Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
191 | Ciji Isen, Lizy K. John, Eugene John |
A Tale of Two Processors: Revisiting the RISC-CISC Debate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPEC Benchmark Workshop ![In: Computer Performance Evaluation and Benchmarking, SPEC Benchmark Workshop 2009, Austin, TX, USA, January 25, 2009. Proceedings, pp. 57-76, 2009, Springer, 978-3-540-93798-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
116 | You-Sung Chang, Bong-Il Park, In-Cheol Park, Chong-Min Kyung |
Customization of a CISC Processor Core for Low-Power Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: Proceedings of the IEEE International Conference On Computer Design, VLSI in Computers and Processors, ICCD '99, Austin, Texas, USA, October 10-13, 1999, pp. 152-, 1999, IEEE Computer Society, 0-7695-0406-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
CISC-processor, Complex-instruction, ROM-compile, Low-power-design, Microcode |
75 | Shiliang Hu, Ilhyun Kim, Mikko H. Lipasti, James E. Smith 0001 |
An approach for implementing efficient superscalar CISC processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: 12th International Symposium on High-Performance Computer Architecture, HPCA-12 2006, Austin, Texas, USA, February 11-15, 2006, pp. 41-52, 2006, IEEE Computer Society, 0-7803-9368-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Akira Kitajima, Toshiyuki Sasaki, Yoshinori Takeuchi, Masaharu Imai |
Design of Application Specific CISC Using PEAS-III. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE International Workshop on Rapid System Prototyping ![In: 13th IEEE International Workshop on Rapid System Prototyping (RSP 2002), 1-3 July 2002, Darmstadt, Germany, pp. 12-17, 2002, IEEE Computer Society, 0-7695-1703-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
57 | Gaetano Borriello, Andrew R. Cherenson, Peter B. Danzig, Michael N. Nelson |
RISCs versus CISCs for Prolog: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the Second International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS II), Palo Alto, California, USA, October 5-8, 1987., pp. 136-145, 1987, ACM Press, 0-8186-0805-6. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
Prolog, RISC, CISC |
53 | Dengguo Feng, Dongdai Lin, Moti Yung (eds.) |
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![Springer, 3-540-30855-5 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Gil-Jong Mun, Yongmin Kim 0005, DongKook Kim, BongNam Noh |
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 254-264, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim 0001 |
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 279-289, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Hyun-Sun Kang, Chang-Seop Park |
MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 407-418, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Roman Schlegel, Serge Vaudenay |
Enforcing Email Addresses Privacy Using Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 91-100, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Tianjie Cao, Dongdai Lin |
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 233-241, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Serge Vaudenay |
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 1-9, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 113-127, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
53 | Cheol-Min Park, Myung-Hwan Kim, Moti Yung |
A Remark on Implementing the Weil Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 313-323, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
modified Weil pairing, separable endomorphism, distortion map, Pairing-based cryptosystem, Weil pairing |
53 | Fagen Li, Juntao Gao, Yupu Hu |
ID-Based Threshold Unsigncryption Scheme from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 242-253, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
(t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof |
53 | Rui Zhang 0002, Hideki Imai |
Improvements on Security Proofs of Some Identity Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 28-41, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 53-62, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Zhanfei Zhou |
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 370-383, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Jong-Hyuk Roh, Kyoon-Ha Lee |
Key Management for Secure Overlay Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 336-345, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Key hierarchy, Key Management, Overlay Multicast, Secure Multicast |
53 | Shimin Wei, Guolong Chen, Guozhen Xiao |
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 202-209, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
HCTR: A Variable-Input-Length Enciphering Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 175-188, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher |
