Zobrazeno 1 - 10
of 558
pro vyhledávání: '"Bit field"'
Autor:
Fengbin Zhang, Di Chen
Publikováno v:
IEEE Systems Journal. 15:1489-1500
Fifth-generation (5G) nonstandalone (NSA) uses the 4G infrastructure to realize the rapid deployment of 5G, which will challenge the convergence of network architecture, signaling recognition, and editing capabilities of the next generation of mobile
Autor:
Akinori Kanasugi, Takahito Hayashi
Publikováno v:
Artificial Life and Robotics. 25:59-63
This paper proposes an EPIC (Explicitly Parallel Instruction Computing Architecture) type processor based on MIPS. VLIW processors can execute multiple instructions simultaneously, but due to dependency of instructions, it is often impossible to exec
Autor:
Joseph Polchinski
Publikováno v:
Getting Started with Salesforce Einstein Analytics ISBN: 9781484251997
This chapter covers a range of advanced topics such as bit data handling, creation of startup code in C, stack overflow prevention, workaround to allow reentrant interrupt, semaphore implementation and memory ordering, and how memory barrier instruct
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a2bebad07f41dc7f30ef95e1117d7ea8
https://doi.org/10.1201/9781003134046-8
https://doi.org/10.1201/9781003134046-8
Publikováno v:
2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT).
A new data type called Posit is designed as a direct drop-in replacement for IEEE Standard 754 floating-point numbers (floats). Because of having high accuracy, better closure, simpler circuitry and better range it may replace the Floating-Point Unit
Publikováno v:
DSD
The HW/SW interface is a common and crucial component in System-on-Chips, enabling the interaction between software and hardware. Generating architecture and firmware code of the interface from extended IP-XACT, SystemRDL, or proprietary formalism is
Publikováno v:
Digital Signal Processing. 70:39-48
The error performance of LDPC-coded QAM systems, such as those implied by the G.hn and IEEE 802.11n standards, can be considerably improved by bit mapping techniques. Recently, a simple root-like bit mapping has been proposed by the authors. It is ba
Publikováno v:
Microelectronics Reliability. 73:92-96
Single Error Correction Double Error Detection (SEC-DED) codes are widely used to protect memories from soft errors due to their simple implementation. However, the limitation is that the double bit errors can just be detected but cannot be recovered
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 22:1-26
Recently, phase change memory (PCM) has been emerging as a strong replacement for DRAM owing to its many advantages such as nonvolatility, high capacity, low leakage power, and so on. However, PCM is still restricted for use as main memory because of
Publikováno v:
IEEE Access, Vol 5, Pp 8940-8947 (2017)
Conventional error detection schemes, such as the repetition code, parity bit, and Hamming code, have been used to detect bit errors in data. These conventional schemes require the insertion of additional bits to detect bit errors, but the code rate
Autor:
Pavel Lafata
Publikováno v:
Computers & Electrical Engineering. 56:1-14
Optimum segmentation step strongly affects the resulting bit gain of a proposed bit addressing technique.Existing bit masking compression techniques are inefficient for random bitstreams contained in downstream network frames.Proposed bit masking tec