Resource dependence , Computer Engineering

Resource Dependence

The parallelism among the instructions may also be affected because of  the shared resources. If two instructions are using the related shared resource then it is a resource dependency condition. For instance, registers or floating point units are shared, and this is known as ALU dependency. When memory is being common, then it is known as Storage dependency.

 

Posted Date: 3/1/2013 7:21:22 AM | Location : United States







Related Discussions:- Resource dependence , Assignment Help, Ask Question on Resource dependence , Get Answer, Expert's Help, Resource dependence Discussions

Write discussion on Resource dependence
Your posts are moderated
Related Questions
HTML is a Hyper text Markup Language and it is  Scripting Language

1. Introduction to Software Metrics in Software Engineering.? 2. Role of direct and indirect measures in software process management? 3. Stance taken and justification? 4. Conclusi

The alignment of a type 'c' field in a report is? ? Left Aligned.

A combinational circuit has 3 inputs A, B, C and output F.  F is true for following input combinations A is False, B is True A is False, C is True A, B, C

In a raw Itanium, a "Processor Abstraction Layer" (PAL) is integrated into the system. When it is booted the PAL is loaded into the CPU and gives a low-level interface that abstrac

Which processing is not a part of Synthesis phase? Ans. Perform LC processing is not a part of Synthesis phase.

Advantages of random scan display Early computer displays: basically an oscilloscope. Control X, Y with vertical/horizontal plate voltage. Often used intensity as

The various memory allocation functions are described below: (i) malloc( ) : It is a memory allocation function that assigns requested size of bytes and returns a pointer to t

Explain the Modularity of Object oriented analysis Modularity is closely attached to encapsulation; you may think of it as a way of mapping encapsulated abstractions into phys

Determine the term- Security When using Internet, security can be enhanced using encryption. Debit and credit card transactions can also be protected by a specific type of pas