9,286 research outputs found

    MULTIPLE TIER LOW OVERHEAD MEMORY LEAK DETECTOR

    Get PDF
    A memory leak detector system can be used to detect memory leaks, which is when a computer program fails to release unneeded memory allocations, in a computer that executes multiple programs. The system utilizes a multi tier methodology to detect memory leaks. In a first tier, the system collects a histogram representing allocation counts for different allocation sizes of memory at the computer. If the system detects an above-a-threshold increase in the number of allocations for one or more of the allocation sizes, the system marks the one or more allocation sizes as suspected leaks and proceeds to a second tier of the multiple tier method. In the second tier, the system collects a histogram based on call stacks that led to each above-a-threshold increase in allocation sizes detected in the first tier. The system marks the call stacks with an above-a-threshold increase in call stack traces as prospective leaks and proceeds to a third tier of the multiple tier leak detection method. In the third tier, the system records the allocation times of each memory allocation that fits the suspected leak profile, including leak sizes found in the first tier and call stacks found in the second tier. If the oldest allocations are not being freed and persist over a period of time, then the system marks the allocation(s), the allocation size(s), and the originating call stack(s) as a probable memory leak

    Bounds on R-parity violating supersymmetric couplings from leptonic and semi-leptonic meson decays

    Full text link
    We present a comprehensive update of the bounds on R-Parity violating supersymmetric couplings from lepton-flavour- and lepton-number-violating decay processes. We consider tau and mu decays as well as leptonic and semi-leptonic decays of mesons. We present several new bounds resulting from tau, eta and Kaon decays and correct some results in the literature concerning B-meson decays.Comment: 30 pages; changed title, updated some bounds from the literature from different references, added reference

    Systematic study of elliptic flow parameter in the relativistic nuclear collisions at RHIC and LHC energies

    Get PDF
    We employed the new issue of a parton and hadron cascade model PACIAE 2.1 to systematically investigate the charged particle elliptic flow parameter v2v_2 in the relativistic nuclear collisions at RHIC and LHC energies. With randomly sampling the transverse momentum xx and yy components of the particles generated in string fragmentation on the circumference of an ellipse instead of circle originally, the calculated charged particle v2(η)v_2(\eta) and v2(pT)v_2(p_T) fairly reproduce the corresponding experimental data in the Au+Au/Pb+Pb collisions at sNN\sqrt{s_{NN}}=0.2/2.76 TeV. In addition, the charged particle v2(η)v_2(\eta) and v2(pT)v_2(p_T) in the p+p collisions at s\sqrt s=7 TeV as well as in the p+Au/p+Pb collisions at sNN\sqrt{s_{NN}}=0.2/5.02 TeV are predicted.Comment: 7 pages, 5 figure
    • …
    corecore