نتایج جستجو برای: base band processor

تعداد نتایج: 430317  

1995
Debashis Basak Dhabaleswar K. Panda M. Banikazemi

Advances in multiprocessor interconnect technology are leading to high performance networks. However , software overheads associated with message passing are limiting the processors to get maximum performance from these networks, leading to under-utilization of network resources. Though processor-clusters are being used in some systems in an ad hoc manner to alleviate this problem, there is no ...

1996
Debashis Basak Dhabaleswar K. Panda Mohammad Banikazemi

Advances in multiprocessor interconnect technology are leading to high performance networks. However, software overheads associated with message passing are limiting the processors to get maximum performance from these networks, leading to under-utilization of network resources. Though processor-clusters are being used in some systems in an ad hoc manner to alleviate this problem, there is no f...

1998

With processor speeds rapidly approaching the gigahertz mark, the shortcomings of today’s memory architectures are becoming all too apparent. Waiting a few hundred nanoseconds to retrieve data from main memory is tolerable for a 100-MHz CPU, but this delay turns into hundreds of cycles for a 1-GHz processor. Compaq’s Alpha processors are likely to be the first to reach that speed, and at this m...

Journal: :ACM Computing Surveys 1977

1995
Frank Bellosa

Operating system abstractions do not always meet the needs of a language or applications designer. A lack of efficiency and functionality in scheduling mechanisms can be filled by an application-specific runtime environment providing mechanisms for dynamic processor allocation and memory conscious scheduling. We believe that a synergistic approach that involves three components, the operating s...

Journal: :Trans. Computational Science 2010
Siddhartha Chhabra Yan Solihin

With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect ...

Journal: :IEEJ Transactions on Electronics, Information and Systems 1992

Journal: :HortScience 1993

Journal: :International Journal for Research in Applied Science and Engineering Technology 2020

Journal: :Nature Photonics 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید