10,171 research outputs found

    MULTIPLE TIER LOW OVERHEAD MEMORY LEAK DETECTOR

    Get PDF
    A memory leak detector system can be used to detect memory leaks, which is when a computer program fails to release unneeded memory allocations, in a computer that executes multiple programs. The system utilizes a multi tier methodology to detect memory leaks. In a first tier, the system collects a histogram representing allocation counts for different allocation sizes of memory at the computer. If the system detects an above-a-threshold increase in the number of allocations for one or more of the allocation sizes, the system marks the one or more allocation sizes as suspected leaks and proceeds to a second tier of the multiple tier method. In the second tier, the system collects a histogram based on call stacks that led to each above-a-threshold increase in allocation sizes detected in the first tier. The system marks the call stacks with an above-a-threshold increase in call stack traces as prospective leaks and proceeds to a third tier of the multiple tier leak detection method. In the third tier, the system records the allocation times of each memory allocation that fits the suspected leak profile, including leak sizes found in the first tier and call stacks found in the second tier. If the oldest allocations are not being freed and persist over a period of time, then the system marks the allocation(s), the allocation size(s), and the originating call stack(s) as a probable memory leak

    Bounds on R-parity violating supersymmetric couplings from leptonic and semi-leptonic meson decays

    Full text link
    We present a comprehensive update of the bounds on R-Parity violating supersymmetric couplings from lepton-flavour- and lepton-number-violating decay processes. We consider tau and mu decays as well as leptonic and semi-leptonic decays of mesons. We present several new bounds resulting from tau, eta and Kaon decays and correct some results in the literature concerning B-meson decays.Comment: 30 pages; changed title, updated some bounds from the literature from different references, added reference

    Systematic study of elliptic flow parameter in the relativistic nuclear collisions at RHIC and LHC energies

    Get PDF
    We employed the new issue of a parton and hadron cascade model PACIAE 2.1 to systematically investigate the charged particle elliptic flow parameter v2v_2 in the relativistic nuclear collisions at RHIC and LHC energies. With randomly sampling the transverse momentum xx and yy components of the particles generated in string fragmentation on the circumference of an ellipse instead of circle originally, the calculated charged particle v2(η)v_2(\eta) and v2(pT)v_2(p_T) fairly reproduce the corresponding experimental data in the Au+Au/Pb+Pb collisions at sNN\sqrt{s_{NN}}=0.2/2.76 TeV. In addition, the charged particle v2(η)v_2(\eta) and v2(pT)v_2(p_T) in the p+p collisions at s\sqrt s=7 TeV as well as in the p+Au/p+Pb collisions at sNN\sqrt{s_{NN}}=0.2/5.02 TeV are predicted.Comment: 7 pages, 5 figure

    Structural basis of template-boundary definition in Tetrahymena telomerase.

    Get PDF
    Telomerase is required to maintain repetitive G-rich telomeric DNA sequences at chromosome ends. To do so, the telomerase reverse transcriptase (TERT) subunit reiteratively uses a small region of the integral telomerase RNA (TER) as a template. An essential feature of telomerase catalysis is the strict definition of the template boundary to determine the precise TER nucleotides to be reverse transcribed by TERT. We report the 3-Ã… crystal structure of the Tetrahymena TERT RNA-binding domain (tTRBD) bound to the template boundary element (TBE) of TER. tTRBD is wedged into the base of the TBE RNA stem-loop, and each of the flanking RNA strands wraps around opposite sides of the protein domain. The structure illustrates how the tTRBD establishes the template boundary by positioning the TBE at the correct distance from the TERT active site to prohibit copying of nontemplate nucleotides
    • …
    corecore