Issues in the Design and Implementation of a Real-Time Garbage Collection Architecture " (1992)

Total Page:16

File Type:pdf, Size:1020Kb

Issues in the Design and Implementation of a Real-Time Garbage Collection Architecture Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1992 Issues in the design and implementation of a real- time garbage collection architecture William Jon Schmidt Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons Recommended Citation Schmidt, William Jon, "Issues in the design and implementation of a real-time garbage collection architecture " (1992). Retrospective Theses and Dissertations. 10388. https://lib.dr.iastate.edu/rtd/10388 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper aligrmient can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. University Microfilms International A Bell & Howell Information Company 300 North Zeeb Road, Ann Arbor. Ml 48106-13^6 USA 313/761-4700 800/521-0600 Order Ntimber 9S02016 Issues in the design and implementation of a real-time garbage collection architecture Schmidt, William Jon, Ph.D. Iowa State University, 1992 Copjnright ©1992 by Schmidt, William Jon. All rights reserved. SOON. ZeebRd. Ann Arbor, MI 48106 Issues in the design and implementation of a real-time garbage collection architecture by William Jon Schmidt A Dissertation Submitted to the Graduate Faculty in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY Major: Computer Science Members of the Cornmittee; Signature was redacted for privacy. In Charge of Major Work Signature was redacted for privacy. rtmeat Signature was redacted for privacy. Signature was redacted for privacy. For lhe,cSiadua:^ College Iowa State University Ames, Iowa 1992 Copyright © William Jon Schmidt, 1992. All rights reserved. ii TABLE OF CONTENTS 1. INTRODUCTION, HISTORY, AND MOTIVATION 1 1.1 Problem statement 1 1.2 Previous work in this area 4 2. THE ISU REAL-TIME GARBAGE COLLECTION PROJECT 8 2.1 The real-time garbage-collection algorithm 9 2.2 Object types 12 2.3 The garbage-collected memory module architecture 13 2.3.1 Overall system architecture 13 2.3.2 Motivation for the object-space manager 16 2.3.3 Alternatives to the object space manager 17 3. THE OBJECT SPACE MANAGER 19 3.1 Design criteria 19 3.2 Interconnection architecture and command interface 20 3.3 Some design details 24 3.3.1 Command set implementation 28 3.4 Analysis 31 3.4.1 VLSI technologies 31 3.4.2 Transistor counts 32 3.4.3 Wire costs 36 3.4.4 Propagation delays 37 3.5 Improving performance 39 3.6 Other alternatives 42 3.'t Conclusions and future work 45 iii 4. A PROTOTYPE COMPILER IMPLEMENTATION 47 4.1 The C++ compiler 48 4.1.1 The arbiter interface 48 4.1.2 The virtual machine 52 4.1.3 Pointer location descriptions - 55 4.1.4 Special data objects 60 4.1.5 The run-time library 63 4.1.6 Optimizations 64 4.1.7 Compatibility considerations 66 4.1.8 Limitations 69 4.2 The linker and librarian 70 4.3 The dlxsimgc simulator 72 4.3.1 Explanation of statistics 73 4.3.2 Limitations 76 5. PERFORMANCE ANALYSIS 78 5.1 System definitions 78 5.2 Parameters and factors 80 5.2.1 System parameters 80 5.2.2 Workload parameters 81 5.3 Workload 82 5.4 Results of experiments 84 5.4.1 Elapsed CPU cycles 87 5.4.2 Execution latencies 90 5.4.3 CPU instructions executed 92 5.4.4 Allocation latencies 96 5.4.5 Cache performance 99 5.4.6 Difference in costs and latencies 113 5.4.7 