53 | Fei Gao 0001, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu |
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 302-312, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Hongda Li 0001, Bao Li 0001 |
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 210-220, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu |
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 290-301, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature |
53 | Jihong Teng, Shiqu Li, Xiaoying Huang |
The kth-Order Quasi-Generalized Bent Functions over Ring Zp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 189-201, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 346-357, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Giovanni Di Crescenzo |
You Can Prove So Many Things in Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 10-27, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Constructing Secure Proxy Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 150-161, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Proxy cryptosystem, bilinear Diffie-Hellman, ID-based |
53 | Chunxiang Gu, Yuefei Zhu |
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 42-52, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
bilinear pairings, fair exchange, ID-based cryptography, verifiably encrypted signatures |
53 | Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider |
Specifying Authentication Using Signal Events in CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 63-74, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon |
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 265-278, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Xiaolan Joy Zhang, Brian King |
Modeling RFID Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 75-90, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz |
Towards a General RC4-Like Keystream Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 162-174, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
random shuffle, stream ciphers, RC4, keystream generator |
53 | Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang |
Efficient Group Signatures from Bilinear Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 128-139, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
GDH group, Digital signature, Bilinear pairing, Group signature |
53 | Wenping Ma 0002, Fu Tai Zhang |
New Methods to Construct Cheating Immune Multisecret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 384-394, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing |
53 | Yongdong Wu |
Efficient Authentication of Electronic Document Workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 101-112, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn |
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 358-369, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Crypto-Biometric, Fuzzy Fingerprint Vault, Geometric Hashing |
53 | Pradeep Kumar Mishra |
Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 324-335, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Montgomery ladder, simultaneous inversion, parallel algorithm, Elliptic Curve Cryptosystems, Scalar Multiplication |
53 | Zuhua Shao |
Enhanced Aggregate Signatures from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 140-149, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security model, random oracle model, Aggregate signature |
53 | Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura |
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 395-406, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
An Improved Secure Two-Party Computation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 221-232, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Ryuichi Takahashi, Noriyoshi Yoshida |
Diagonal Examples for Design Space Exploration in an Educational Environment CITY-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSE ![In: IEEE International Conference on Microelectronic Systems Education, MSE 1999, Arlington, Virginia, USA, July 19-21, 1999, pp. 71-73, 1999, IEEE Computer Society, 0-7695-0312-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
50 | Youfeng Wu, Maurício Breternitz Jr., Herbert H. J. Hum, Ramesh V. Peri, Jay Pickett |
Enhanced code density of embedded CISC processors with echo technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODES+ISSS ![In: Proceedings of the 3rd IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2005, Jersey City, NJ, USA, September 19-21, 2005, pp. 160-165, 2005, ACM, 1-59593-161-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
CISC processors, echo technology, embedded systems, compression, code density |
50 | Mohammad S. Obaidat, Humayun Khalid, K. Sadiq |
Performance Evaluation of CISC Computer Systems Under Single- and Two-Level Cache Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Conference on Computer Science ![In: Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, CSC '94, Phoenix, Arizona, USA, March 8-10, 1994, pp. 226-232, 1994, ACM, 0-89791-634-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
