Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
191 | Ciji Isen, Lizy K. John, Eugene John |
A Tale of Two Processors: Revisiting the RISC-CISC Debate. |
SPEC Benchmark Workshop |
2009 |
DBLP DOI BibTeX RDF |
|
116 | You-Sung Chang, Bong-Il Park, In-Cheol Park, Chong-Min Kyung |
Customization of a CISC Processor Core for Low-Power Applications. |
ICCD |
1999 |
DBLP DOI BibTeX RDF |
CISC-processor, Complex-instruction, ROM-compile, Low-power-design, Microcode |
75 | Shiliang Hu, Ilhyun Kim, Mikko H. Lipasti, James E. Smith 0001 |
An approach for implementing efficient superscalar CISC processors. |
HPCA |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Akira Kitajima, Toshiyuki Sasaki, Yoshinori Takeuchi, Masaharu Imai |
Design of Application Specific CISC Using PEAS-III. |
IEEE International Workshop on Rapid System Prototyping |
2002 |
DBLP DOI BibTeX RDF |
|
57 | Gaetano Borriello, Andrew R. Cherenson, Peter B. Danzig, Michael N. Nelson |
RISCs versus CISCs for Prolog: A Case Study. |
ASPLOS |
1987 |
DBLP DOI BibTeX RDF |
Prolog, RISC, CISC |
53 | Dengguo Feng, Dongdai Lin, Moti Yung (eds.) |
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Gil-Jong Mun, Yongmin Kim 0005, DongKook Kim, BongNam Noh |
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim 0001 |
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Hyun-Sun Kang, Chang-Seop Park |
MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Roman Schlegel, Serge Vaudenay |
Enforcing Email Addresses Privacy Using Tokens. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Tianjie Cao, Dongdai Lin |
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Serge Vaudenay |
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
53 | Cheol-Min Park, Myung-Hwan Kim, Moti Yung |
A Remark on Implementing the Weil Pairing. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
modified Weil pairing, separable endomorphism, distortion map, Pairing-based cryptosystem, Weil pairing |
53 | Fagen Li, Juntao Gao, Yupu Hu |
ID-Based Threshold Unsigncryption Scheme from Pairings. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
(t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof |
53 | Rui Zhang 0002, Hideki Imai |
Improvements on Security Proofs of Some Identity Based Encryption Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Zhanfei Zhou |
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Jong-Hyuk Roh, Kyoon-Ha Lee |
Key Management for Secure Overlay Multicast. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Key hierarchy, Key Management, Overlay Multicast, Secure Multicast |
53 | Shimin Wei, Guolong Chen, Guozhen Xiao |
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
HCTR: A Variable-Input-Length Enciphering Mode. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher |
53 | Fei Gao 0001, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu |
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Hongda Li 0001, Bao Li 0001 |
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu |
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature |
53 | Jihong Teng, Shiqu Li, Xiaoying Huang |
The kth-Order Quasi-Generalized Bent Functions over Ring Zp. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Giovanni Di Crescenzo |
You Can Prove So Many Things in Zero-Knowledge. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Constructing Secure Proxy Cryptosystem. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Proxy cryptosystem, bilinear Diffie-Hellman, ID-based |
53 | Chunxiang Gu, Yuefei Zhu |
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . |
CISC |
2005 |
DBLP DOI BibTeX RDF |
bilinear pairings, fair exchange, ID-based cryptography, verifiably encrypted signatures |
53 | Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider |
Specifying Authentication Using Signal Events in CSP. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon |
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Xiaolan Joy Zhang, Brian King |
Modeling RFID Security. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz |
Towards a General RC4-Like Keystream Generator. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
random shuffle, stream ciphers, RC4, keystream generator |
53 | Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang |
