Low-Level I/O, C++ Preview CSE 333 Spring 2018

Total Page:16

File Type:pdf, Size:1020Kb

Low-Level I/O, C++ Preview CSE 333 Spring 2018 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Low-Level I/O, C++ Preview CSE 333 Spring 2018 Instructor: Justin Hsia Teaching Assistants: Danny Allen Dennis Shao Eddie Huang Kevin Bi Jack Xu Matthew Neldam Michael Poulain Renshu Gu Robby Marver Waylon Huang Wei Lin L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Administrivia Exercise 7 posted tomorrow, due Monday Homework 1 due tomorrow night (4/12) . Watch that hashtable.c doesn’t violate the modularity of ll.h . Watch for pointer to local (stack) variables . Use a debugger (e.g. gdb) if you’re getting segfaults . Advice: clean up “to do” comments, but leave “step #” markers for graders . Late days: don’t tag hw1-final until you are really ready . Bonus: if you add unit tests, put them in a new file and adjust the Makefile 2 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux Your program A more accurate picture: . Consider a typical Linux process C standard . Its thread of execution can be in POSIX library one of several places: glibc • In your program’s code Linux • In glibc, a shared library system calls containing the C standard library, POSIX, support, and more architecture-independent code • In the Linux architecture- independent code • In Linux x86-64 code architecture-dependent code Linux kernel 3 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux Your program Some routines your program invokes may be entirely handled C standard by glibc without involving the POSIX library kernel glibc . e.g. strcmp() from stdio.h . There is some initial overhead when invoking functions in architecture-independent code dynamically linked libraries (during loading) • But after symbols are resolved, architecture-dependent code invoking glibc routines is nearly Linux kernel as fast as a function call within your program itself! 4 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux Your program Some routines may be handled by glibc, but they in turn C standard invoke Linux system calls POSIX library . e.g. POSIX wrappers around Linux glibc syscalls • POSIX readdir() invokes the underlying Linux readdir() . e.g. C stdio functions that read architecture-independent code and write from files • , , fopen() fclose() architecture-dependent code fprintf() invoke underlying Linux open(), close(), Linux kernel write(), etc. 5 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux Your program Your program can choose to directly invoke Linux system C standard calls as well POSIX library . Nothing is forcing you to link with glibc glibc and use it . But relying on directly-invoked Linux system calls may make your program less portable across UNIX architecture-independent code varieties architecture-dependent code Linux kernel 6 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux Your program Let’s walk through how a Linux system call actually works C standard . We’ll assume 32-bit x86 using the POSIX library modern SYSENTER / SYSEXIT x86 instructions glibc • x86-64 code is similar, though details always change over time, so take this as an example – not a architecture-independent code debugging guide architecture-dependent code Linux kernel 7 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program linux-gate.so Remember our Linux kernel stack process address kernel C standard space picture? POSIX Stack library . Let’s add some glibc details: Shared Libraries architecture-independent code Heap (malloc/free) Read/Write Segment .data, .bss architecture-dependent code Read-Only Segment .text, .rodata Linux kernel CPU 0x00000000 8 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program linux-gate.so Process is executing Linux kernel stack your program code kernel C standard POSIX Stack library SP glibc Shared Libraries architecture-independent code Heap (malloc/free) Read/Write Segment .data, .bss architecture-dependent code Read-Only Segment IP .text, .rodata Linux kernel unpriv CPU 0x00000000 9 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program linux-gate.so Process calls into a Linux kernel stack glibc function kernel . e.g. fopen() C standard POSIX . We’ll ignore the Stack library messy details of SP loading/linking glibc shared libraries IP Shared Libraries architecture-independent code Heap (malloc/free) Read/Write Segment .data, .bss architecture-dependent code Read-Only Segment .text, .rodata Linux kernel unpriv CPU 0x00000000 10 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program IP linux-gate.so glibc begins the Linux kernel stack process of invoking a kernel Linux system call C standard POSIX . glibc’s Stack library fopen() likely SP invokes Linux’s glibc open() system call Shared Libraries . Puts the system call # and arguments into architecture-independent code registers Heap (malloc/free) . Uses the call x86 Read/Write Segment instruction to call into .data, .bss architecture-dependent code the routine Read-Only Segment Linux kernel __kernel_vsyscall .text, .rodata located in linux- unpriv CPU gate.so 0x00000000 11 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program IP linux-gate.so Linux kernel stack linux-gate.so is a kernel vdso C standard POSIX . A virtual Stack library SP dynamically linked glibc shared object . Is a