modified Gibson mix, multilevel cache, performance evaluation, CISC, simulation methodologies |
50 | Kristy Andrews, Duane Sand |
Migrating a CISC Computer Family onto RISC via Object Code Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: ASPLOS-V Proceedings - Fifth International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, Massachusetts, USA, October 12-15, 1992., pp. 213-222, 1992, ACM Press, 0-89791-534-8. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
RISC, CISC |
50 | Dileep Bhandarkar, Douglas W. Clark |
Performance From Architecture: Comparing a RISC and CISC with Similar Hardware Organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: ASPLOS-IV Proceedings - Forth International Conference on Architectural Support for Programming Languages and Operating Systems, Santa Clara, California, USA, April 8-11, 1991., pp. 310-319, 1991, ACM Press, 0-89791-380-9. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
RISC, CISC |
42 | Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun |
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 1-12, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairing, group signature, ID-based cryptography, verifiably encrypted signature |
42 | Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Ph. Cheynet, Bogdan Nicolescu, Raoul Velazco |
Evaluating the Effectiveness of a Software Fault-Tolerance Technique on RISC- and CISC-Based Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTW ![In: 6th IEEE International On-Line Testing Workshop (IOLTW 2000), 3-5 July 2000, Palma de Mallorca, Spain, pp. 17-, 2000, IEEE Computer Society, 0-7695-0646-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Fault Injection, Software Fault-Tolerance |
42 | Uming Ko, Poras T. Balsara, Ashwini K. Nanda |
Energy optimization of multilevel cache architectures for RISC and CISC processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 6(2), pp. 299-308, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
42 | Gabriel M. Silberman, Kemal Ebcioglu |
An architectural framework for migration from CISC to higher performance platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Proceedings of the 6th international conference on Supercomputing, ICS 1992, Washington, DC, USA, July 19-24, 1992, pp. 198-215, 1992, ACM, 0-89791-485-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
40 | Anthony-Trung Nguyen, Maged M. Michael, Arun Sharma, Josep Torrellas |
The Augmint multiprocessor simulation toolkit for Intel x86 architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 1996 International Conference on Computer Design (ICCD '96), VLSI in Computers and Processors, October 7-9, 1996, Austin, TX, USA, Proceedings, pp. 486-490, 1996, IEEE Computer Society, 0-8186-7554-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Augmint multiprocessor simulation toolkit, Intel x86 architectures, publicly available simulation tools, instruction mix, memory reference patterns, CISC architectures, execution driven multiprocessor simulation toolkit, m4 macro extended C, C++ applications, SPLASH-2 benchmark suites, thread based programming model, shared global address space, private stack space, simulator interface, MINT simulation toolkit, x8d based uniprocessor systems, multiprocessing systems, trace driven simulation, architecture simulators, uniprocessors |
33 | Cristina Cifuentes, Doug Simon, Antoine Fraboulet |
Assembly to High-Level Language Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 1998 International Conference on Software Maintenance, ICSM 1998, Bethesda, Maryland, USA, November 16-19, 1998, pp. 228-237, 1998, IEEE Computer Society, 0-8186-8779-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Yan He, Xiangning Chen |
Survey and Comparison of Pipeline of Some RISC and CISC System Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: 8th International Conference on Computer and Communication Systems, ICCCS 2023, Guangzhou, China, April 21-23, 2023, pp. 785-790, 2023, IEEE, 978-1-6654-5612-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Taoran Xiang, Lunkai Zhang, Shuqian An, Xiaochun Ye, Mingzhe Zhang, Yanhuan Liu, Mingyu Yan, Da Wang, Hao Zhang 0009, Wenming Li, Ninghui Sun, Dongrui Fan |
RISC-NN: Use RISC, NOT CISC as Neural Network Hardware Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2103.12393, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
26 | Calvin Deutschbein, Cynthia Sturton |
Evaluating Security Specification Mining for a CISC Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HOST ![In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 7-11, 2020, pp. 164-175, 2020, IEEE, 978-1-7281-7405-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Jiangtao Wang |
Session details: Workshop: CISC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWSN ![In: Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, EWSN 2019, Beijing, China, February 25-27, 2019, 2019, ACM, 978-0-9949886-3-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