Allocations impeded by garbage collection 118 5.4.8 Cycles required for garbage collection 118 5.4.9 Fraction of time that garbage collection is active 119 5.4.10 Bus utilization 122 5.4.11 Bus utilization due to cache invalidation 125 iv 5.4.12 Additional statistics 125 5.5 Additional experiments 127 5.5.1 Partial cache invalidation 127 5.5.2 The effects of garbage-collected memory size 132 5.6 Summary 136 6. ALTERNATIVE FUNCTION CALL MECHANISMS 138 6.1 Implementation 139 6.1.1 Compiling function calls using shared argument blocks .... 148 6.1.2 Compiling function calls using separate argument blocks . 149 6.2 Results of experiments 152 6.3 A solution to the stack manipulation overhead problem 162 6.3.1 Performance model of activation frame caching 163 6.3.2 Preliminary experimental results 170 6.3.3 A new approach to data coherence 174 7. LANGUAGE EXTENSIONS TO SUPPORT SLICE OBJECTS 177 7.1 Syntax and informal semantics 178 7.1.1 Declarations 179 7.1.2 Expressions 179 7.1.3 Possible extensions 181 7.2 Implementation notes 182 7.3 Results of experiments 185 8. CONCLUSIONS AND FUTURE WORK 189 ACKNOWLEDGMENTS 191 BIBLIOGRAPHY 193 V LIST OF TABLES Table 3.1: Transistor cost parameters 33 Table 3.2: Transistor costs by technology 35 Table 3.3: Object space per OSM chip, given chip density and object size 37 Table 3.4: Ratio of OSM chips to DRAM chips 37 Table 4.1: Register usage in the two C++compilers 54 Table 5.1: Elapsed CPU cycles, sfft 88 Table 5.2: Elapsed CPU cycles, lisp 88 Table 5.3: Elapsed CPU cycles, troff 89 Table 5.4: Elapsed CPU cycles, all experiments 89 Table 5.5: Total latencies, sfft (normal CPU cycles) 90 Table 5.6: Total latencies, lisp (normal CPU cycles) 91 Table 5.7: Total latencies, troff (normal CPU cycles) 91 Table 5.8: Total latencies, all experiments (normal CPU cycles) 92 Table 5.9: Total instructions executed, sfft 93 Table 5.10: Total instructions executed, lisp 93 Table 5.11: Total instructions executed, troff 94 Table 5.12: Number of instructions executed, all experiments 94 Table 5.13: Breakdown of arbiter calls 95 Table 5.14: Cost of stack manipulation 96 Table 5.15: Total latencies for allocations, sfft 97 Table 5.16: Total latencies for allocations, lisp 97 Table 5.17: Total latencies for allocations, troff 98 Table 5.18: Total latencies for allocations, all experiments 98 Table 5.19: Instruction cache hits, sfft 100 vi Table 5.20: Instruction cache fetches, sfft 101 Table 5.21: Instruction cache hit rate, sfft 101 Table 5.22: Instruction cache hits, lisp 102 Table 5.23: Instruction cache fetches, lisp 102 Table 5.24: Instruction cache hit rate, lisp 103 Table 5.25: Instruction cache hits, troff 103 Table 5.26: Instruction cache fetches, troff 104 Table 5.27: Instruction cache hit rate, troff 104 Table 5.28: Instruction cache hits, all experiments 105 Table 5.29: Instruction cache fetches, all experiments 105 Table 5.30: Instruction cache hit rate, all experiments 106 Table 5.31: Data cache hits, sfft 107 Table 5.32: Data cache fetches, sfft 108 Table 5.33: Data cache hit rate, sfft 108 Table 5.34: Data cache hits, lisp 109 Table 5.35: Data cache fetches, lisp 109 Table 5.36: Data cache hit rate, lisp 110 Table 5.37: Data cache hits, troff 110 Table 5.38: Data cache fetches, troff Ill Table 5.39: Data cache hit rate, troff Ill Table 5.40: Data cache hits, all experiments 112 Table 5.41: Data cache fetches, all experiments 112 Table 5.42: Data cache hit rate, all experiments 113 Table 5.43: Total cycles difference between costs and latencies, sfft ... 