kernel-provided Shared Libraries shared library that is plunked into a process’ architecture-independent code address space Heap (malloc/free) . Provides the intricate Read/Write Segment .data, .bss machine code needed to architecture-dependent code trigger a system call Read-Only Segment .text, .rodata Linux kernel unpriv CPU 0x00000000 12 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program linux-gate.so linux-gate.so SP Linux kernel stack eventually invokes IP kernel the SYSENTER x86 C standard instruction POSIX Stack library . SYSENTER is x86’s “fast system call” glibc instruction • Causes the CPU to Shared Libraries raise its privilege level • Traps into the Linux architecture-independent code kernel by changing the Heap (malloc/free) SP, IP to a previously- Read/Write Segment determined location .data, .bss architecture-dependent code • Changes some Read-Only Segment segmentation-related .text, .rodata Linux kernel registers (see CSE451) priv CPU 0x00000000 13 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program linux-gate.so The kernel begins SP Linux kernel stack executing code at IP kernel the SYSENTER C standard entry point POSIX Stack library . Is in the architecture- dependent part of Linux glibc . It’s job is to: Shared Libraries • Look up the system call number in a system call dispatch table architecture-independent code • Call into the address Heap (malloc/free) stored in that table Read/Write Segment entry; this is Linux’s .data, .bss architecture-dependent code system call handler Read-Only Segment – For open(), the .text, .rodata Linux kernel handler is named sys_open, and is priv CPU system call #5 0x00000000 14 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program linux-gate.so The system call SP Linux kernel stack handler executes IP kernel . What it does is C standard system-call specific POSIX Stack library . It may take a long time to execute, especially if glibc it has to interact with hardware Shared Libraries • Linux may choose to context switch the CPU architecture-independent code to a different runnable Heap (malloc/free) process Read/Write Segment .data, .bss architecture-dependent code Read-Only Segment .text, .rodata Linux kernel priv CPU 0x00000000 15 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program linux-gate.so Eventually, the SP Linux kernel stack system call handler IP kernel finishes C standard POSIX . Returns back to the Stack library system call entry point • Places the system call’s glibc return value in the appropriate register Shared Libraries • Calls SYSEXIT to return to the user-level architecture-independent code code Heap (malloc/free) Read/Write Segment .data, .bss architecture-dependent code Read-Only Segment .text, .rodata Linux kernel priv CPU 0x00000000 16 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program linux-gate.so SYSEXIT transitions the Linux kernel stack processor back to user- kernel mode code C standard POSIX . Restores the Stack library IP, SP to SP user-land values glibc . Sets the CPU back to IP Shared Libraries unprivileged mode . Changes some architecture-independent code segmentation-related Heap (malloc/free) registers (see CSE451) Read/Write Segment .data, .bss . Returns the processor architecture-dependent code back to glibc Read-Only Segment .text, .rodata Linux kernel unpriv CPU 0x00000000 17 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 Details on x86/Linux 0xFFFFFFFF Your program linux-gate.so glibc continues to Linux kernel stack execute kernel . Might execute more C standard system calls POSIX Stack library . Eventually SP returns back to glibc your program code Shared Libraries architecture-independent code Heap (malloc/free) Read/Write Segment .data, .bss architecture-dependent code Read-Only Segment IP .text, .rodata Linux kernel unpriv CPU 0x00000000 18 L08: Low‐Level I/O, C++ Preview CSE333, Spring 2018 strace A useful Linux
Recommended publications
  • Technical Standard
    Technical Standard X/Open Curses, Issue 7 The Open Group ©November 2009, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. Technical Standard X/Open Curses, Issue 7 ISBN: 1-931624-83-6 Document Number: C094 Published in the U.K. by The Open Group, November 2009. This standardhas been prepared by The Open Group Base Working Group. Feedback relating to the material contained within this standardmay be submitted by using the web site at http://austingroupbugs.net with the Project field set to "Xcurses Issue 7". ii Technical Standard 2009 Contents Chapter 1 Introduction........................................................................................... 1 1.1 This Document ........................................................................................ 1 1.1.1 Relationship to Previous Issues ......................................................... 1 1.1.2 Features Introduced in Issue 7 ........................................................... 2 1.1.3 Features Withdrawn in Issue 7........................................................... 2 1.1.4 Features Introduced in Issue 4 ........................................................... 2 1.2 Conformance............................................................................................ 3 1.2.1 Base Curses Conformance .................................................................
