Explore Belady’s anomaly and an example demonstrating its existence in computer memory.
Also find me here:
Baeldung Author
Subham Datta
I'm currently pursuing Ph.D. degree in Computer Engineering from the University of Cyprus. I'm also working at KIOS Research and Innovation Center of Excellence. My research area includes Cyber Security, Algorithms, Machine Learning. In my free time, I love watching cricket and movies.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Networking (35)
- OS (24)
- Security (23)
- Algorithms (23)
- Trees (11)
- Graphs (8)
- Programming (7)
- Math and Logic (7)
- Data Structures (7)
- Path Finding (4)
- Sorting (2)
- Software Architecture (2)
- Graph Traversal (2)
- Core Concepts (2)
- Artificial Intelligence (2)
- Web (1)
- Searching (1)
- Machine Learning (1)
- Concurrency (1)
Graph Theory: What Is Vertex Coloring?
Filed under Graphs
Learn the vertex coloring problem.
What Are Tournament Graphs?
Filed under Graphs
Explore a unique graph data structure: a tournament graph.
What Is the Credit Assignment Problem?
Filed under Machine Learning
Explore the credit assignment problem in reinforcement learning with an example.
Genetic Algorithms: Order One Crossover
Filed under Algorithms
Learn about the order-one crossover operator in Genetic Algorithms.
Scheduling: Earliest Deadline First
Filed under OS
Explore a priority-based CPU scheduling algorithm.
Differences Between a Gateway and a Firewall
Filed under Networking
Explore two popular network security devices: gateway and firewall.
What Is Functional Decomposition?
Filed under Programming
Learn about functional decomposition in detail with a practical example.
Differences Between Network-level and Application-level Information Security
Filed under Security
Explore two popular information security variants: network-level and application-level security.