26 | Dongyang Li, Yafei Yang, Weijun Li, Qing Yang 0001 |
CISC: Coordinating Intelligent SSD and CPU to Speedup Graph Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC ![In: 17th International Symposium on Parallel and Distributed Computing, ISPDC 2018, Geneva, Switzerland, June 25-28, 2018, pp. 149-156, 2018, IEEE, 978-1-5386-5330-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Emily R. Blem, Jaikrishnan Menon, Thiruvengadam Vijayaraghavan, Karthikeyan Sankaralingam |
ISA Wars: Understanding the Relevance of ISA being RISC or CISC to Performance, Power, and Energy on Modern Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 33(1), pp. 3:1-3:34, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Zhijiao Zhang, Ya-Shuai Lü, Yu Chen 0004, Yongqiang Lu 0001, Yuanchun Shi |
Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, pp. 431-445, 2015, Springer, 978-3-319-18466-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Emily R. Blem, Jaikrishnan Menon, Karthikeyan Sankaralingam |
Power struggles: Revisiting the RISC vs. CISC debate on contemporary ARM and x86 architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: 19th IEEE International Symposium on High Performance Computer Architecture, HPCA 2013, Shenzhen, China, February 23-27, 2013, pp. 1-12, 2013, IEEE Computer Society, 978-1-4673-5585-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Kaiqi Zhao 0001, Enxun Wei, Qingyu Sui, Kenny Q. Zhu, Eric Lo 0001 |
CISC: clustered image search by conceptualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013, pp. 749-752, 2013, ACM, 978-1-4503-1597-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Farhat Masood |
RISC and CISC ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1101.5364, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
26 | Ad J. van de Goor, Said Hamdioui, Georgi Gaydadjiev |
Using a CISC microcontroller to test embedded memories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DDECS ![In: 13th IEEE International Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2010, Vienna, Austria, April 14-16, 2010, pp. 261-266, 2010, IEEE Computer Society, 978-1-4244-6612-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
26 | René de Jesús Romero-Troncoso, Alejandro Ordaz-Moreno, Jose Alberto Vite-Frias, Arturo Garcia-Perez |
8-bit CISC Microprocessor Core for Teaching Applications in the Digital Systems Laboratory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ReConFig ![In: 2006 IEEE International Conference on Reconfigurable Computing and FPGA's, ReConFig 2006, San Luis Potosi, Mexico, September 20-22, 2006, pp. 300-303, 2006, IEEE Computer Society, 1-4244-0690-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Stephen McCamant, Greg Morrisett |
Evaluating SFI for a CISC Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006, 2006, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
26 | James C. Dehnert |
The Transmeta Crusoe: VLIW Embedded in CISC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCOPES ![In: Software and Compilers for Embedded Systems, 7th International Workshop, SCOPES 2003, Vienna, Austria, September 24-26, 2003, Proceedings, pp. 1, 2003, Springer, 3-540-20145-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Felix Kühling, Krister Wolff, Peter Nordin |
A Brute-Force Approach to Automatic Induction of Machine Code on CISC Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroGP ![In: Genetic Programming, 5th European Conference, EuroGP 2002, Kinsale, Ireland, April 3-5, 2002, Proceedings, pp. 288-297, 2002, Springer, 3-540-43378-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | R.-Ming Shiu, Hui-Yue Hwang, Jean Jyh-Jiun Shann |
Aggressive Schduling for Memory Accesses of CISC Superscalar Microprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 17(5), pp. 787-803, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
26 | Andrew W. Appel, Lal George |
Optimal Spilling for CISC Machines with Few Registers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 2001 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Snowbird, Utah, USA, June 20-22, 2001, pp. 243-253, 2001, ACM, 1-58113-414-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Dileep Bhandarkar |
RISC versus CISC: a tale of two chips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 25(1), pp. 1-12, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
26 | Chong-Min Kyung, In-Cheol Park, Se-Kyoung Hong, K. S. Seong, B. S. Kong, Seungjong Lee, Hoon Choi, S. R. Maeng, D. T. Kim, Jong-Sun Kim, S. H. Park, Y. J. Kang |
HK386: an x86-compatible 32-bit CISC microprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the ASP-DAC '97 Asia and South Pacific Design Automation Conference, Nippon Convention Center, Chiba, Japan, January 28-31, 1997, pp. 661-662, 1997, IEEE, 0-7803-3663-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
