Digital Systems and ApplicationsVojin G. Oklobdzija CRC Press, 2017. gada 19. dec. - 992 lappuses New design architectures in computer systems have surpassed industry expectations. Limits, which were once thought of as fundamental, have now been broken. Digital Systems and Applications details these innovations in systems design as well as cutting-edge applications that are emerging to take advantage of the fields increasingly sophisticated capabilities. This book features new chapters on parallelizing iterative heuristics, stream and wireless processors, and lightweight embedded systems. This fundamental text—
|
No grāmatas satura
6.–10. rezultāts no 73.
1-65. lappuse
... implementation of user-level threads. 1.6.3. An. Example. Page. Table. Organization. So now the question is: How do page tables work? If we think of main memory as the data array of a cache, then the page table is the cache's corresponding ...
... implementation of user-level threads. 1.6.3. An. Example. Page. Table. Organization. So now the question is: How do page tables work? If we think of main memory as the data array of a cache, then the page table is the cache's corresponding ...
1-71. lappuse
... implemented on general-purpose computers or high-end custom chips where the throughput is the function to optimize ... implementations. In all these cases, there are firm constraints on area, power, energy, and so on. Therefore ...
... implemented on general-purpose computers or high-end custom chips where the throughput is the function to optimize ... implementations. In all these cases, there are firm constraints on area, power, energy, and so on. Therefore ...
1-76. lappuse
... implemented with adders and 1-bit right-shift logic (Fig. 1.34). The adder can be implemented with a carry-save adder (CSA) avoid long carry propagation (Fig. 1.35). We explain more about ways to implement modular addition below. For ...
... implemented with adders and 1-bit right-shift logic (Fig. 1.34). The adder can be implemented with a carry-save adder (CSA) avoid long carry propagation (Fig. 1.35). We explain more about ways to implement modular addition below. For ...
1-81. lappuse
... implementations of curve-based cryptography is given in Fig. 1.38. Point multiplication is at the top level. It can be ... implementation advantages. The main advantage is that point addition can be done in projective coordinates using ...
... implementations of curve-based cryptography is given in Fig. 1.38. Point multiplication is at the top level. It can be ... implementation advantages. The main advantage is that point addition can be done in projective coordinates using ...
1-84. lappuse
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Esat sasniedzis šīs grāmatas aplūkošanas reižu limitu.
Saturs
1-1 | |
Chapter 2 System Design | 2-1 |
Chapter 3 Architectures for Low Power | 3-1 |
Chapter 4 Performance Evaluation | 4-1 |
Embedded Applications | 4-47 |
Chapter 5 Embedded SystemsonChips | 5-1 |
Chapter 6 Embedded Processor Applications | 6-1 |
Chapter 7 An Overview of SoC Buses | 7-1 |
Chapter 15 Circuits for HighPerformance IO | 15-1 |
Chapter 16 Algorithms and Data Structures in External Memory | 16-1 |
Chapter 17 Parallel IO Systems | 17-1 |
Chapter 18 A Read Channel for Magnetic Recording | 18-1 |
Operating System | 18-113 |
Chapter 19 Distributed Operating Systems | 19-1 |
New Directions in Computing | 19-15 |
A Strategically Programmable System | 20-1 |
Signal Processing | 7-17 |
Chapter 8 Digital Siganl Processing | 8-1 |
Chapter 9 DSP Applications | 9-1 |
Chapter 10 Digital Filter Design | 10-1 |
Chapter 11 Audio Siganl Processing | 11-1 |
Chapter 12 Digital Video Processing | 12-1 |
Chapter 13 LowPower Digital Signal Processing | 13-1 |
Communications and Networks | 13-19 |
Chapter 14 Communications and Computer Networks | 14-1 |
InputOutput | 14-19 |
Chapter 21 Reconfigurable Processors | 21-1 |
Chapter 22 Roles of Software Technology in Intelligent Transportation Systems | 22-1 |
Chapter 23 Media Signal Processing | 23-1 |
Chapter 24 Internet Architectures | 24-1 |
Chapter 25 Microelectronics for Home Entertainment | 25-1 |
Chapter 26 Mobile and Wireless Computing | 26-1 |
Chapter 27 Data Security | 27-1 |
Index | I-1 |
Back cover | I-21 |
Bieži izmantoti vārdi un frāzes
addition algorithm allows applications approach architecture audio bits block branch buffer cache called channel clock communication complexity components core cycle decoder defined delay dependencies described detector devices disk drive effect efficient elements equalizer error example execution fetch field Figure filter frequency function given hardware implementation important increased input instruction interface issue logic loop mapping means measured memory method multiple noise operation optimization output packed parallel performance phase position possible prediction problem processing processor recording reduce referred rename response result sample sequence shift shown in Fig shows signal simple simulator single solution space specific structure subwords techniques threads typical unit
Populāri fragmenti
4-37. lappuse - SC Woo, M. Ohara, E. Torrie. JP Singh, and A. Gupta. The SPLASH-2 programs: Characterization and methodological considerations.
14-17. lappuse - J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors.
14-1. lappuse - Open systems interconnect (OSI) reference model consists of seven layers: physical, data link, network, transport, session, presentation, and application. The physical layer is responsible for transmitting bits over a communication channel.
4-36. lappuse - A. Agarwal, RL Sites, and M. Horowitz. ATUM: A new technique for capturing address traces using microcode.
14-13. lappuse - In microcellular networks supporting multimedia traffic, the resource allocation schemes have to be designed such that a call can be assured of a certain QoS once it is accepted into the network.
2-36. lappuse - Tjaden, GS and Flynn, MJ, Detection and parallel execution of independent instructions, IEEE Transactions on Computers, C-19, 889, 1970.
4-46. lappuse - T.-Y. Yeh. DT Marr, and YN Patt. Increasing the instruction fetch rate via multiple branch prediction and a branch address cache.
23-66. lappuse - ... led to the development of algorithms and software that are robust: can learn from their environment and adapt to the changing conditions. In a biological system the structure that encodes the prescription on how the organism should be constructed is called a chromosome. A set of chromosome is called a genotype and the resulting organism is called a phenotype.
14-17. lappuse - In proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), pp.66-75, 1998 [4] Zygmunt J.