Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Bits'
Bits published presentations and documents on DocSlides.
Flipping Bits in Memory Without Accessing Them:
by lindy-dunigan
DRAM Disturbance Errors. Yoongu Kim. Ross Daly, J...
Engineering 245
by luanne-stotts
The Lean Launch Pad. Professors Steve Blank, . An...
15-213 Final Exam Review
by lois-ondreau
Monday December 1, 2014. TJ O’Connor. Today: Fi...
Word RAM
by natalia-silvester
Algorithms. Gerth . Stølting. Brodal. Universit...
Unit-2 Multiplexing
by lindy-dunigan
6.. 2. Bandwidth utilization is the wise use of ....
CS 61C: Great Ideas in Computer Architecture
by sherrill-nordquist
. Lecture 7: . MIPS Instruction Formats. Instruc...
Fine-grained minimal overhead value-based core power gating
by celsa-spraggs
Christopher Fritz. CSE691, May 2015. cvfritz@buff...
1 references:
by faustina-dinatale
. Bernt. S. . Aadnoy. , Iain Cooper, Stefan Z. ...
Scalable Many-Core Memory Systems Topic 1: DRAM Basics and
by tatyana-admore
DRAM Scaling. Prof. Onur Mutlu. http://www.ece.cm...
Course Outline
by giovanna-bartolotta
Introduction. Performance Evaluation. Processor D...
Image Compression, Transform Coding & the
by kittie-lecroy
Haar. Transform. 4c8 – . Dr.. David Corrigan....
Intro to cryptography:
by debby-jeon
Symmetric Encryption. Cryptography. Cryptography ...
CONSTANTS
by tatiana-dople
In This Value Does Not Change During The Program`...
Network Protocols
by ellena-manuel
Chapter 5 (TCP/IP Suite Book): . IP Addressing CI...
Extended Memory Controller and the MPAX registers And Cache
by giovanna-bartolotta
Multicore programming and Applications. February ...
EET 2261 Unit 2
by briana-ranney
HCS12 Architecture . Read . Almy. , . Chapters 3,...
Multiplication and Shift Circuits
by liane-varnes
Dec 2012. Shmuel Wimer. Bar Ilan University, Engi...
Learning Both Weights and Connections for Efficient Neural
by conchita-marotz
Han et al. Deep Compression : Compressing Deep Ne...
Network Transmissions
by tatyana-admore
How The Internet Works. Lecture 1. Sadi Evren SEK...
4: Serial I/O
by debby-jeon
CET360. Microprocessor Engineering. J. . Sumey. 2...
15-744: Computer Networking
by cheryl-pisano
L-2 . Design Considerations. 2. Design Considerat...
Data Link Control
by marina-yarberry
The two main functions of the data link layer are...
Integer Sorting
by test
on the word-RAM. Uri Zwick. Tel Aviv University. ...
Virtual Memory Hardware
by aaron
Outline. Introduction to virtual memory. Paging M...
Dennis Goeckel
by yoshiko-marsland
Electrical and Computer Engineering (ECE). Univer...
Bits of an autobiography I may not write
by faustina-dinatale
Morris Gleitzman. Key objectives. Identify the ma...
yimo.guo@ee.oulu.fi
by stefany-barnette
22.09.2011 . Digital Image Processing . Exercise ...
ISEE-3 Reboot Project
by test
Dennis Ray Wingo. CEO. Skycorp Incorporated. www....
Radix Sorting
by pamella-moone
CSE . 2320 – Algorithms and Data Structures. Va...
Introducing Audio Signal Processing & Audio Coding
by tatiana-dople
Dr Michael Mason. Senior Manger, Sound Developmen...
UNIX System Protection
by giovanna-bartolotta
Unix History. Developed by Dennis Ritchie and Ken...
A Low-Power Hybrid
by trish-goza
Magnetic Cache Architecture. Exploiting Narrow-Wi...
Jeffrey L. Popyack
by lindy-dunigan
Drexel University. Post-It. ®. Pandemonium. RE...
ECE 485/585
by ellena-manuel
Microprocessors. Chapter . 8. Demand-Paged. Virtu...
MIPS ALU
by jane-oiler
Exercise – Design a selector?. I need a circuit...
0 CMPT 371
by liane-varnes
Data Communications and Networking. Network Layer...
IP Addressing, Sub-netting & VLSM
by sherrill-nordquist
definitions. Address:. The. . unique number ID a...
Octavo: An FPGA-Centric Processor Architecture
by cheryl-pisano
Charles Eric . LaForest. J. Gregory . Steffan. EC...
Data Representation
by celsa-spraggs
in . Computer . Systems. Chapter 2. 2. Chapter 2 ...
Networks Workbook
by marina-yarberry
What is a computer network?. What. is a computer...
Load More...