26 | Allan G. Bromley |
Hardware experiments with CISC and RISC computer architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSE ![In: Proceedings of the ACM SIGCSE 2nd Australasian Conference on Computer Science Education, ACSE 1997, Melbourne, Victoria, Australia, 1997, pp. 207-215, 1997, ACM, 0-89791-958-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
26 | M. Osman Tokhi, M. Alamgir Hossain |
CISC, RISC and DSP processors in real-time signal processing and control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 19(5), pp. 291-300, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Mark Smotherman, Manoj Franklin |
Improving CISC instruction decoding performance using a fill unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: Proceedings of the 28th Annual International Symposium on Microarchitecture, Ann Arbor, Michigan, USA, November 29 - December 1, 1995, pp. 219-229, 1995, ACM / IEEE Computer Society, 0-8186-7349-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
26 | J. P. Tual, Michel Thill, C. Bernard, Huy Nam Nguyen, F. Mottini, M. Moreau, P. Vallet |
Auriga2: a 4.7 million-transistor CISC microprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 1995 Conference on Asia Pacific Design Automation, Makuhari, Massa, Chiba, Japan, August 29 - September 1, 1995, 1995, ACM, 0-89791-766-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad S. Obaidat, Humayun Khalid, K. Sadiq |
A methodology for evaluating the performance of CISC computer systems under single and two-level cache environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microprogramming ![In: Microprocess. Microprogramming 40(6), pp. 411-426, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
26 | Thomas Flik, Hans Liebig |
Mikroprozessortechnik - CISC, RISC, Systemaufbau, Programmierung (4. Aufl.). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1994 |
RDF |
|
26 | Milivoje Aleksic, Mladena Novakovic, Aleksandar Car, Jelica Protic |
CISC versus RISC processors for graphics: A simulation study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microprogramming ![In: Microprocess. Microprogramming 37(1-5), pp. 45-48, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
26 | Wilfried Gerth, J. Gottfriedsen |
RISC contra CISC - Beobachtungen bei der Portierung eines Echtzeitbetriebssystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEARL ![In: PEARL 91, Workshop über Realzeitsysteme, 12. Fachtagung des PEARL-Vereins e.V., Boppard, 28./29. November 1991, Proceedings, pp. 166-179, 1991, Springer, 3-540-54909-9. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
26 | D. B. Tolley |
Analysis of CISC versus RISC microprocessors for FDDI network interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings of the 16th Conference on Local Computer Networks, LCN 1991, October 14-17, 1991, Minneapolis, Minnesota, USA, pp. 485-493, 1991, IEEE Computer Society, 0-8186-2370-5. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
26 | Silvia Melitta Müller |
RISC und CISC: Optimierung und Vergleich von Architekturen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1991 |
RDF |
|
26 | Daniel Tabak |
The risk against CISC controversy apears to be approaching a lower steady state. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 14(6), pp. 330-331, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
26 | J. P. C. F. H. Smeets, Willem J. Withagen, M. P. J. Stevens |
Pipelining a memory based CISC processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocessing and Microprogramming ![In: Microprocessing and Microprogramming 30(1-5), pp. 665-672, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
26 | Arthus I. Karshmer, James N. Thomas, P. K. Annaiyappa, D. Eshner, S. Kankanahalli, G. Kurup |
Architectural support for operating systems: A popular RISC vs. a popular CISC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocessing and Microprogramming ![In: Microprocessing and Microprogramming 30(1-5), pp. 21-32, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
26 | Steve Heath |
Microprocessor architectures and systems - RISC, CISC and DSP processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
1990 |
RDF |
|
26 | Norbert Drescher |
A new microarchitecture based on a RISC like structure but with a CISC like instruction set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microprogramming ![In: Microprocess. Microprogramming 25(1-5), pp. 121-125, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
26 | A. Thampy Thomas |
A single cycle VLSI CISC-based workstation: system overview and performance characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPCON ![In: Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage, COMPCON Spring 89, San Francisco, CA, USA, February 27 - March 3, 1989, Digest of Papers., pp. 500-503, 1989, IEEE Computer Society, 0-8186-1909-0. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
