Cohesion — Between Instruction and Execution
نویسندگان
چکیده
منابع مشابه
cohesion and cohesive devices in a contrastive analysis between ge and esp texts
the present study was an attempt to conduct a contrastive analysis between general english (ge) and english for specific purposes (esp) texts in terms of cohesion and cohesive devices. to this end, thirty texts from different esp and ge textbooks were randomly selected. then they were analyzed manually to find the frequency of cohesive devices. cohesive devices include reference, substitution, ...
15 صفحه اولInstruction-Level Execution Migration
We introduce the Execution Migration Machine (EM), a novel data-centric multicore memory system architecture based on computation migration. Unlike traditional distributed memory multicores, which rely on complex cache coherence protocols to move the data to the core where the computation is taking place, our scheme always moves the computation to the core where the data resides. By doing away ...
متن کاملInstruction-Isomorphism in Program Execution
This paper identifies a fundamental runtime program property: Instruction–Isomorphism. An instruction instance is said to be isomorphic if its component information derived from the instruction and its backward dynamic data dependence graph is identical to the component of an instruction executed earlier. By definition an isomorphic instruction will produce exactly the same output with the earl...
متن کاملProgram Execution-Based Module Cohesion Measurement
Module cohesion describes the degree to which di erent actions performed by a module contribute towards a uni ed function. High module cohesion is a desirable property of a program. The program modi cations during successive maintenance interventions can have negative e ect on the structure of the program resulting in less cohesive modules. Therefore, metrics that measure module cohesion are im...
متن کاملProbabilistic Instruction Execution: The MAYBE Predicate
Instruction predication is an attractive method for improving the throughput of a pipelined processor by eliminating the adverse side-effects of branch operations. Although it may alone help to prevent simple power analysis (SPA) type attacks by masking branch execution, predication systems can also be augmented to allow a building block for defence against more powerful cryptographic attacks. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Anglica Wratislaviensia
سال: 2018
ISSN: 0301-7966
DOI: 10.19195/0301-7966.56.17