    [Show full text]
  • Synchronizing Threads with POSIX Semaphores
    3/17/2016 POSIX Semaphores Synchronizing Threads with POSIX Semaphores 1. Why semaphores? 2. Posix semaphores are easy to use sem_init sem_wait sem_post sem_getvalue sem_destroy 3. Activities 1 2 Now it is time to take a look at some code that does something a little unexpected. The program badcnt.c creates two new threads, both of which increment a global variable called cnt exactly NITER, with NITER = 1,000,000. But the program produces unexpected results. Activity 1. Create a directory called posixsem in your class Unix directory. Download in this directory the code badcnt.c and compile it using gcc badcnt.c -o badcnt -lpthread Run the executable badcnt and observe the ouput. Try it on both tanner and felix. Quite unexpected! Since cnt starts at 0, and both threads increment it NITER times, we should see cnt equal to 2*NITER at the end of the program. What happens? Threads can greatly simplify writing elegant and efficient programs. However, there are problems when multiple threads share a common address space, like the variable cnt in our earlier example. To understand what might happen, let us analyze this simple piece of code: THREAD 1 THREAD 2 a = data; b = data; a++; b--; data = a; data = b; Now if this code is executed serially (for instance, THREAD 1 first and then THREAD 2), there are no problems. However threads execute in an arbitrary order, so consider the following situation: Thread 1 Thread 2 data a = data; --- 0 a = a+1; --- 0 --- b = data; // 0 0 --- b = b + 1; 0 data = a; // 1 --- 1 --- data = b; // 1 1 So data could end up +1, 0, -1, and there is NO WAY to know which value! It is completely non- deterministic! http://www.csc.villanova.edu/~mdamian/threads/posixsem.html 1/4 3/17/2016 POSIX Semaphores The solution to this is to provide functions that will block a thread if another thread is accessing data that it is using.
    [Show full text]
  • Openextensions POSIX Conformance Document
    z/VM Version 7 Release 1 OpenExtensions POSIX Conformance Document IBM GC24-6298-00 Note: Before you use this information and the product it supports, read the information in “Notices” on page 73. This edition applies to version 7, release 1, modification 0 of IBM z/VM (product number 5741-A09) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2018-09-12 © Copyright International Business Machines Corporation 1993, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Tables........................................................................................................ ix About This Document............................................................................................xi Intended Audience......................................................................................................................................xi Conventions Used in This Document.......................................................................................................... xi Where to Find More Information.................................................................................................................xi Links to Other Documents and Websites.............................................................................................. xi How to Send Your Comments to IBM....................................................................xiii Summary of Changes for z/VM
    [Show full text]
  • So You Think You Know C? [Pdf]
    So You Think You Know C? And Ten More Short Essays on Programming Languages by Oleksandr Kaleniuk Published in 2020 This is being published under the Creative Commons Zero license. I have dedicated this work to the public domain by waiving all of my rights to the work worldwide under copyright law, including all related and neighboring rights, to the extent allowed by law. You can copy, modify, distribute and perform the work, even for commercial purposes, all without asking permission. Table of Contents Introduction......................................................................................................... 