Evaluation stack architecture, Computer Engineering

Q. Evaluation Stack Architecture?

A stack is a data structure which implements Last-In-First-Out (LIFO) access policy. You can add an entry to the with a PUSH(value) as well as remove an entry from the stack with a POP( ). No explicit operands are there in ALU instructions however one in PUSH/POP. Illustrations of these computers are HP 3000/70, Burroughs B5500/6500 etc.

On a stack machine 'C = A + B'may be implemented as:

        PUSH A

        PUSH B

ADD         // operator POP operand(s) and PUSH yield(s) (implicit on top of stack)

POP C

Stack Architecture: Pros and Cons

  • Small instructions (don't require many bits to specify the operation).
  • Compiler is easy to write.
  • Lots of memory accesses needed - everything that's not on stack is in memory. So the machine performance is poor.

 

Posted Date: 7/24/2013 5:52:32 AM | Location : United States







Related Discussions:- Evaluation stack architecture, Assignment Help, Ask Question on Evaluation stack architecture, Get Answer, Expert's Help, Evaluation stack architecture Discussions

Write discussion on Evaluation stack architecture
Your posts are moderated
Related Questions
Q. What is Tape Backup? Magnetic tapes are used these days in computers for the below purposes: Backing up data stored in disks. It is essential to regularly save data s

what is er diagram

Everything stored on a computer can be represented as a string of bits. However, different types of data (for example, characters and numbers) may be represented by the same string

Op code mnemonics: Instructions  (statements)  in  assembly  language  are  usually  very  simple,  unlike  those that in  high-level languages. Usually, an opcode is a symbol


In class SlotCollection, remove the fields slot1, slot2, slot3 and slot4 and replace them by an array of slots. Modify the rest of the program to work using this array. There is

Define Memory read and write operation The transfer of information from a memory word to outside environment is known as read operation. The transfer of new information to be k

As an advocate of CISC architecture to RISC architecture, what are the merits and demerits of CISC to RISC architecture

Explanation:- Common used functions are placed in libraries. These are located in the SQABas32 subdirectory of the Robot working directory. A library is separated into three fil

Question: Write a MathCad solution to compute the ellipsoid radii at a point. Use the defining parameters for the GRS80 ellipsoid - a and f - in table 19.1. Program Equation 19