Efficient Group Signatures from Bilinear Pairing. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
GDH group, Digital signature, Bilinear pairing, Group signature |
53 | Wenping Ma 0002, Fu Tai Zhang |
New Methods to Construct Cheating Immune Multisecret Sharing Scheme. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing |
53 | Yongdong Wu |
Efficient Authentication of Electronic Document Workflow. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn |
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Crypto-Biometric, Fuzzy Fingerprint Vault, Geometric Hashing |
53 | Pradeep Kumar Mishra |
Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Montgomery ladder, simultaneous inversion, parallel algorithm, Elliptic Curve Cryptosystems, Scalar Multiplication |
53 | Zuhua Shao |
Enhanced Aggregate Signatures from Pairings. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
security model, random oracle model, Aggregate signature |
53 | Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura |
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
An Improved Secure Two-Party Computation Protocol. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Ryuichi Takahashi, Noriyoshi Yoshida |
Diagonal Examples for Design Space Exploration in an Educational Environment CITY-1. |
MSE |
1999 |
DBLP DOI BibTeX RDF |
|
50 | Youfeng Wu, Maurício Breternitz Jr., Herbert H. J. Hum, Ramesh V. Peri, Jay Pickett |
Enhanced code density of embedded CISC processors with echo technology. |
CODES+ISSS |
2005 |
DBLP DOI BibTeX RDF |
CISC processors, echo technology, embedded systems, compression, code density |
50 | Mohammad S. Obaidat, Humayun Khalid, K. Sadiq |
Performance Evaluation of CISC Computer Systems Under Single- and Two-Level Cache Environments. |
ACM Conference on Computer Science |
1994 |
DBLP DOI BibTeX RDF |
modified Gibson mix, multilevel cache, performance evaluation, CISC, simulation methodologies |
50 | Kristy Andrews, Duane Sand |
Migrating a CISC Computer Family onto RISC via Object Code Translation. |
ASPLOS |
1992 |
DBLP DOI BibTeX RDF |
RISC, CISC |
50 | Dileep Bhandarkar, Douglas W. Clark |
Performance From Architecture: Comparing a RISC and CISC with Similar Hardware Organization. |
ASPLOS |
1991 |
DBLP DOI BibTeX RDF |
RISC, CISC |
42 | Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun |
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairing, group signature, ID-based cryptography, verifiably encrypted signature |
42 | Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Ph. Cheynet, Bogdan Nicolescu, Raoul Velazco |
Evaluating the Effectiveness of a Software Fault-Tolerance Technique on RISC- and CISC-Based Architectures. |
IOLTW |
2000 |
DBLP DOI BibTeX RDF |
Fault Injection, Software Fault-Tolerance |
42 | Uming Ko, Poras T. Balsara, Ashwini K. Nanda |
Energy optimization of multilevel cache architectures for RISC and CISC processors. |
IEEE Trans. Very Large Scale Integr. Syst. |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Gabriel M. Silberman, Kemal Ebcioglu |
An architectural framework for migration from CISC to higher performance platforms. |
ICS |
1992 |
DBLP DOI BibTeX RDF |
|
40 | Anthony-Trung Nguyen, Maged M. Michael, Arun Sharma, Josep Torrellas |
The Augmint multiprocessor simulation toolkit for Intel x86 architectures. |
ICCD |
1996 |
DBLP DOI BibTeX RDF |
Augmint multiprocessor simulation toolkit, Intel x86 architectures, publicly available simulation tools, instruction mix, memory reference patterns, CISC architectures, execution driven multiprocessor simulation toolkit, m4 macro extended C, C++ applications, SPLASH-2 benchmark suites, thread based programming model, shared global address space, private stack space, simulator interface, MINT simulation toolkit, x8d based uniprocessor systems, multiprocessing systems, trace driven simulation, architecture simulators, uniprocessors |
33 | Cristina Cifuentes, Doug Simon, Antoine Fraboulet |
Assembly to High-Level Language Translation. |
ICSM |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Yan He, Xiangning Chen |
Survey and Comparison of Pipeline of Some RISC and CISC System Architectures. |
ICCCS |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Taoran Xiang, Lunkai Zhang, Shuqian An, Xiaochun Ye, Mingzhe Zhang, Yanhuan Liu, Mingyu Yan, Da Wang, Hao Zhang 0009, Wenming Li, Ninghui Sun, Dongrui Fan |
