CISC 235 Lecture Notes - Lecture 2: Random-Access Machine, Virtual Memory, Memory Address

60 views5 pages

Document Summary

We will prefer structure a to structure b if a has alower order of complexity for the operations we need in our particular application. Before we discuss computational complexity, we need to agree on the type of computer we are dealing with. In particular, we need to clarify which operations can be completed in constant time. We will use the random access machine model, which can be summarized as follows: Sequential operations only (i. e. no parallel computation) +, -, *, / and comparisons for integers and floating point numbers. Assigning a value to a variable take constant time. No hardware accelerators (such as caches or virtual memory) are employed. It is important to note that this model implies an upper limit on the number of digits in any number. This is true of virtually all programming languages. The ram model does not assume constant time operations on strings.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents

Related Questions