Register-to-register architecture, Computer Engineering

Register-to-Register Architecture: In this organization, results and operands are accessed not directly from the main memory by the scalar or vector registers. The vectors which are required presently can be stored in the CPU registers. Cray- 1 computer accept this architecture for the vector instructions and its CPY having 8 vector registers, every register capable of storing a 64 element vector where single element is of 8 bytes.

 

Posted Date: 3/4/2013 5:03:39 AM | Location : United States







Related Discussions:- Register-to-register architecture, Assignment Help, Ask Question on Register-to-register architecture, Get Answer, Expert's Help, Register-to-register architecture Discussions

Write discussion on Register-to-register architecture
Your posts are moderated
Related Questions
What are Digital Signatures and its uses? A digital signature is an electronic quite than a written signature which can be used through someone to authenticate the identity of

The Concept of Thread A thread is a sequential flow of control within a process. A process is able to have one or more threads. Threads have their own register-values and progr

What is macro-expansion? Macro calls lead to macro expansion. Throughout macro expansion, the macro call statement is replaced through a sequence of assembly statements.

Explain the Programmable ROM (PROM) - Computer Memory? This is a kind of ROM that can be programmed using special equipment it can be written to, but only once and this is usef

Add -20 to +26 by using 2's complement ? Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -

Structured and Modular programming. Structured programming means the collection of principles and practices that are directed toward developing correct programs which are simpl

Consider the following pseudo-code segment. 1.  input y {y is a three-digit hexadecimal number} 2.  d ← 0 3. for i = 1 to 3      3.1. char ← i th character from y readin

As an XML expert you are needed to model a system for an online furniture shop. After an interview with the shop manager you have the certain information: The detail of th

Authorization Bypass is a frighteningly easy process which can be employed with poorly designed applications or content management frameworks. You know how it is... you run a small

What is the use of isolated I/O configuration.  In isolated I/O configuration the CPU has distinct input and output instructions and each of these instructions is associated wi