RISC-NN: Use RISC, NOT CISC as Neural Network Hardware Infrastructure. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
26 | Calvin Deutschbein, Cynthia Sturton |
Evaluating Security Specification Mining for a CISC Architecture. |
HOST |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Jiangtao Wang |
Session details: Workshop: CISC. |
EWSN |
2019 |
DBLP BibTeX RDF |
|
26 | Dongyang Li, Yafei Yang, Weijun Li, Qing Yang 0001 |
CISC: Coordinating Intelligent SSD and CPU to Speedup Graph Processing. |
ISPDC |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Emily R. Blem, Jaikrishnan Menon, Thiruvengadam Vijayaraghavan, Karthikeyan Sankaralingam |
ISA Wars: Understanding the Relevance of ISA being RISC or CISC to Performance, Power, and Energy on Modern Architectures. |
ACM Trans. Comput. Syst. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Zhijiao Zhang, Ya-Shuai Lü, Yu Chen 0004, Yongqiang Lu 0001, Yuanchun Shi |
Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Emily R. Blem, Jaikrishnan Menon, Karthikeyan Sankaralingam |
Power struggles: Revisiting the RISC vs. CISC debate on contemporary ARM and x86 architectures. |
HPCA |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Kaiqi Zhao 0001, Enxun Wei, Qingyu Sui, Kenny Q. Zhu, Eric Lo 0001 |
CISC: clustered image search by conceptualization. |
EDBT |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Farhat Masood |
RISC and CISC |
CoRR |
2011 |
DBLP BibTeX RDF |
|
26 | Ad J. van de Goor, Said Hamdioui, Georgi Gaydadjiev |
Using a CISC microcontroller to test embedded memories. |
DDECS |
2010 |
DBLP DOI BibTeX RDF |
|
26 | René de Jesús Romero-Troncoso, Alejandro Ordaz-Moreno, Jose Alberto Vite-Frias, Arturo Garcia-Perez |
8-bit CISC Microprocessor Core for Teaching Applications in the Digital Systems Laboratory. |
ReConFig |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Stephen McCamant, Greg Morrisett |
Evaluating SFI for a CISC Architecture. |
USENIX Security Symposium |
2006 |
DBLP BibTeX RDF |
|
26 | James C. Dehnert |
The Transmeta Crusoe: VLIW Embedded in CISC. |
SCOPES |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Felix Kühling, Krister Wolff, Peter Nordin |
A Brute-Force Approach to Automatic Induction of Machine Code on CISC Architectures. |
EuroGP |
2002 |
DBLP DOI BibTeX RDF |
|
26 | R.-Ming Shiu, Hui-Yue Hwang, Jean Jyh-Jiun Shann |
Aggressive Schduling for Memory Accesses of CISC Superscalar Microprocessors. |
J. Inf. Sci. Eng. |
2001 |
DBLP BibTeX RDF |
|
26 | Andrew W. Appel, Lal George |
Optimal Spilling for CISC Machines with Few Registers. |
PLDI |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Dileep Bhandarkar |
RISC versus CISC: a tale of two chips. |
SIGARCH Comput. Archit. News |
1997 |
DBLP DOI BibTeX RDF |
|
26 | Chong-Min Kyung, In-Cheol Park, Se-Kyoung Hong, K. S. Seong, B. S. Kong, Seungjong Lee, Hoon Choi, S. R. Maeng, D. T. Kim, Jong-Sun Kim, S. H. Park, Y. J. Kang |
HK386: an x86-compatible 32-bit CISC microprocessor. |
ASP-DAC |
1997 |
DBLP DOI BibTeX RDF |
|
26 | Allan G. Bromley |
Hardware experiments with CISC and RISC computer architectures. |
ACSE |
1997 |
DBLP DOI BibTeX RDF |
|
26 | M. Osman Tokhi, M. Alamgir Hossain |
CISC, RISC and DSP processors in real-time signal processing and control. |
Microprocess. Microsystems |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Mark Smotherman, Manoj Franklin |
Improving CISC instruction decoding performance using a fill unit. |
MICRO |
1995 |
DBLP DOI BibTeX RDF |
|
26 | J. P. Tual, Michel Thill, C. Bernard, Huy Nam Nguyen, F. Mottini, M. Moreau, P. Vallet |
Auriga2: a 4.7 million-transistor CISC microprocessor. |
ASP-DAC |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad S. Obaidat, Humayun Khalid, K. Sadiq |
A methodology for evaluating the performance of CISC computer systems under single and two-level cache environments. |
Microprocess. Microprogramming |
1994 |
DBLP DOI BibTeX RDF |
|
26 | Thomas Flik, Hans Liebig |
Mikroprozessortechnik - CISC, RISC, Systemaufbau, Programmierung (4. Aufl.). |
|
1994 |
RDF |
|
26 | Milivoje Aleksic, Mladena Novakovic, Aleksandar Car, Jelica Protic |
CISC versus RISC processors for graphics: A simulation study. |
Microprocess. Microprogramming |
1993 |
DBLP DOI BibTeX RDF |
|
26 | Wilfried Gerth, J. Gottfriedsen |
