Performance Analysis of Dual Core, Core 2 Duo and Core i3 Intel Processor
نویسندگان
چکیده
منابع مشابه
Power and Thermal Management in the Intel Core Duo Processor
The Intel CoreTM Duo processor is the first mobile processor that uses Chip Multi-Processing (CMP) on-die technology to maximize performance and minimize power consumption. This paper provides an overview of the power control unit and its impact on the power-saving mechanisms. We describe the distribution of P-states and look at other techniques used to improve the system power consumption incl...
متن کاملA Fast Implementation of etaT Pairing in Characteristic Three on Intel Core 2 Duo Processor
We present an efficient implementation of ηT pairing on Intel Core 2 Duo processor. The processing speed of our implementation achieves 92 μsec over F 3 and 553 μsec over F 3 on 2.6GHz processor.
متن کاملBenchmarking CMSSW on Intel and AMD single-core, dual- core and quad-core systems
We have benchmarked dual-processor quad-core AMD Opteron 2350 and 2356, dual-processor quad-core Intel Xeon E5345, single processor quad-core Intel Xeon X5472, dual-processor dual-core AMD Opteron 2214, dual-processor single-core Intel Xeon EM64T and single-processor single-core Intel Xeon EM64T systems using a CMSSW event simulation and reconstruction application. The results are presented in ...
متن کاملEvaluation of the Intel Clovertown Quad Core Processor
We evaluated the Intel Clovertown quad core processor by means of the EuroBen Benchmark. The single-core performance was assessed as well as the shared-memory parallel performance with OpenMP. In addition, the distributed-memory performance was measured using MPI and some linear algebra tests and an FFT test were performed using Intel’s MKL library. The single-core performance turns out to be g...
متن کاملSecureD: A Secure Dual Core Embedded Processor
Security of embedded computing systems is becoming of paramount concern as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Security attacks targeting embedded systems illegally gain access to the information in these devices or destroy information. The two most common types of attacks embedded systems encounter are code-in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/21260-8736