The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CISC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-1991 (18) 1992-1996 (16) 1997-1999 (15) 2000-2003 (19) 2004-2005 (42) 2006-2009 (15) 2010-2023 (11)
Publication types (Num. hits)
article(28) book(2) inproceedings(104) phdthesis(1) proceedings(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 150 occurrences of 119 keywords

Results
Found 136 publication records. Showing 136 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
191Ciji Isen, Lizy K. John, Eugene John A Tale of Two Processors: Revisiting the RISC-CISC Debate. Search on Bibsonomy SPEC Benchmark Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
116You-Sung Chang, Bong-Il Park, In-Cheol Park, Chong-Min Kyung Customization of a CISC Processor Core for Low-Power Applications. Search on Bibsonomy ICCD The full citation details ... 1999 DBLP  DOI  BibTeX  RDF CISC-processor, Complex-instruction, ROM-compile, Low-power-design, Microcode
75Shiliang Hu, Ilhyun Kim, Mikko H. Lipasti, James E. Smith 0001 An approach for implementing efficient superscalar CISC processors. Search on Bibsonomy HPCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Akira Kitajima, Toshiyuki Sasaki, Yoshinori Takeuchi, Masaharu Imai Design of Application Specific CISC Using PEAS-III. Search on Bibsonomy IEEE International Workshop on Rapid System Prototyping The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
57Gaetano Borriello, Andrew R. Cherenson, Peter B. Danzig, Michael N. Nelson RISCs versus CISCs for Prolog: A Case Study. Search on Bibsonomy ASPLOS The full citation details ... 1987 DBLP  DOI  BibTeX  RDF Prolog, RISC, CISC
53Dengguo Feng, Dongdai Lin, Moti Yung (eds.) Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Gil-Jong Mun, Yongmin Kim 0005, DongKook Kim, BongNam Noh Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim 0001 Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Hyun-Sun Kang, Chang-Seop Park MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Roman Schlegel, Serge Vaudenay Enforcing Email Addresses Privacy Using Tokens. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Tianjie Cao, Dongdai Lin Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Serge Vaudenay On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Raylin Tso, Takeshi Okamoto, Eiji Okamoto Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature
53Cheol-Min Park, Myung-Hwan Kim, Moti Yung A Remark on Implementing the Weil Pairing. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modified Weil pairing, separable endomorphism, distortion map, Pairing-based cryptosystem, Weil pairing
53Fagen Li, Juntao Gao, Yupu Hu ID-Based Threshold Unsigncryption Scheme from Pairings. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof
53Rui Zhang 0002, Hideki Imai Improvements on Security Proofs of Some Identity Based Encryption Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong ID-Based Signature Scheme Without Trusted PKG. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Zhanfei Zhou Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Jong-Hyuk Roh, Kyoon-Ha Lee Key Management for Secure Overlay Multicast. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key hierarchy, Key Management, Overlay Multicast, Secure Multicast
53Shimin Wei, Guolong Chen, Guozhen Xiao A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Peng Wang 0009, Dengguo Feng, Wenling Wu HCTR: A Variable-Input-Length Enciphering Mode. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher
53Fei Gao 0001, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Hongda Li 0001, Bao Li 0001 An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature
53Jihong Teng, Shiqu Li, Xiaoying Huang The kth-Order Quasi-Generalized Bent Functions over Ring Zp. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Giovanni Di Crescenzo You Can Prove So Many Things in Zero-Knowledge. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Yuan Zhou, Zhenfu Cao, Zhenchuan Chai Constructing Secure Proxy Cryptosystem. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Proxy cryptosystem, bilinear Diffie-Hellman, ID-based
53Chunxiang Gu, Yuefei Zhu An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear pairings, fair exchange, ID-based cryptography, verifiably encrypted signatures
53Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider Specifying Authentication Using Signal Events in CSP. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Xiaolan Joy Zhang, Brian King Modeling RFID Security. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz Towards a General RC4-Like Keystream Generator. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random shuffle, stream ciphers, RC4, keystream generator
53Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang Efficient Group Signatures from Bilinear Pairing. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF GDH group, Digital signature, Bilinear pairing, Group signature
53Wenping Ma 0002, Fu Tai Zhang New Methods to Construct Cheating Immune Multisecret Sharing Scheme. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing
53Yongdong Wu Efficient Authentication of Electronic Document Workflow. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Crypto-Biometric, Fuzzy Fingerprint Vault, Geometric Hashing
53Pradeep Kumar Mishra Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Montgomery ladder, simultaneous inversion, parallel algorithm, Elliptic Curve Cryptosystems, Scalar Multiplication
53Zuhua Shao Enhanced Aggregate Signatures from Pairings. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security model, random oracle model, Aggregate signature
53Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar An Improved Secure Two-Party Computation Protocol. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Ryuichi Takahashi, Noriyoshi Yoshida Diagonal Examples for Design Space Exploration in an Educational Environment CITY-1. Search on Bibsonomy MSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
50Youfeng Wu, Maurício Breternitz Jr., Herbert H. J. Hum, Ramesh V. Peri, Jay Pickett Enhanced code density of embedded CISC processors with echo technology. Search on Bibsonomy CODES+ISSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CISC processors, echo technology, embedded systems, compression, code density
50Mohammad S. Obaidat, Humayun Khalid, K. Sadiq Performance Evaluation of CISC Computer Systems Under Single- and Two-Level Cache Environments. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1994 DBLP  DOI  BibTeX  RDF modified Gibson mix, multilevel cache, performance evaluation, CISC, simulation methodologies
50Kristy Andrews, Duane Sand Migrating a CISC Computer Family onto RISC via Object Code Translation. Search on Bibsonomy ASPLOS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF RISC, CISC
50Dileep Bhandarkar, Douglas W. Clark Performance From Architecture: Comparing a RISC and CISC with Similar Hardware Organization. Search on Bibsonomy ASPLOS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF RISC, CISC
42Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bilinear pairing, group signature, ID-based cryptography, verifiably encrypted signature
42Maurizio Rebaudengo, Matteo Sonza Reorda, Massimo Violante, Ph. Cheynet, Bogdan Nicolescu, Raoul Velazco Evaluating the Effectiveness of a Software Fault-Tolerance Technique on RISC- and CISC-Based Architectures. Search on Bibsonomy IOLTW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Fault Injection, Software Fault-Tolerance
42Uming Ko, Poras T. Balsara, Ashwini K. Nanda Energy optimization of multilevel cache architectures for RISC and CISC processors. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
42Gabriel M. Silberman, Kemal Ebcioglu An architectural framework for migration from CISC to higher performance platforms. Search on Bibsonomy ICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
40Anthony-Trung Nguyen, Maged M. Michael, Arun Sharma, Josep Torrellas The Augmint multiprocessor simulation toolkit for Intel x86 architectures. Search on Bibsonomy ICCD The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Augmint multiprocessor simulation toolkit, Intel x86 architectures, publicly available simulation tools, instruction mix, memory reference patterns, CISC architectures, execution driven multiprocessor simulation toolkit, m4 macro extended C, C++ applications, SPLASH-2 benchmark suites, thread based programming model, shared global address space, private stack space, simulator interface, MINT simulation toolkit, x8d based uniprocessor systems, multiprocessing systems, trace driven simulation, architecture simulators, uniprocessors
33Cristina Cifuentes, Doug Simon, Antoine Fraboulet Assembly to High-Level Language Translation. Search on Bibsonomy ICSM The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Yan He, Xiangning Chen Survey and Comparison of Pipeline of Some RISC and CISC System Architectures. Search on Bibsonomy ICCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Taoran Xiang, Lunkai Zhang, Shuqian An, Xiaochun Ye, Mingzhe Zhang, Yanhuan Liu, Mingyu Yan, Da Wang, Hao Zhang 0009, Wenming Li, Ninghui Sun, Dongrui Fan RISC-NN: Use RISC, NOT CISC as Neural Network Hardware Infrastructure. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
