• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 20,509
Next 10 →

Table 3: Actions taken in the implementations of Physical Register Reuse, Registerless Storage and Extended Registers amp; Tags

in Exploiting Value Locality in Physical Register Files
by Saisanthosh Balakrishnan, Gurindar Sohi 2003
"... In PAGE 8: ... Rather, the tag is used to steer the access to either a physical register or its register extension based upon the value of the valid bit of the register extension and the MSB of the tag. 6 Evaluation Table3 summarizes the actions taken by the three differ- ent schemes. A common benefit of these schemes is bet- ter register utilization because of reduced register require- ments.... ..."
Cited by 6

Table 3: Actions taken in the implementations of Physical Register Reuse, Registerless Storage and Extended Registers amp; Tags

in Exploiting Value Locality in Physical Register Files
by Saisanthosh Balakrishnan , Gurindar S. Sohi
"... In PAGE 8: ... Rather, the tag is used to steer the access to either a physical register or its register extension based upon the value of the valid bit of the register extension and the MSB of the tag. 6 Evaluation Table3 summarizes the actions taken by the three differ- ent schemes. A common benefit of these schemes is bet- ter register utilization because of reduced register require- ments.... ..."

Table 3: Actions taken in the implementations of Physical Register Reuse, Registerless Storage and Extended Registers amp; Tags

in Exploiting Value Locality in Physical Register Files
by unknown authors
"... In PAGE 8: ... Rather, the tag is used to steer the access to either a physical register or its register extension based upon the value of the valid bit of the register extension and the MSB of the tag. 6 Evaluation Table3 summarizes the actions taken by the three differ- ent schemes. A common bene t of these schemes is bet- ter register utilization because of reduced register require- ments.... ..."

Table 2 - SSA physical interconnect schemes Physical Scheme Internal External

in unknown title
by unknown authors 1992
"... In PAGE 18: ...6 requirements apply to both internal and external interconnections (except that the shielding requirements do not apply for internal). Table2 shows the physical schemes that are compatible with the SSA protocol. Table 2 - SSA physical interconnect schemes Physical Scheme Internal External... ..."
Cited by 2

Table 1 - SSA physical interconnect schemes Physical Scheme Internal External

in unknown title
by unknown authors
"... In PAGE 17: ...opper version is defined. Future standards may define alternate media and electrical interfaces. The requirements apply to both internal and external interconnections (except that the shielding requirements do not apply for internal). Table1 shows the physical schemes that are compatible with the SSA protocol. Table 1 - SSA physical interconnect schemes Physical Scheme Internal External... ..."

Table 2: Storage amount for the proposed scheme as percent -

in A Mixed Mode BIST Scheme Based on Reseeding of Folding Counters
by Sybille Hellebrand, et al. 2000
"... In PAGE 5: ... In all cases the proposed scheme had the lowest num ber of bits to be stored. T he reduction of stor age amount with respect to both previously published ap - proaches is summarized in Table2 , which lists the ratios of the storage requirements for the respective schemes. The proposed scheme only requires between 7% and 53 % of the stor age for reseeding of multiple - polynomial LFSRs and between 3 % and 67 % of the storage amount for the method based on twisted ring counters (TRC).... ..."
Cited by 16

Table 1. Node storage costs for alternative schemes

in New Strategies for Revocation in Ad-Hoc Networks
by Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross Anderson
"... In PAGE 10: ... 5 Analysis and Comparison 5.1 Storage and Communication Costs A comparison of the storage costs is presented in Table1 . Each column represents the tasks discussed in Sections 2.... ..."

Table 3. Comparison of the RS model with the physical MEMS storage model.

in A Logical Model and Data Placement Strategies for MEMS Storage Devices
by Yi-reun Kim, Kyu-young Whang, Min-soo Kim, Young-koo Lee, Il-yeol Song, Yi-reun Kim, Kyu-young Whang, Min-soo Kim, Young-koo Lee, Il-yeol Song, Kyung Hee 2007
"... In PAGE 14: ... Thus, the transfer rate of the RS model is approximately equal to that of the MEMS storage device. Table3 summarizes the difierences between the RS model and the physical MEMS storage model.... ..."

Table 2: Storage amount for the proposed scheme as percent -

in A Mixed Mode Bist Scheme Based On Reseeding Of Folding Counters
by Sybille Hellebrand, Hua-Guo Liang, Hans-Joachim Wunderlich 2000
"... In PAGE 6: ... In all cases the proposed scheme had the lowest num ber of bits to be stored. The reduction of stor age amount with respect to both previously published ap - proaches is summarized in Table2 , which lists the ratios ... ..."
Cited by 16

Table 1 Various storage schemes for CTMC analysis

in A symbolic out-of-core solution method for Markov models
by Marta Kwiatkowska, Rashid Mehmood, Gethin Norman, David Parker 2002
"... In PAGE 5: ... However, as these researchers have stated, symbolic methods are hindered by the memory requirement for the storage of the probability vector(s). In Table1 , we summarise the main representative approaches used for over- coming the state space explosion problem when analysing stochastic models. We concentrate on the data structures used to store the matrix and vector, and whether they are stored in- or out-of-core.... In PAGE 6: ... This approach does not have the memory limitations stated for all other implicit methods in Table 1. The first explicit out-of-core method listed in Table1 was introduced by Deavours and Sanders [9,10], where the vector is stored explicitly in RAM as an array and a disk is used to store the matrix explicitly. In [17] this method was further extended by storing the vector as well as the matrix on disk.... ..."
Cited by 7
Next 10 →
Results 1 - 10 of 20,509
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University