RISC contra CISC - Beobachtungen bei der Portierung eines Echtzeitbetriebssystems. |
PEARL |
1991 |
DBLP DOI BibTeX RDF |
|
26 | D. B. Tolley |
Analysis of CISC versus RISC microprocessors for FDDI network interfaces. |
LCN |
1991 |
DBLP DOI BibTeX RDF |
|
26 | Silvia Melitta Müller |
RISC und CISC: Optimierung und Vergleich von Architekturen. |
|
1991 |
RDF |
|
26 | Daniel Tabak |
The risk against CISC controversy apears to be approaching a lower steady state. |
Microprocess. Microsystems |
1990 |
DBLP DOI BibTeX RDF |
|
26 | J. P. C. F. H. Smeets, Willem J. Withagen, M. P. J. Stevens |
Pipelining a memory based CISC processor. |
Microprocessing and Microprogramming |
1990 |
DBLP DOI BibTeX RDF |
|
26 | Arthus I. Karshmer, James N. Thomas, P. K. Annaiyappa, D. Eshner, S. Kankanahalli, G. Kurup |
Architectural support for operating systems: A popular RISC vs. a popular CISC. |
Microprocessing and Microprogramming |
1990 |
DBLP DOI BibTeX RDF |
|
26 | Steve Heath |
Microprocessor architectures and systems - RISC, CISC and DSP processors. |
|
1990 |
RDF |
|
26 | Norbert Drescher |
A new microarchitecture based on a RISC like structure but with a CISC like instruction set. |
Microprocess. Microprogramming |
1989 |
DBLP DOI BibTeX RDF |
|
26 | A. Thampy Thomas |
A single cycle VLSI CISC-based workstation: system overview and performance characteristics. |
COMPCON |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Douglas W. Jones |
A minimal CISC. |
SIGARCH Comput. Archit. News |
1988 |
DBLP DOI BibTeX RDF |
|
26 | Yashwant K. Malaiya, Sheng Feng |
Design of a testable RISC-to-CISC control architecture. |
MICRO |
1988 |
DBLP BibTeX RDF |
RISC |
26 | J. H. Chang, H. H. Chao, K. Lewis, M. Holland |
Control store implementation of a high performance VLSI CISC. |
MICRO |
1988 |
DBLP BibTeX RDF |
CICS/VS |
26 | Patrick Horster, Dietrich Manstetten, Heidrun Pelzer |
Die RISC-CISC Debatte. |
Angew. Inform. |
1987 |
DBLP BibTeX RDF |
|
26 | Nick Tredennick |
Compcon Panel: The RISC vs. CISC Debate. |
COMPCON |
1986 |
DBLP BibTeX RDF |
|
26 | Robert P. Colwell, Charles Y. Hitchcock III, E. Douglas Jensen |
Peering through the RISC/CISC fog: an outline of research. |
SIGARCH Comput. Archit. News |
1983 |
DBLP DOI BibTeX RDF |
|
24 | Tingting Sha, Milo M. K. Martin, Amir Roth |
NoSQ: Store-Load Communication without a Store Queue. |
IEEE Micro |
2007 |
DBLP DOI BibTeX RDF |
microarchitecture, RISC, pipeline processors, VLIW architectures, CISC |
24 | Sumeet Kumar, Aneesh Aggarwal |
Self-checking instructions: reducing instruction redundancy for concurrent error detection. |
PACT |
2006 |
DBLP DOI BibTeX RDF |
RISC/CISC, reducing instruction redundancy, redundant multi-threading, self-checking instructions, concurrent error detection, VLIW architectures |
24 | Chidamber Kulkarni, C. Ghez, Miguel Miranda, Francky Catthoor, Hugo De Man |
Cache Conscious Data Layout Organization for Conflict Miss Reduction in Embedded Multimedia Applications. |
IEEE Trans. Computers |
2005 |
DBLP DOI BibTeX RDF |
RISC/CISC, VLIW architectures, VLSI systems |
24 | Murali Jayapala, Francisco Barat, Tom Vander Aa, Francky Catthoor, Henk Corporaal, Geert Deconinck |
Clustered Loop Buffer Organization for Low Energy VLIW Embedded Processors. |
IEEE Trans. Computers |
2005 |
DBLP DOI BibTeX RDF |
RISC/CISC, low-power design, memory management, real-time and embedded systems, VLIW architectures, memory design |
24 | James O. Bondi, Ashwini K. Nanda, Simonjit Dutta |
Integrating a Misprediction Recovery Cache (MRC) into a Superscalar Pipeline. |
MICRO |
1996 |
DBLP DOI BibTeX RDF |
branch target buffer technology, deep pipelines, misprediction recovery cache integration, performance loss, residual misprediction penalty, superscalar pipeline, microprocessor chips, microprocessor designs, CISC, multiple instructions |
24 | Yooichi Shintani, Kiyoshi Inoue, Eiki Kamada, Toru Shonai |
A Performance and Cost Analysis of Applying Superscalar Method to Mainframe Computers. |
IEEE Trans. Computers |
1995 |
DBLP DOI BibTeX RDF |
CPI, operand cache, object compatibility, performance, pipeline, RISC, superscalar, CPU, OLTP, hardware cost, CISC, mainframe computer, Arithmetic unit |
24 | Patrick Rogers, Marc Pitarys |
Implementing Distributed Ada. |
TRI-Ada |
1992 |
DBLP DOI BibTeX RDF |
Ada, RISC, CISC |