4 So you think you know C?..................................................................................6 APL deserves its renaissance too.......................................................................13 Going beyond the idiomatic Python..................................................................30 Why Erlang is the only true computer language................................................39 The invisible Prolog in C++..............................................................................43 One reason you probably shouldn’t bet your whole career on JavaScript.........54 You don't have to learn assembly to read disassembly......................................57 Fortran is still a thing........................................................................................64 Learn you a Lisp in 0 minutes...........................................................................68 Blood, sweat,
    [Show full text]
  • Software Engineering Standards Introduction
    6/21/2008 Software Engineering Standards Introduction 1028 9126 730 12207 9000 CMM 15288 CMMI J-016 1679 Outline 1. Definitions 2. Sources of Standards 3. Why Use Standards ? 4. ISO and Software Engineering Standards 5. IEEE Software Engineering Collection Sources: IEEE Standards, Software Engineering, Volume Three: Product Standards, Introduction to the1999 Edition, pages i to xxiii. Horch, J., ‘Practical Guide to Software Quality management’, Artech House, 1996, chap 2. Wells, J., ‘An Introduction to IEEE/EIA 12207’, US DoD, SEPO, 1999. Moore, J., ‘Selecting Software Engineering Standards’, QAI Conference, 1998. Moore, J., ‘The Road Map to Software Engineering: A Standards-Based Guide’, Wiley-IEEE Computer Society Press, 2006. Moore, J.,’An Integrated Collection of Software Engineering Standards’, IEEE Software, Nov 1999. Gray, L., ‘Guidebook to IEEE/EIA 12207 Standard for Information Technology, Software Life Cycle Processes’, Abelia Corporation, Fairfax, Virginia, 2000. Coallier, F.; International Standardization in Software and Systems Engineering, Crosstalk, February 2003, pp. 18-22. 6/21/2008 2 1 6/21/2008 Exemple d’un système complexe Système de transport aérien Système de transport Système de Transport Aérien terrestre Système de Système de gestion du trafic réservation aérien Système Système aéroportuaire de distribution du kérosène SystèmeSystème avionique avion Système de Système de gestion de la Structure vie à bord SystèmeSystème de de équipage propulsionpropulsion Système SystèmeNavigation de de SystèmeVisualisation Système de navigationsystem de visualisation contrôle de vol SystèmeSystème de de réception réception Système de GPSGPS transport terrestremaritime 6/21/2008 3 Toward a Software Engineering Profession • What does it take ? 1. Body of Knowledge (e.g. SWEBOK) 2.
    [Show full text]
  • JTC1 and SC22 - Terminology
    JTC1 AD Hoc Terminology, August 2005 1 JTC1 and SC22 - Terminology Background Following my offer to collect together the definitions from SC22 standards, SC22 accepted my offer and appointed me as its terminology representative (I was later also asked to represent UK and BSI) on the JTC1 ad hoc group on terminology. These notes summarise the results of collecting the SC22 definitions, and my impressions of the JTC1 ad hoc group. Roger Scowen August 2005 A collection of definitions from SC22 standards SC22 asked me to prepare a collected terminology for SC22 containing the definitions from standards for which SC22 is responsible, and asked the project editors to send me the definitions in text form. Many, but not all, project editors did so. However there are sufficient for SC22 to judge whether to complete the list or abandon it as an interesting but unprofitable exercise. Adding definitions to the database The project editor of a standard typically sends the definitions from the standard as a Word file, but it may be plain text or in Latex or nroff format. These definitions are transformed into a uniform format by a series of global ‘find & replace’ operations to produce a Word file where each definition is represented as a row of a table with three columns: the term, its definition, and any notes and/or examples. It is often easier to check this has been accomplished by copying and pasting successive attempts into Excel than examining the Word file itself. Sometimes there are special cases such as exotic characters (for example Greek or mathematical characters), special fonts, illustrations, diagrams, or tables.