115 Table 5.44: Total cycles difference between costs and latencies, lisp . 115 Table 5.45: Total cycles difference between costs and latencies, troff . 115 Table 5.46: Total cycles difference between costs and latencies, all exper­ iments 116 Table 5.47: Wasted cycles for the standard GC configuration 116 Table 5.48: Fraction of time wasted by protocol, sfft 116 Table 5.49: Fraction of time wasted by protocol, lisp 117 Table 5.50: Fraction of time wasted by protocol, troff 117 vii Table 5.51: Fraction of time wasted by protocol, all experiments 117 Table 5.52: Number of allocations impeded by GC, all experiments ... 119 Table 5.53: Total cycles required for GC, sfft 120 Table 5.54: Total cycles required for GC, lisp 120 Table 5.55: Total cycles required for GC, troff 120 Table 5.56: Total cycles required for GC, all experiments 121 Table 5.57: Fraction of time GC is active, sfft 121 Table 5.58: Fraction of time GC is active, lisp 121 Table 5.59: Fraction of time GC is active, troff 122 Table 5.60: Fraction of time GC is active, all experiments 122 Table 5.61: Bus utilization, sfft 123 Table 5.62: Bus utilization, lisp 123 Table 5.63: Bus utilization, troff 124 Table 5.64: Bus utilization, all experiments 124 Table 5.65: Bus utilization due to cache invalidation, sfft 125 Table 5.66: Bus utilization due to cache invalidation, lisp 126 Table 5.67: Bus utilization due to cache invalidation, troff 126 Table 5.68: Bus utilization due to cache invalidation, all experiments .
Recommended publications
  • Eurosim Mk7.1 Software User's Manual
    EuroSim Mk7.1 Software User’s Manual iss: 8 rev: 1 SUM NLR-EFO-SUM-2 Summary EuroSim Mk7.1 is an engineering simulator framework to support the quick development of hard real- time simulators. EuroSim provides a reconfigurable real-time execution environment with the possibility of man-in-the-loop and/or hardware-in-the-loop additions. Extensive Graphical User Interfaces assist the user in constructing, using and analysing real-time simulations, resolving the user from the specialist software engineering knowledge required to built hard real-time systems. EuroSim has been developed initially to support the verification of space (sub) systems defined by ESA programmes of various scales. It’s heritage lies in the development of the European Robotic Arm(ERA) project where EuroSim was essential in the development and verification of the large symmetrical arm that can move accross the International Space Station. Up to today, EuroSim installations are still used around the world to support ERA’s mission preparation, verification and training. After initial devel- opment and application for ERA, EuroSim has been succesfully used in the development, verification and training of the Autonomous Transfer Vehicle (ATV) with multiple installations worldwide. Other space programs where EuroSim has been applied since are Galileo, Herschel & Planck, Gaia to name a few major missions. Currently EuroSim has made its way in to other domains as well, with application in the F-35 Lightning-II Embedded Training program and simulations in support of road tunnel system verification. This document contains both the User Guide as well as the Reference Guide documentation and consists of five volumes.
