Software Integer Division

نویسنده

  • Thomas L. Rodeheffer
چکیده

Early computers omitted instructions for integer multiplication and division, requiring these operations to be synthesized in software. Even some modern RISC and DSP architectures are deficient in the case of division. Therefore software methods for performing integer division continue to be of interest. We consider typical architectures based on two’s complement binary arithmetic and present various methods of performing single precision unsigned integer division in software. In addition to methods based on the standard test-subtract-shift approach, we present a method and variants based on a novel adaptation of the NewtonRaphson recurrence to the domain of unsigned integers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

High - Radix Floating - Point Division Algorithms for Embedded VLIW

This work presents floating-point division algorithms and implementations for embedded VLIW integer processors. On those processors, there is no hardware floatingpoint unit, for cost reasons. But, for portability and/or accuracy reasons, a software floating-point emulation layer is sometime useful. In this paper, we focus on high-radix digit-recurrence algorithms for floating-point division on ...

متن کامل

Eecient Address Translation

The address calculation for distributed data access plays a major role for the performance of ne-grained data-parallel applications. This paper reports about the hardware centrifuge of the Cray T3E which enables the shift of the address calculation from software into hardware. This shift minimizes address calculation overhead reducing communication cost of dynamic communication patterns. The ce...

متن کامل

Strength Reduction of Integer Division and Modulo Operations

Integer division, modulo, and remainder operations are expressive and useful operations. They are logical candidates to express many complex data accesses such as the wrap-around behavior in queues using ring buffers and array address calculations in data distribution and cache locality compiler-optimizations. Experienced application programmers, however, avoid them because they are slow. Furth...

متن کامل

A Provable Scheme for Homomorphic Obfuscations in Software Security

Computer and communication industries develop so rapidly that the demand for software becomes larger and larger and the demand for software protections, such as copyright and anti-tampering defense, are more and more important to software users and developers. There are some technical measures for software protections, such as hardware-based protections, network filters, cryptosystems, etc. Sof...

متن کامل

Implementation of Integer Square Root

Square root plays a major role in applications like computer graphics, image processing. To increase the performance of computation, many algorithms have been proposed to carry out the computation task in hardware instead of software. One very common and relatively quick method for finding the square root of a number is the Newton-Raphson method which requires extensive use of division to produ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008