    [Show full text]
  • File Systems: Semantics & Structure What Is a File
    5/15/2017 File Systems: Semantics & Structure What is a File 11A. File Semantics • a file is a named collection of information 11B. Namespace Semantics • primary roles of file system: 11C. File Representation – to store and retrieve data – to manage the media/space where data is stored 11D. Free Space Representation • typical operations: 11E. Namespace Representation – where is the first block of this file 11L. Disk Partitioning – where is the next block of this file 11F. File System Integration – where is block 35 of this file – allocate a new block to the end of this file – free all blocks associated with this file File Systems Semantics and Structure 1 File Systems Semantics and Structure 2 Data and Metadata Sequential Byte Stream Access • File systems deal with two kinds of information int infd = open(“abc”, O_RDONLY); int outfd = open(“xyz”, O_WRONLY+O_CREATE, 0666); • Data – the contents of the file if (infd >= 0 && outfd >= 0) { – e.g. instructions of the program, words in the letter int count = read(infd, buf, sizeof buf); Metadata – Information about the file • while( count > 0 ) { e.g. how many bytes are there, when was it created – write(outfd, buf, count); sometimes called attributes – count = read(infd, inbuf, BUFSIZE); • both must be persisted and protected } – stored and connected by the file system close(infd); close(outfd); } File Systems Semantics and Structure 3 File Systems Semantics and Structure 4 Random Access Consistency Model void *readSection(int fd, struct hdr *index, int section) { struct hdr *head = &hdr[section];
    [Show full text]
  • Comparative Analysis of Distributed and Parallel File Systems' Internal Techniques
    Comparative Analysis of Distributed and Parallel File Systems’ Internal Techniques Viacheslav Dubeyko Content 1 TERMINOLOGY AND ABBREVIATIONS ................................................................................ 4 2 INTRODUCTION......................................................................................................................... 5 3 COMPARATIVE ANALYSIS METHODOLOGY ....................................................................... 5 4 FILE SYSTEM FEATURES CLASSIFICATION ........................................................................ 5 4.1 Distributed File Systems ............................................................................................................................ 6 4.1.1 HDFS ..................................................................................................................................................... 6 4.1.2 GFS (Google File System) ....................................................................................................................... 7 4.1.3 InterMezzo ............................................................................................................................................ 9 4.1.4 CodA .................................................................................................................................................... 10 4.1.5 Ceph.................................................................................................................................................... 12 4.1.6 DDFS ..................................................................................................................................................
    [Show full text]
  • OSE/RM Model Specification on a Basis the Reference Models of the Internet of Things
    OSE/RM model specification on a basis the reference models of the Internet of things A.V. Boichenko PhD, Plekhanov Russian Academy of Economics, tel +7 916 624 267, [email protected],[email protected] V.A. Kazakov PhD, Plekhanov Russian Academy of Economics, tel. 8-903-148-10-44 [email protected] O.V. Lukinova, Doctor of Engineering, Trapeznikov Institute of control sciences of Russian Academy of Sciences, tel. 916-707-13-90 [email protected] Abstract. In work the specification in projects the Internet of Things standard- ized reference model of the environment of the open systems OSE/RM (Open System Environment/Reference Model) on a basis the reference models of the Internet of things is considered. Also use of the OSE/RM model in integration projects of the Internet of things on the basis of the European interoperability framework EIF (European Interoperability Framework) is considered. Keywords: Internet of things, reference models of the Internet of things, refer- ence model of the environment of the open OSE/RM systems, integration Inter- net of things, European interoperability framework of EIF. Within the last several decades in world practice of system and program engineer- ing at design of information systems the referensy model of the environment of open systems was widely used (in the Russian practice, unfortunately, significantly more rare) OSE/RM (Open System Environment / Reference Model). This model describes basic functionality of any information system. The main maintenance of this model is described in the document ISO/IEC TR 14252:1996 Information technology – Guide to the POSIX Open System Environment (OSE) [1].