    [Show full text]
  • CONCLUSIONES DEL ABOGADO GENERAL SR. PEDRO CRUZ VILLALÓN Presentadas El 14 De Abril De 2011 1
    CONCLUSIONES DEL SR. CRUZ VILLALÓN — ASUNTO C-70/10 CONCLUSIONES DEL ABOGADO GENERAL SR. PEDRO CRUZ VILLALÓN presentadas el 14 de abril de 2011 1 Índice I. Introducción ................................................................... I - 11964 II. Marco jurídico ................................................................. I - 11967 A. Derecho de la Unión ....................................................... I - 11967 1. Normativa en materia de protección de la propiedad intelectual ............. I - 11967 a) Directiva 2001/29 relativa a la armonización de determinados aspectos de los derechos de autor y derechos afines a los derechos de autor en la sociedad de la información ......................................... I - 11967 b) Directiva 2004/48 relativa al respeto de los derechos de propiedad intelec- tual . I - 11968 2. Normativa en materia de protección de datos personales ................... I - 11969 a) Directiva 95/46 relativa a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos . I - 11969 b) Directiva 2002/58 relativa al tratamiento de los datos personales y a la protección de la intimidad en el sector de las comunicaciones electróni- cas . I - 11969 3. Normativa en materia de comercio electrónico: Directiva 2000/31 ........... I - 11970 B. Derecho nacional . I - 11970 1 — Lengua original: francés. I - 11962 SCARLET EXTENDED III. Hechos que dieron lugar al litigio principal y cuestiones prejudiciales ................. I - 11971 A. Hechos
    [Show full text]
  • Spyglassfall2015.Pdf
    1 THERE ARE MANY WAYS TO TELL A STORY. Part of our mission is to keep alive the maritime history of our Nation’s Oldest PortSM by telling its stories. Well, we have two important stories to tell in our new exhibit, Wrecked!, which will be opening in May 2016. We want everyone, especially our young- est visitors, to be able to connect with this unique shipwreck story and with the archaeological side of discovering, exca- vating and conserving shipwrecks. That’s why we have added a new storyteller to our Lighthouse family—Star Waters! Star is a curious, adventerous young student who will inspire a whole new generation of underwater archaeologists and explorers. Throughout the Wrecked! exhibit, you’ll see a series of vignettes called “Star Waters Wonders” which will ask questions that provoke our young guests to think more in-depth about science, history, math, and engineering. So let our friend Star give you a sneak peek of the new exhibit (which is unlike anything you have ever seen at our Museum) in this special issue! 2 Dear Members, We have so much to be thankful for this holiday season. The blessing of being busy is always with us. We are about to break ground on a new Maritime Archaeology & Education Center with public viewing areas for shipwreck artifacts and handicap accessible learning spaces. A new exhibit is coming in the spring. Luminary Night is coming December 2nd! Our membership is larger than ever! We are thankful for the privilege to work for you. We are blessed to know and serve you.
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]
  • Xtext User Guide
    Xtext User Guide Xtext User Guide Heiko Behrens, Michael Clay, Sven Efftinge, Moritz Eysholdt, Peter Friese, Jan Köhnlein, Knut Wannheden, Sebastian Zarnekow and contributors Copyright 2008 - 2010 Xtext 1.0 1 1. Overview .................................................................................................................... 1 1.1. What is Xtext? ................................................................................................... 1 1.2. How Does It Work? ............................................................................................ 1 1.3. Xtext is Highly Configurable ................................................................................ 1 1.4. Who Uses Xtext? ................................................................................................ 1 1.5. Who is Behind Xtext? ......................................................................................... 1 1.6. What is a Domain-Specific Language ..................................................................... 2 2. Getting Started ............................................................................................................ 3 2.1. Creating a DSL .................................................................................................. 3 2.1.1. Create an Xtext Project ............................................................................. 3 2.1.2. Project Layout ......................................................................................... 4 2.1.3. Build Your Own Grammar ........................................................................