26Calvin Deutschbein, Cynthia Sturton Evaluating Security Specification Mining for a CISC Architecture. Search on Bibsonomy HOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Jiangtao Wang Session details: Workshop: CISC. Search on Bibsonomy EWSN The full citation details ... 2019 DBLP  BibTeX  RDF
26Dongyang Li, Yafei Yang, Weijun Li, Qing Yang 0001 CISC: Coordinating Intelligent SSD and CPU to Speedup Graph Processing. Search on Bibsonomy ISPDC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Emily R. Blem, Jaikrishnan Menon, Thiruvengadam Vijayaraghavan, Karthikeyan Sankaralingam ISA Wars: Understanding the Relevance of ISA being RISC or CISC to Performance, Power, and Energy on Modern Architectures. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Zhijiao Zhang, Ya-Shuai Lü, Yu Chen 0004, Yongqiang Lu 0001, Yuanchun Shi Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach. Search on Bibsonomy SEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Emily R. Blem, Jaikrishnan Menon, Karthikeyan Sankaralingam Power struggles: Revisiting the RISC vs. CISC debate on contemporary ARM and x86 architectures. Search on Bibsonomy HPCA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Kaiqi Zhao 0001, Enxun Wei, Qingyu Sui, Kenny Q. Zhu, Eric Lo 0001 CISC: clustered image search by conceptualization. Search on Bibsonomy EDBT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Farhat Masood RISC and CISC Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
26Ad J. van de Goor, Said Hamdioui, Georgi Gaydadjiev Using a CISC microcontroller to test embedded memories. Search on Bibsonomy DDECS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26René de Jesús Romero-Troncoso, Alejandro Ordaz-Moreno, Jose Alberto Vite-Frias, Arturo Garcia-Perez 8-bit CISC Microprocessor Core for Teaching Applications in the Digital Systems Laboratory. Search on Bibsonomy ReConFig The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Stephen McCamant, Greg Morrisett Evaluating SFI for a CISC Architecture. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2006 DBLP  BibTeX  RDF
26James C. Dehnert The Transmeta Crusoe: VLIW Embedded in CISC. Search on Bibsonomy SCOPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Felix Kühling, Krister Wolff, Peter Nordin A Brute-Force Approach to Automatic Induction of Machine Code on CISC Architectures. Search on Bibsonomy EuroGP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26R.-Ming Shiu, Hui-Yue Hwang, Jean Jyh-Jiun Shann Aggressive Schduling for Memory Accesses of CISC Superscalar Microprocessors. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2001 DBLP  BibTeX  RDF
26Andrew W. Appel, Lal George Optimal Spilling for CISC Machines with Few Registers. Search on Bibsonomy PLDI The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Dileep Bhandarkar RISC versus CISC: a tale of two chips. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
26Chong-Min Kyung, In-Cheol Park, Se-Kyoung Hong, K. S. Seong, B. S. Kong, Seungjong Lee, Hoon Choi, S. R. Maeng, D. T. Kim, Jong-Sun Kim, S. H. Park, Y. J. Kang HK386: an x86-compatible 32-bit CISC microprocessor. Search on Bibsonomy ASP-DAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
26Allan G. Bromley Hardware experiments with CISC and RISC computer architectures. Search on Bibsonomy ACSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
26M. Osman Tokhi, M. Alamgir Hossain CISC, RISC and DSP processors in real-time signal processing and control. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
26Mark Smotherman, Manoj Franklin Improving CISC instruction decoding performance using a fill unit. Search on Bibsonomy MICRO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
26J. P. Tual, Michel Thill, C. Bernard, Huy Nam Nguyen, F. Mottini, M. Moreau, P. Vallet Auriga2: a 4.7 million-transistor CISC microprocessor. Search on Bibsonomy ASP-DAC The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
26Mohammad S. Obaidat, Humayun Khalid, K. Sadiq A methodology for evaluating the performance of CISC computer systems under single and two-level cache environments. Search on Bibsonomy Microprocess. Microprogramming The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
26Thomas Flik, Hans Liebig Mikroprozessortechnik - CISC, RISC, Systemaufbau, Programmierung (4. Aufl.). Search on Bibsonomy 1994   RDF
26Milivoje Aleksic, Mladena Novakovic, Aleksandar Car, Jelica Protic CISC versus RISC processors for graphics: A simulation study. Search on Bibsonomy Microprocess. Microprogramming The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
26Wilfried Gerth, J. Gottfriedsen RISC contra CISC - Beobachtungen bei der Portierung eines Echtzeitbetriebssystems. Search on Bibsonomy PEARL The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