    [Show full text]
  • The POSIX Family of Standards
    ★ ★ ★ SUPPORTING ARTICLE ★ The POSIX Family of Standards Stephen R. Walli OSIX is a family of IEEE standards that SRW SOFTWARE, KITCHENER, ONT. supports portable programming. There are actually more than 20 standards and ■ draft documents under the POSIX umbrel- The IEEE POSIX family of standards la, at different stages in the standards de- has been developing since 1988, when velopment process. In this article each the original base system interface stan- piece of work will be referred to as “POSIX.n,” with “n” denoting the docu- dard was ratified. Having been at the ment or its working group, and enough core of a number of vendor-based con- other context will be given to identify the work being discussed. If the document is sortia specifications, largely due to U.S. a completed formal standard, its official government support in purchasing, it is number will be cited. Official numbers widely implemented. P look like “IEEE Std 1003.n-yyyy,” where 1003 is the IEEE POSIX project, “n” de- Despite its history, POSIX still suffers notes the document, and “yyyy” is the from a misunderstood scope, bad press, and an year the standard was completed or last amended. The term “POSIX” is really quite vague, which apparent lack of use. However, when POSIX is probably contributes to the confusion surrounding viewed as a programmer’s specification and simple the standards. To some it’s the POSIX.1 system inter- explanations for using specific POSIX standards are face standard; to others it’s the POSIX.1 standard plus the POSIX.2 shell and utilities standard.
    [Show full text]
  • Code Generation for the MPEG Reconfigurable Video Coding
    Code generation for the MPEG Reconfigurable Video Coding framework: From CAL actions to C functions Matthieu Wipliez, Ghislain Roquier, Mickael Raulet, Jean François Nezan, Olivier Déforges To cite this version: Matthieu Wipliez, Ghislain Roquier, Mickael Raulet, Jean François Nezan, Olivier Déforges. Code generation for the MPEG Reconfigurable Video Coding framework: From CAL actions to Cfunc- tions. Multimedia and Expo, (ICME) 2008 IEEE International Conference on, Jun 2008, Hannover, Germany. pp.1049 - 1052, 10.1109/ICME.2008.4607618. hal-00336487 HAL Id: hal-00336487 https://hal.archives-ouvertes.fr/hal-00336487 Submitted on 4 Nov 2008 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. CODE GENERATION FOR THE MPEG RECONFIGURABLE VIDEO CODING FRAMEWORK: FROM CAL ACTIONS TO C FUNCTIONS Matthieu Wipliez, Ghislain Roquier, Mickael¨ Raulet, Jean-Franc¸ois Nezan, Olivier Deforges´ IETR laboratory, UMR CNRS 6164, Image and Remote Sensing Group INSA de Rennes, 20 Avenue des Buttes de Coesmes,¨ 35043 RENNES Cedex, FRANCE Contacts: fmwipliez, groquier, mraulet, jnezan, [email protected] ABSTRACT algorithms, features that are necessary to be exploited for The MPEG Reconfigurable Video Coding (RVC) framework efficient implementations. In the meanwhile the growth of aims to provide a unified specification of all video technol- video coding technologies leads to solutions that are increas- ogy.
    [Show full text]
  • List of the ISO/IEC Standards to Be Used for the JTC1 Market Trial
    List of the ISO/IEC standards to be used for the JTC1 Market Trial Standard Title Stage ISO/IEC 1539-1:1997 Information technology - Programming languages - Fortran - Part 1: Base language ISO/IEC 1539-2:2000 Information technology -- Programming languages -- Fortran -- Part 2: Varying length character strings ISO/IEC 1539-3:1999 Information technology - Programming languages - Fortran - Part 3: Conditional compilation ISO/IEC 1989:2002 Information technology - Programming languages - COBOL ISO/IEC 6937:2001 Information technology - Coded graphic character set for text communication - Latin alphabet ISO/IEC 7816-1:1998 Identification cards - Integrated circuit(s) cards with contacts - Part 1: Physical characteristics ISO/IEC 7816-2:1999 Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 2: Dimensions and location of the contacts ISO/IEC 7816-3:1997 Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 3: Electronic signals and transmission protocols ISO/IEC 7816-4:1995 Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 4: Interindustry commands for interchange ISO/IEC 7816-5/AMD1:1996 Amendment 1 to ISO/IEC 7816-5: 1994 ISO/IEC 7816-5:1994 Identification cards - Integrated circuit(s) cards with contacts - Part 5: Numbering system and registration procedure for application identifiers ISO/IEC 7816-6/Amd1:2000 IC manufacturer registration ISO/IEC 7816-6:1996 Identification cards - Integrated circuit(s) cards
    [Show full text]