Vector-vector instructions-vector processing, Computer Engineering

Vector-Vector Instructions

In this type, vector operands are fetched by the vector register and saved in another vector register. These instructions are indicated with the following function mappings:

F1: V -> V

F2: V × V -> V

Example, vector square root is of F1 type and addition of two vectors is of F2.

 

Posted Date: 3/4/2013 4:55:26 AM | Location : United States







Related Discussions:- Vector-vector instructions-vector processing, Assignment Help, Ask Question on Vector-vector instructions-vector processing, Get Answer, Expert's Help, Vector-vector instructions-vector processing Discussions

Write discussion on Vector-vector instructions-vector processing
Your posts are moderated
Related Questions
What is the difference between, page directive include, action tag include? Ans) One difference is whereas using the include page directive, in translation time it is making t

Coding advantages of casex or casez By using casex or casez has the following coding advantages: -  It reduces number of lines, especially if the number of bits had been m

How do you turn off cookies for one page in your site?  Use the Cookie. Abandon Property which Gets or sets the discard flag set by the server. When true, this property instruc

Discuss the WAP stack in brief. The protocol stacks part implemented by WAP Stack for the WAP development and research platform. The protocol stack will be exploited into many

Q. What do you mean by Keyboard Touch? When employing a keyboard the most important factor is the feel of keyboard it implies that how typing feels on that specific keyboard.

Syntax and Semanticsx and Semantics for First-order logic - artificial intelligence: Propositional logic is limited  in its expressiveness: it may just represent true and false

calculate the time complexity of a=(b/c) operation in stack

Function of an IP Packet Screening Router: A screening router is the most basic type of firewall and uses only the packet filtering capability to control and monitor network tr

Secret-key encryption is also called as Private encryption.

why we don''t use register at the place of ram?