10,171 research outputs found
MULTIPLE TIER LOW OVERHEAD MEMORY LEAK DETECTOR
A memory leak detector system can be used to detect memory leaks, which is when a computer program fails to release unneeded memory allocations, in a computer that executes multiple programs. The system utilizes a multi tier methodology to detect memory leaks. In a first tier, the system collects a histogram representing allocation counts for different allocation sizes of memory at the computer. If the system detects an above-a-threshold increase in the number of allocations for one or more of the allocation sizes, the system marks the one or more allocation sizes as suspected leaks and proceeds to a second tier of the multiple tier method. In the second tier, the system collects a histogram based on call stacks that led to each above-a-threshold increase in allocation sizes detected in the first tier. The system marks the call stacks with an above-a-threshold increase in call stack traces as prospective leaks and proceeds to a third tier of the multiple tier leak detection method. In the third tier, the system records the allocation times of each memory allocation that fits the suspected leak profile, including leak sizes found in the first tier and call stacks found in the second tier. If the oldest allocations are not being freed and persist over a period of time, then the system marks the allocation(s), the allocation size(s), and the originating call stack(s) as a probable memory leak
Bounds on R-parity violating supersymmetric couplings from leptonic and semi-leptonic meson decays
We present a comprehensive update of the bounds on R-Parity violating
supersymmetric couplings from lepton-flavour- and lepton-number-violating decay
processes. We consider tau and mu decays as well as leptonic and semi-leptonic
decays of mesons. We present several new bounds resulting from tau, eta and
Kaon decays and correct some results in the literature concerning B-meson
decays.Comment: 30 pages; changed title, updated some bounds from the literature from
different references, added reference
Systematic study of elliptic flow parameter in the relativistic nuclear collisions at RHIC and LHC energies
We employed the new issue of a parton and hadron cascade model PACIAE 2.1 to
systematically investigate the charged particle elliptic flow parameter
in the relativistic nuclear collisions at RHIC and LHC energies. With randomly
sampling the transverse momentum and components of the particles
generated in string fragmentation on the circumference of an ellipse instead of
circle originally, the calculated charged particle and
fairly reproduce the corresponding experimental data in the Au+Au/Pb+Pb
collisions at =0.2/2.76 TeV. In addition, the charged particle
and in the p+p collisions at =7 TeV as well as
in the p+Au/p+Pb collisions at =0.2/5.02 TeV are predicted.Comment: 7 pages, 5 figure
Structural basis of template-boundary definition in Tetrahymena telomerase.
Telomerase is required to maintain repetitive G-rich telomeric DNA sequences at chromosome ends. To do so, the telomerase reverse transcriptase (TERT) subunit reiteratively uses a small region of the integral telomerase RNA (TER) as a template. An essential feature of telomerase catalysis is the strict definition of the template boundary to determine the precise TER nucleotides to be reverse transcribed by TERT. We report the 3-Ã… crystal structure of the Tetrahymena TERT RNA-binding domain (tTRBD) bound to the template boundary element (TBE) of TER. tTRBD is wedged into the base of the TBE RNA stem-loop, and each of the flanking RNA strands wraps around opposite sides of the protein domain. The structure illustrates how the tTRBD establishes the template boundary by positioning the TBE at the correct distance from the TERT active site to prohibit copying of nontemplate nucleotides
- …