MT-DMA: A DMA Controller Supporting Efficient Matrix Transposition for Digital Signal Processing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AMBA Based Advanced DMA Controller for SoC

this paper describes the implementation of an AMBA Based Advanced DMA Controller for SoC. It uses AMBA Specifications, where two buses AHB and APB are defined and works for processor as system bus and peripheral bus respectively. The DMA controller functions between these two buses as a bridge and allow them to work concurrently. Depending on the speed of peripherals it uses buffering mechanism...

متن کامل

Run-DMA

Copying data from devices into main memory is a computationally-trivial, yet time-intensive, task. In order to free the CPU to perform more interesting work, computers use direct memory access (DMA) engines — a special-purpose piece of hardware — to transfer data into and out of main memory. We show that the ability to chain together such memory transfers, as provided by commodity hardware, is ...

متن کامل

Stimulation of Rauscher Leukemia Virus DMA Polymerase DMA-directed DMA Synthesis by Cationic Trypanocides and Polyamines1

Activated DMA-directed DNA synthesis catalyzed by Rauscher leukemia virus (RLV) and other type C mammalian retroviral DNA polymerases is uniquely stimulated by biologically active polyamines. Cationic trypanocides may act as antagonists of polyamine function. As described here, several cationic trypanocides stimulate RLV polymerase-catalyzed DNA-directed DNA synthe sis at concentrations signifi...

متن کامل

Amba Dedicated Dma Controller with Multiple Masters Using Vhdl

This paper describes implementation of DMA controller of AMBA Bus with two masters using VHDL. DMA controller is a synthesizable soft IP core connected to the AMBA AHB Bus for easy integration into SOC implementation. The Direct Memory Access (DMA) Controller is a hardware feature that enables movement of blocks of data from peripheral to memory, memory to peripheral or memory to memory. This m...

متن کامل

Understanding DMA Malware

Attackers constantly explore ways to camouflage illicit activities against computer platforms. Stealthy attacks are required in industrial espionage and also by criminals stealing banking credentials. Modern computers contain dedicated hardware such as network and graphics cards. Such devices implement independent execution environments but have direct memory access (DMA) to the host runtime me...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2019

ISSN: 2169-3536

DOI: 10.1109/access.2018.2889558