Evaluation stack architecture, Computer Engineering

Q. Evaluation Stack Architecture?

A stack is a data structure which implements Last-In-First-Out (LIFO) access policy. You can add an entry to the with a PUSH(value) as well as remove an entry from the stack with a POP( ). No explicit operands are there in ALU instructions however one in PUSH/POP. Illustrations of these computers are HP 3000/70, Burroughs B5500/6500 etc.

On a stack machine 'C = A + B'may be implemented as:

        PUSH A

        PUSH B

ADD         // operator POP operand(s) and PUSH yield(s) (implicit on top of stack)

POP C

Stack Architecture: Pros and Cons

  • Small instructions (don't require many bits to specify the operation).
  • Compiler is easy to write.
  • Lots of memory accesses needed - everything that's not on stack is in memory. So the machine performance is poor.

 

Posted Date: 7/24/2013 5:52:32 AM | Location : United States







Related Discussions:- Evaluation stack architecture, Assignment Help, Ask Question on Evaluation stack architecture, Get Answer, Expert's Help, Evaluation stack architecture Discussions

Write discussion on Evaluation stack architecture
Your posts are moderated
Related Questions
Objectives After going through this part, you will be capable to: Examine the meaning of Pipeline processing and explain pipeline processing architectures; Classify

A Scanner is a device which allows you to capture photographs or drawings or text from tangible sources (paper or slides etc.) in electronic form. Scanners work by detecting differ

Internet:  The Internet, an umbrella term cover countless network and services that comprise a super-network, is a global network of computer networks that was started in the 1

Action implementing instruction's meaning are a actually carried out by ? Ans. By instruction execution, the meaning of action implementing instruction is actually carried out.

Q. What is a good resolution? In fact it relies on your hardware. Hence it's the maximum your hardware can allow you.  But one odd-looking resolution that has become popular is

Public Key Encryption A cryptographic system that uses two-keys-a public  key known to everyone and a private or secret key known only to the recipient of the message. An si

Advantages on electronic payment system It gives good security schemes.  Four necessary security requirements for safe e-payments are Authentication, Encryption, Integrity,

Explain the CCITT hierarchical structure of routing using block schematic. In right-through routing the originating exchange finds the whole route from source to destination. N

does matlab contain procedures for knoledge representation? if yes where can i find it?

Define the PUBLIC and EXTRN directives- Assembler directives PUBLIC and EXTRN directives are very significant to modular programming. PUBLIC used to declare that labels of data