    [Show full text]
  • O Conteúdo Deste Arquivo Provém Originalmente Do Site Na Internet Da
    O conteúdo deste arquivo provém originalmente do site na internet da Corte de Justiça da União Europeia e estava armazenado sob o seguinte endereço no dia 15 de abril de 2011: http://curia.europa.eu/jurisp/cgi-bin/form.pl?lang=EN&Submit=rechercher&numaff=C-70/10 CONCLUSIONS DE L’AVOCAT GÉNÉRAL M. PEDRO CRUZ VILLALÓN présentées le 14 avril 2011 (1) Affaire C-70/10 Scarlet Extended SA contre Société belge des auteurs compositeurs et éditeurs (Sabam) en présence de: Belgian Entertainement Association Video ASBL (BEA Video), Belgian Entertainement Association Music ASBL (BEA Music), Internet Service Provider Association ASBL (ISPA), [demande de décision préjudicielle formée par la cour d’appel de Bruxelles (Belgique)] «Société de l’information – Droits de propriété intellectuelle – Directive 2004/48/CE – Droit d’auteur et droits voisins – Directive 2001/29/CE – Téléchargement illégal sur Internet – Échanges de fichiers au moyen de logiciels ‘peer-to-peer’ – Système de filtrage des communications électroniques – Mécanisme de blocage des fichiers échangés en violation de droits de propriété intellectuelle – Droit au respect de la vie privée – Protection des données personnelles – Articles 7 et 8 de la charte – Article 8 de la CEDH – Directive 95/46/CE – Directive 2002/58/CE – Confidentialité des communications – Droit à la liberté d’expression – Article 11 de la charte – Article 10 de la CEDH – Responsabilité des prestataires intermédiaires de services – Obligation générale de surveillance des informations – Directive 2000/31/CE – État de droit – Limitation des droits et libertés ‘prévue par la loi’ – Qualité de la loi – Prééminence du droit» I – Introduction II – Le cadre juridique A – Le droit de l’Union 1.
    [Show full text]
  • Target Language Compiler Reference Guide  COPYRIGHT 1997 - 2002 by the Mathworks, Inc
    Target Language Compiler™ For Use with Real-Time Workshop® Modeling Simulation Implementation Reference Guide Version 5 How to Contact The MathWorks: www.mathworks.com Web comp.soft-sys.matlab Newsgroup [email protected] Technical support [email protected] Product enhancement suggestions [email protected] Bug reports [email protected] Documentation error reports [email protected] Order status, license renewals, passcodes [email protected] Sales, pricing, and general information 508-647-7000 Phone 508-647-7001 Fax The MathWorks, Inc. Mail 3 Apple Hill Drive Natick, MA 01760-2098 For contact information about worldwide offices, see the MathWorks Web site. Target Language Compiler Reference Guide COPYRIGHT 1997 - 2002 by The MathWorks, Inc. The software described in this document is furnished under a license agreement. The software may be used or copied only under the terms of the license agreement. No part of this manual may be photocopied or repro- duced in any form without prior written consent from The MathWorks, Inc. FEDERAL ACQUISITION: This provision applies to all acquisitions of the Program and Documentation by or for the federal government of the United States. By accepting delivery of the Program, the government hereby agrees that this software qualifies as "commercial" computer software within the meaning of FAR Part 12.212, DFARS Part 227.7202-1, DFARS Part 227.7202-3, DFARS Part 252.227-7013, and DFARS Part 252.227-7014. The terms and conditions of The MathWorks, Inc. Software License Agreement shall pertain to the government’s use and disclosure of the Program and Documentation, and shall supersede any conflicting contractual terms or conditions.
    [Show full text]
  • Panda Gatedefender Performa
    Documento de descripción del producto Panda GateDefender Performa Documento de Descripción del producto Panda GateDefender Performa 1. Ficha del producto .................................................... 4 1.1. Nombre ....................................................................... 4 1.2. Definiciones ................................................................. 4 1.2.1. 25 palabras .......................................................................... 4 1.2.2. 50 palabras .......................................................................... 4 1.2.3. 100 palabras ........................................................................ 4 1.2.4. 150 palabras ........................................................................ 4 1.3. Modelos....................................................................... 5 1.4. Módulos comercializados................................................ 5 1.5. Slogan......................................................................... 5 1.6. Beneficios .................................................................... 5 1.7. Características destacables ............................................ 6 1.7.1. Protección Completa .............................................................. 6 1.7.2. Estructura Modular ................................................................ 6 1.7.3. Alto Rendimiento................................................................... 7 1.7.4. Auto Actualizaciones .............................................................. 7 1.7.5.
