Operating systems memory management: help understanding a question related to segmentation

There is this question in my textbook (Operating Systems: Internals and Design Principles by William Stallings):

Write the binary translation of the logical address 0011000000110011 under the following hypothetical memory management schemes, and explain your answer:

a. A paging system with a 512-address page size, using a page table in which the frame number happens to be half of the page number.

b. A segmentation system with a 2K-address maximum segment size, using a segment table in which bases happen to be regularly placed at real addresses: segment# + 20 + offset + 4,096.

I am having trouble with understanding part b. I’m not a native English speaker. Initially, I assumed that “using a segment table in which bases happen to be regularly placed at real addresses” means that the segment number in the logical address is the number of the physical segment, but then I read this “segment# + 20 + offset + 4,096”, and I am not sure what to make of it. So does this mean that the base number in the segment table contains segment# (in the logical address) + 20 + offset (in the logical address) + 4,096?

Should I put HR system and various business related systems under SSO?

We are building several systems for businesses, like employees schedule management and sharing, customer management and recently we are building HR System. We have put Schedule management and customer/contacts management application under SSO. Is it safe and meaningful to put HR System also under the same SSO system?

reference on relating Post systems to string rewriting systems and formal grammars?

wikipedia states:

Every Post canonical system can be reduced to a string rewriting system (semi-Thue system) […] It has been proved that any Post canonical system is reducible to such a substitution system, which, as a formal grammar, is also called a phrase-structure grammar, or a type-0 grammar in the Chomsky hierarchy

and on a different page:

A semi-Thue system is also a special type of Post canonical system, but every Post canonical system can also be reduced to an SRS.

I have not been able to find much explanation of these statements.

Is there a good reference that shows how to do conversions between these notions?

service demand in the topic of distributed systems

I am so confused about this question , imagine we have a disk that the service demands of database transactions on this disk is 0.1 sec , additionally we increase the disk speed by 40% so how service demand will be changed ? The answer says we should consider 60% of the original service demand and it means is 0.1 x 0.6 , but I think it should be 0.1 x 0.4 ……….. Does anyone has any idea?

refrence: https://learning.oreilly.com/library/view/performance-by-design/0130906735/ch02.html Exercise number 4

How can I index and search a set of mathematical formulas? (using MathWebSearch or similar systems) [closed]

I have a bunch of documents and I need to search Mathematical Formulas in those documents. Those formulas must be ranked in a similar way Google ranks web pages.

Through Google I have found the open source system MathWebSearch but there is no good documentation of tht system.

Is there anybody here who already have worked with MathWebSearch and can help me using MathWebSearch?

how do I combine two very different role playing systems

I’m planning on making a D&D 5e campaign for my friends so they can experience what an okay DM is like rather than a bias and railroading DM which is so far their only experience of Dungeons and Dragons. In the campaign I’m creating, There is going to be magical artifacts that distort reality, time, and space. One of the ways I want to do this is for reality to shatter/merge with other realities to make it so different RPGs have melded with their world. These are the RPGs that I either have a solid understanding of or an okay understanding of:

  • Honey Heist
  • Call of Cthulhu
  • AD&D 1e
  • Monster of the Week
  • Rifts
  • Twilight 2000

I really like the idea and I want it to work but I have a lot of flaws and complications in my plan:

  1. Almost every one of these RPGs has a different game system and has different game mechanics.

  2. The list of RPGs that I know have varying levels of complexity and I’m afraid that going from Honey Heist to Twilight 2000 is going to give a player whiplash.

  3. Calculating what your rolls are can be extremely confusing if you don’t have a good grasp of the game and these fusions of RPG systems are going to be the same length of a one-shot which is not enough time to fully grasp the rules.

  4. Weapons and armor and all of that would be confusing to transition to some games like Call of Cthulhu where fighting back isn’t that much of an option, well it is but it’d be a TPK. But in D&D 5e, class revolves around the way your character fights and what do you add to help the party not die in the encounter. This is also an issue for Honey Heist where it’ll be hard to skills if someone gets the Hacker role and the closest thing to technology in their world is some oil lanterns and a bunch of healing potions.

I have many ways to implement these games into 5e like

  • Making only the NPCs use different gaming systems
  • Creating a homebrew gaming system so they can easily go from RPG to RPG
  • Have them continue to use the d20 system no matter the game
  • Scrap the idea
  • Let them use the other RPG character classes like subclasses and tone down their abilities a tad
  • have only small portions of the other games be included like just the and that’s it.

Here’s my problem: How do I include these different RPGs into 5e and how do I do it in a way that is simplest for the players and myself

Literature about In-Memory Database Systems

I am currently writing my bachelor thesis on IMDBS and would like to ask if any of you have any recommendations for literature which summarizes the technical conception/architecture of IMDBS as apparently I am not able to find articles, papers, books etc which are covering the physical architecture or to In-Memory Database Systems but just on logical data storage, indexing etc.

Any recommendations would be highly appreciated.

Thanks in advance, toni

Are there any models of operating systems which don’t require rings of privileges, that are also secure?

I am working on a simple operating system in JavaScript and have noticed that there are two kinds of processes: the “main” process (or “kernel” process), and all the other processes. Basically they are implemented completely differently (which makes sense). But I’m wondering if you could reuse some of the logic and just have it all be one type of process. Do any operating systems do this? If so, what do they do? If not, why not?