26 | Douglas W. Jones |
A minimal CISC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 16(3), pp. 56-63, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
26 | Yashwant K. Malaiya, Sheng Feng |
Design of a testable RISC-to-CISC control architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: Proceedings of the 21st Annual Workshop and Symposium on Microprogramming and Microarchitecture, 1988, San Diego, California, USA, November 28 - December 2, 1988, pp. 57-59, 1988, ACM/IEEE, 0-8186-1919-8. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
RISC |
26 | J. H. Chang, H. H. Chao, K. Lewis, M. Holland |
Control store implementation of a high performance VLSI CISC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: Proceedings of the 21st Annual Workshop and Symposium on Microprogramming and Microarchitecture, 1988, San Diego, California, USA, November 28 - December 2, 1988, pp. 79-82, 1988, ACM/IEEE, 0-8186-1919-8. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
CICS/VS |
26 | Patrick Horster, Dietrich Manstetten, Heidrun Pelzer |
Die RISC-CISC Debatte. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Angew. Inform. ![In: Angew. Inform. 29(7), pp. 273-280, 1987. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP BibTeX RDF |
|
26 | Nick Tredennick |
Compcon Panel: The RISC vs. CISC Debate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPCON ![In: Spring COMPCON'86, Digest of Papers, Thirty-First IEEE Computer Society International Conference, San Francisco, California, USA, March 3-6, 1986, pp. 312, 1986, IEEE Computer Society, 0-8186-0692-4. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP BibTeX RDF |
|
26 | Robert P. Colwell, Charles Y. Hitchcock III, E. Douglas Jensen |
Peering through the RISC/CISC fog: an outline of research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 11(1), pp. 44-50, 1983. The full citation details ...](Pics/full.jpeg) |
1983 |
DBLP DOI BibTeX RDF |
|
24 | Tingting Sha, Milo M. K. Martin, Amir Roth |
NoSQ: Store-Load Communication without a Store Queue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 27(1), pp. 106-113, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
microarchitecture, RISC, pipeline processors, VLIW architectures, CISC |
24 | Sumeet Kumar, Aneesh Aggarwal |
Self-checking instructions: reducing instruction redundancy for concurrent error detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACT ![In: 15th International Conference on Parallel Architectures and Compilation Techniques (PACT 2006), Seattle, Washington, USA, September 16-20, 2006, pp. 64-73, 2006, ACM, 1-59593-264-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RISC/CISC, reducing instruction redundancy, redundant multi-threading, self-checking instructions, concurrent error detection, VLIW architectures |
24 | Chidamber Kulkarni, C. Ghez, Miguel Miranda, Francky Catthoor, Hugo De Man |
Cache Conscious Data Layout Organization for Conflict Miss Reduction in Embedded Multimedia Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 54(1), pp. 76-81, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
RISC/CISC, VLIW architectures, VLSI systems |
24 | Murali Jayapala, Francisco Barat, Tom Vander Aa, Francky Catthoor, Henk Corporaal, Geert Deconinck |
Clustered Loop Buffer Organization for Low Energy VLIW Embedded Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 54(6), pp. 672-683, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
RISC/CISC, low-power design, memory management, real-time and embedded systems, VLIW architectures, memory design |
24 | James O. Bondi, Ashwini K. Nanda, Simonjit Dutta |
Integrating a Misprediction Recovery Cache (MRC) into a Superscalar Pipeline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: Proceedings of the 29th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 29, Paris, France, December 2-4, 1996, pp. 14-23, 1996, ACM/IEEE Computer Society, 0-8186-7641-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
branch target buffer technology, deep pipelines, misprediction recovery cache integration, performance loss, residual misprediction penalty, superscalar pipeline, microprocessor chips, microprocessor designs, CISC, multiple instructions |
24 | Yooichi Shintani, Kiyoshi Inoue, Eiki Kamada, Toru Shonai |
A Performance and Cost Analysis of Applying Superscalar Method to Mainframe Computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 44(7), pp. 891-902, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
CPI, operand cache, object compatibility, performance, pipeline, RISC, superscalar, CPU, OLTP, hardware cost, CISC, mainframe computer, Arithmetic unit |
24 | Patrick Rogers, Marc Pitarys |
Implementing Distributed Ada. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRI-Ada ![In: Conference Proceedings on TRI-Ada 1992, Orlando, Florida USA, November 17-20, 1992., pp. 504-510, 1992, ACM, 0-89791-529-1. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Ada, RISC, CISC |