    [Show full text]
  • Software User Manual (PDF)
    EuroSim Mk5.0-pl5 Software User’s Manual National Aerospace Laboratory NLR iss: 6 rev: 0 SUM NLR-EFO-SUM-2 Summary EuroSim Mk5.0-pl5 is an engineering simulator to support the design, development and verification of space (sub) systems defined by ESA programmes of various scales. The facility provides a reconfigurable real-time execution environment with the possibility of man-in-the-loop and/or hardware-in-the-loop additions. This document describes the facilities available for usage in EuroSim Mk5.0-pl5, and how those facilities can be used. c Copyright Dutch Space BV All rights reserved. Disclosure to third parties of this document or any part thereof, or the use of any information contained therein for purposes other than provided for by this document, is not permitted, except with the prior and express written permission of Dutch Space BV, PO Box 32070, 2303 DB, Leiden, The Netherlands. ii c Dutch Space BV NLR-EFO-SUM-2 SUM iss: 6 rev: 0 Table of Contents c Dutch Space BV iii NLR-EFO-SUM-2 SUM iss: 6 rev: 0 Table of Contentsv I EuroSim Basics1 1 Introduction 3 1.1 Purpose...........................................3 1.2 Scope............................................3 1.3 Where to start........................................3 1.4 Document conventions...................................4 2 Concepts 5 2.1 EuroSim simulation life-cycle...............................5 2.2 Simulator elements.....................................6 2.2.1 The model.....................................6 2.2.2 Tasks and schedule.................................6
    [Show full text]
  • 5583 B (1E) G*6'E YALSIYBIMSPATINTU BITIRAS \H7 (12)PATENTO Apnasvuas
    lxsler^ .qos (10)LT 5583 B (1e) g*6'E YALSIYBIMSPATINTU BITIRAS \H7 (12)PATENTO APnASVUAS (11) Patentonumeris: 5583 (51) Int.Cl. (2006): G01B 15/00 (21) Parai5kosnumeris: 2OO7O7O (22) Parai5kospadavimo data: 2OO711 20 (41) Parai5kospaskelbimo data: 2009 03 25 (45) Patentopaskelbimo data: 2009 07 27 (62) ParaiSkos,i5kurios dokumentas i5skirtas, numeris: (86) TarptautindsparaiSkos numeris: (86) Tarptautindsparai5kos padavimo data: (85) NacionalinioPCT lygioprocedUros pradZios data: (30) Prioritetas: P-06-128,2006 11 21, LV (72) l5radejas: DainisUSINS, LV (73) Patentosavininkas: RENESANSE PLUS, SlA, PulkvelaBrielalela4-2, LV-2015 J0rmala, LV (74) Patentinis patikdtin is/atstovas: m TatjanaSTERLINA, UAB ,,lntels", Naugarduko 9.3212, LT-03225 Vilnius, LT CY} @ ro (54) Pavadinimas: to Kompiuteriniqtinklq vartotojqelgesio kontrol6s bUdas F J (57) Referatas: lSradimaspriklauso kompiuterindmssistemoms. Budas iSsiskiriatuo, kad vartotojo kompiuteris(U) sujungiamassu prieigossistemos serveriu (AS), kuris atitinkamaisujungtas su HUB serveriqsistemos HUB serveriais (H) ir registracijosbloku (RB). BUdas vykdomas nuosekliai tam tikrais veiksmais: vartotojo indentifikacijosduomenq nusiuntimasi5 vartotojokompiuterio (U) j prieigossistemos serverj (AS); duomenq nusiuntimasnuo prieigos sistemos serverio j registracijosblokq (RB); vartotojo identifikaciniq duomenq autenti5kumopatikrinimas ir vartotojoprieigos teisiq nustatymas, lyginant su registracijosbloke (RB) tam tikroje lenteldjearba lentel6se(T1) esandiaisduomenimis; sujungimo su vartotojouZsakytu
    [Show full text]
  • Software User Manual (PDF)
