Replies View Related

General :: Write A Scheduling Script In Java?

Mar 2, 2011

am newbie and i have problem to write a scheduling script in java, this script should do something in certain time interval... Could anybody help me, maybe give some example or source that maybe useful

View 3 Replies View Related

General :: Scheduling Shutdown After Download Completion?

May 20, 2010

Is there any way to schedule shutdown, from terminal,right after some currently running download in mozilla completes??

View 6 Replies View Related

General :: Scheduling Product That Is Available To Handle The Production Code?

Oct 12, 2010

I am proposing moving from the mainframe to Linux. Problem is that I am not aware of a scheduling product that is available to handle the production code. Currently using CA7. Is there anything out there that accomplishes the same thing? As you can tell, I am NEW to Linux!

View 1 Replies View Related

Programming :: Implementation Of RSA Algorithm In C / C++

Aug 2, 2010

Can I know the implemention of RSA(Encryption and decryption) algorithm in C / C++.

View 1 Replies View Related

Programming :: MD5 Algorithm Implementation

Apr 27, 2011

I have a copy of the MD5 algorithm and I'm taking a look at the source. It's pretty interesting but there are a few things that I'm curious about and I was wondering if anyone a bit more intuitive than I could help me out.The function declarations in the MD5 files are a bit unfamiliar to me. There is a macro used called PROTO_LIST, which I'm still not sure as to what this thing is doing exactly, but it's littered everywhere throughout the source.The signature here isn't too unfamiliar to me with the exception of the position of the PROTO_LIST macro. So here is a function with an unnamed argument of type MD5_CTX*.To me, this resembles an initializer list found in C++ with constructors but I certainly don't think that is the case here. So my questions about this are (1) how is this legal code in C and (2) what functionality has the PROTO_LIST macro provided for the function?

View 3 Replies View Related

Software :: Best Program To Write Algorithm?

Oct 5, 2010

What would be the best program to write my algorithm, before sending them to my teacher?

View 4 Replies View Related

Software :: Change The Algorithm Of A Node In Ns2?

Jan 3, 2011

there are 3 nodes..A,B and C. Node A wants to send information to Node B but it does so by sending it to Node C first which then sends to B. And similarly Node B sends to A. In this simultaneously C doesn't send to both A and B. This is the in built algorithm..but i want to change it to: A and B send their packets to C and C sends both these packets to A and B..by ORing... In the receiver side...node A can receive the wanted packet and also B. Where do i change the algorithm?

View 7 Replies View Related

Ubuntu Security :: Can Make New Algorithm For /etc/shadow

Aug 16, 2011

i use SHA-512 algorithm in the /etc/shadow File But i Want to use my lgorithm ..

how i can remove the sha-512 and use my algoritm ? Because no one can des encrypt it !! He Not Know the algorithm method

View 7 Replies View Related

Software :: Algorithm To Compare Images Via Web Application

Mar 30, 2011

I want some algorithm so that I can compare images via web application, (preferably in python)

View 2 Replies View Related

Programming :: Algorithm For Binary Frequency Search?

Jul 16, 2010

I've got a bit of an obscure question for you to test your brains a wee bit. I'm trying to implement a search program to find areas of high density in a binary string.

E.g.

Code:

[0001001010
0001110001
0000001000
1001000010
0101100100]

Where density is the number of 1's / number of digits with a maximum number of digits being the current number in a buffer (in this example 50). So for the example the density for the whole buffer is 15/50. But the density of Buffer[14..20]=[1110001]=4/7. So if looking for areas of density = 1/3 it would find the longest sequences of density over 1/3.So in the example. Buffer[4..9]=[100101]=3/6=1/2 which is above 1/3 but it is within the Buffer[4..48]=[100101000011100010000001000100100001001011001]=15/45=1/3

View 5 Replies View Related

Programming :: Self Configurable Diagnosis Algorithm / Tcl Script?

Sep 13, 2010

I have an algorithm guys called "Self Configurable Diagnosis Algorithm" but i don't have program for this.help me regarding that program and which type of Tcl script will be better suitable for that.

View 3 Replies View Related

Programming :: Template Algorithm For Std::vector And Std::string?

Sep 8, 2010

I have two functions:

Quote:

void func1(std::string &s)
{
s.clear();
}

[code]....

Is there a way to create one template function for both vector and string that would clear them?

View 4 Replies View Related

Debian Configuration :: How To Encrypt Home Folder Using DES Algorithm

Jan 27, 2011

I want encrypt my home folder by using the DES? How to do it?

View 1 Replies View Related

Ubuntu :: Printing - SpliX Compression Algorithm 0x0 Does Not Exist

Aug 20, 2010

I have printer whhich work perfectly on ubuntu desktop I shared it into network and trying to print from Mac and I'm getting the following error: "SpliX Compression algorithm 0x0 does not exist" Printer - Samsung SCX-4200

View 1 Replies View Related

Ubuntu Security :: Algorithm Is Used With Full-Disk Encryption?

Oct 20, 2010

For some reason I can't find any documentation re: the algorithm(s) used by Ubuntu to encrypt the filesystem... Anyone know what it is?? AES?

View 2 Replies View Related

Programming :: Simulate Dijsktra's Algorithm Using Network Animator Of Ns2?

May 3, 2011

I need to simulate dijsktra's algorithm using network animator of ns2. how to write a tcl script for my code. This tcl script runs the dijsktra code and simulates its running on network animator.

View 1 Replies View Related

Programming :: Algorithm For Finding The Shortest Path Between Geocoordinates?

Jun 27, 2011

AStar works on the basis of straight lines, AFAIK. In my case, we have geocoordinates and I can get the straight line distance between the waypoints. But I am wondering how approximate will the route calculated on this basis be? The actual distance "by road", which actually matters can be different.

Example. Assuming A and B are on the same plane, and will be equidistant from the goal point, if we consider a straight line between A and the goal point and, B and the goal point. The distance "by road" between A and the goal point may be greater or lesser than B. But because the AStar works on the basis of straight lines, it will return both the routes as the shortest. If yes, then which algo should be considered , if we want the results on the basis of actual distance in Km/m?

View 1 Replies View Related

Programming :: Encryption And Decryption Program In Java And Using RSA Algorithm?

Feb 25, 2011

i need a program for Encryption and Decryption using RSA algorithm in JAVA ..

View 9 Replies View Related

Programming :: Fixed Base Windowing Exponentiation Algorithm?

May 2, 2009

i try to understand this algorithm but i cann't. [URL] I encounter problem understand the algorithm of fixed base windowing exponentiation algorithm ? What is fixed base in the first place ? How this algorithm works ?

View 5 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved