Classification according to pipeline configuration, Computer Engineering

Classification according to pipeline configuration:

According to the configuration of a pipeline, the following parts are recognized under this classification:

  • Unifunction Pipelines: When a permanent and dedicated function is performed through a pipeline, it is known as Unifunction pipeline.
  • Multifunction Pipelines:When different functions at dissimilar times are performed through the pipeline, this is called as Multifunction pipeline. Multifunction pipelines are configured at different times according to the operation being complete.

 

Posted Date: 3/2/2013 6:59:01 AM | Location : United States







Related Discussions:- Classification according to pipeline configuration, Assignment Help, Ask Question on Classification according to pipeline configuration, Get Answer, Expert's Help, Classification according to pipeline configuration Discussions

Write discussion on Classification according to pipeline configuration
Your posts are moderated
Related Questions
Q. Efficiency - Metrics for performance evaluation? The other significant metric employed for performance measurement is efficiency of parallel computer system it implies that

Driver software is software that works as a translator among another program and some piece of hardware. In the software industry, there are commonly standard ways to do things. Th

This question can be answered either with respect to English or with respect to a language other than English. (If you you are not a native speaker of the language of your choice,

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

What is compiler? A system software program known as a compiler translates the high-level language program into a suitable machine language program having instruction such as t

Q. Basic working of Semiconductors? Semiconductors are crystalline solid materials whose resistivities have values between those of conductors and insulators. Conductivity rang

Knowledge Representation: To recap, now we have some characterizations of Artificial Intelligence, so  when an Artificial Intelligence problem arises, you will enable  to put i

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

Q. How the Characters used in operand data type? A common form of data is character or text strings. Characters are signified in numeric form mostly in ASCII (American Standard

The Work Systems Framework - Information System Adler writing in 1992 used the phrase 'stumbling backwards into the future' to describe the neglect organisations at that time