    EuroSim Mk4.1 Software User’s Manual National Aerospace Laboratory NLR iss: 5 rev: 1 SUM NLR-EFO-SUM-2 Summary EuroSim Mk4.1 is an engineering simulator to support the design, development and verification of space (sub) systems defined by ESA programmes of various scales. The facility provides a reconfigurable real-time execution environment with the possibility of man-in-the-loop and/or hardware-in-the-loop additions. This document describes the facilities available for usage in EuroSim Mk4.1, and how those facilities can be used. c Copyright Dutch Space BV All rights reserved. Disclosure to third parties of this document or any part thereof, or the use of any information contained therein for purposes other than provided for by this document, is not permitted, except with the prior and express written permission of Dutch Space BV, PO Box 32070, 2303 DB, Leiden, The Netherlands. ii c Dutch Space BV NLR-EFO-SUM-2 SUM iss: 5 rev: 1 Revision Record Issue Revision Date Reason for change Changes 0 1 11-Mar-1994 Document creation; internal distribution only. All pages. 0 2 10-Apr-1994 Update to expand contents and take into account internal comments. 0 3 15-Dec-1994 Completely updated for Mk0.1. All pages. 0 4 7-Feb-1995 Continued updating of issue 0 revision 3. All pages. 0 5 25-Apr-1995 Issued for DD/R EuroSim Mk0.1. All pages. SR/R-1-RID-SRD-74, SR/R-2-RID-SRD-5, AD/R-2-RID-Model ICD-2, AD/R-2-RID-Model ICD-3, AD/R-2-RID-SRD-3, AD/R-2-RID-SUM-2.
    [Show full text]
  • Page 1 of 34 23/04/2011
    Page 1 of 34 AVIS JURIDIQUE IMPORTANT: Les informations qui figurent sur ce site sont soumises à une clause de "non-responsabilité" et sont protégées par un copyright. CONCLUSIONS DE L’AVOCAT GÉNÉRAL M. PEDRO CRUZ VILLALÓN présentées le 14 avril 2011 (1) Affaire C-70/10 Scarlet Extended SA contre Société belge des auteurs compositeurs et éditeurs (Sabam) en présence de: Belgian Entertainement Association Video ASBL (BEA Video), Belgian Entertainement Association Music ASBL (BEA Music), Internet Service Provider Association ASBL (ISPA), [demande de décision préjudicielle formée par la cour d’appel de Bruxelles (Belgique)] «Société de l’information – Droits de propriété intellectuelle – Directive 2004/48/CE – Droit d’auteur et droits voisins – Directive 2001/29/CE – Téléchargement illégal sur Internet – Échanges de fichiers au moyen de logiciels ‘peer-to-peer’ – Système de filtrage des communications électroniques – Mécanisme de blocage des fichiers échangés en violation de droits de propriété intellectuelle – Droit au respect de la vie privée – Protection des données personnelles – Articles 7 et 8 de la charte – Article 8 de la CEDH – Directive 95/46/CE – Directive 2002/58/CE – Confidentialité des communications – Droit à la liberté d’expression – Article 11 de la charte – Article 10 de la CEDH – Responsabilité des prestataires intermédiaires de services – Obligation générale de surveillance des informations – Directive 2000/31/CE – État de droit – Limitation des droits et libertés ‘prévue par la loi’ – Qualité de la loi – Prééminence du droit» I – Introduction II – Le cadre juridique A – Le droit de l’Union 1. La réglementation relative à la protection de la propriété intellectuelle a) La directive 2001/29 sur l’harmonisation de certains aspects du droit d’auteur et des droits voisins dans la société de l’information b) La directive 2004/48 relative au respect des droits de propriété intellectuelle 2.
    [Show full text]