26D. B. Tolley Analysis of CISC versus RISC microprocessors for FDDI network interfaces. Search on Bibsonomy LCN The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
26Silvia Melitta Müller RISC und CISC: Optimierung und Vergleich von Architekturen. Search on Bibsonomy 1991   RDF
26Daniel Tabak The risk against CISC controversy apears to be approaching a lower steady state. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
26J. P. C. F. H. Smeets, Willem J. Withagen, M. P. J. Stevens Pipelining a memory based CISC processor. Search on Bibsonomy Microprocessing and Microprogramming The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
26Arthus I. Karshmer, James N. Thomas, P. K. Annaiyappa, D. Eshner, S. Kankanahalli, G. Kurup Architectural support for operating systems: A popular RISC vs. a popular CISC. Search on Bibsonomy Microprocessing and Microprogramming The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
26Steve Heath Microprocessor architectures and systems - RISC, CISC and DSP processors. Search on Bibsonomy 1990   RDF
26Norbert Drescher A new microarchitecture based on a RISC like structure but with a CISC like instruction set. Search on Bibsonomy Microprocess. Microprogramming The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26A. Thampy Thomas A single cycle VLSI CISC-based workstation: system overview and performance characteristics. Search on Bibsonomy COMPCON The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26Douglas W. Jones A minimal CISC. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
26Yashwant K. Malaiya, Sheng Feng Design of a testable RISC-to-CISC control architecture. Search on Bibsonomy MICRO The full citation details ... 1988 DBLP  BibTeX  RDF RISC
26J. H. Chang, H. H. Chao, K. Lewis, M. Holland Control store implementation of a high performance VLSI CISC. Search on Bibsonomy MICRO The full citation details ... 1988 DBLP  BibTeX  RDF CICS/VS
26Patrick Horster, Dietrich Manstetten, Heidrun Pelzer Die RISC-CISC Debatte. Search on Bibsonomy Angew. Inform. The full citation details ... 1987 DBLP  BibTeX  RDF
26Nick Tredennick Compcon Panel: The RISC vs. CISC Debate. Search on Bibsonomy COMPCON The full citation details ... 1986 DBLP  BibTeX  RDF
26Robert P. Colwell, Charles Y. Hitchcock III, E. Douglas Jensen Peering through the RISC/CISC fog: an outline of research. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
24Tingting Sha, Milo M. K. Martin, Amir Roth NoSQ: Store-Load Communication without a Store Queue. Search on Bibsonomy IEEE Micro The full citation details ... 2007 DBLP  DOI  BibTeX  RDF microarchitecture, RISC, pipeline processors, VLIW architectures, CISC
24Sumeet Kumar, Aneesh Aggarwal Self-checking instructions: reducing instruction redundancy for concurrent error detection. Search on Bibsonomy PACT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RISC/CISC, reducing instruction redundancy, redundant multi-threading, self-checking instructions, concurrent error detection, VLIW architectures
24Chidamber Kulkarni, C. Ghez, Miguel Miranda, Francky Catthoor, Hugo De Man Cache Conscious Data Layout Organization for Conflict Miss Reduction in Embedded Multimedia Applications. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RISC/CISC, VLIW architectures, VLSI systems
24Murali Jayapala, Francisco Barat, Tom Vander Aa, Francky Catthoor, Henk Corporaal, Geert Deconinck Clustered Loop Buffer Organization for Low Energy VLIW Embedded Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RISC/CISC, low-power design, memory management, real-time and embedded systems, VLIW architectures, memory design
24James O. Bondi, Ashwini K. Nanda, Simonjit Dutta Integrating a Misprediction Recovery Cache (MRC) into a Superscalar Pipeline. Search on Bibsonomy MICRO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF branch target buffer technology, deep pipelines, misprediction recovery cache integration, performance loss, residual misprediction penalty, superscalar pipeline, microprocessor chips, microprocessor designs, CISC, multiple instructions
24Yooichi Shintani, Kiyoshi Inoue, Eiki Kamada, Toru Shonai A Performance and Cost Analysis of Applying Superscalar Method to Mainframe Computers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1995 DBLP  DOI  BibTeX  RDF CPI, operand cache, object compatibility, performance, pipeline, RISC, superscalar, CPU, OLTP, hardware cost, CISC, mainframe computer, Arithmetic unit
24Patrick Rogers, Marc Pitarys Implementing Distributed Ada. Search on Bibsonomy TRI-Ada The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Ada, RISC, CISC
Displaying result #1 - #100 of 136 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license