Software Integer Division
نویسنده
چکیده
Early computers omitted instructions for integer multiplication and division, requiring these operations to be synthesized in software. Even some modern RISC and DSP architectures are deficient in the case of division. Therefore software methods for performing integer division continue to be of interest. We consider typical architectures based on two’s complement binary arithmetic and present various methods of performing single precision unsigned integer division in software. In addition to methods based on the standard test-subtract-shift approach, we present a method and variants based on a novel adaptation of the NewtonRaphson recurrence to the domain of unsigned integers.
منابع مشابه
High - Radix Floating - Point Division Algorithms for Embedded VLIW
This work presents floating-point division algorithms and implementations for embedded VLIW integer processors. On those processors, there is no hardware floatingpoint unit, for cost reasons. But, for portability and/or accuracy reasons, a software floating-point emulation layer is sometime useful. In this paper, we focus on high-radix digit-recurrence algorithms for floating-point division on ...
متن کاملEecient Address Translation
The address calculation for distributed data access plays a major role for the performance of ne-grained data-parallel applications. This paper reports about the hardware centrifuge of the Cray T3E which enables the shift of the address calculation from software into hardware. This shift minimizes address calculation overhead reducing communication cost of dynamic communication patterns. The ce...
متن کاملStrength Reduction of Integer Division and Modulo Operations
Integer division, modulo, and remainder operations are expressive and useful operations. They are logical candidates to express many complex data accesses such as the wrap-around behavior in queues using ring buffers and array address calculations in data distribution and cache locality compiler-optimizations. Experienced application programmers, however, avoid them because they are slow. Furth...
متن کاملA Provable Scheme for Homomorphic Obfuscations in Software Security
Computer and communication industries develop so rapidly that the demand for software becomes larger and larger and the demand for software protections, such as copyright and anti-tampering defense, are more and more important to software users and developers. There are some technical measures for software protections, such as hardware-based protections, network filters, cryptosystems, etc. Sof...
متن کاملImplementation of Integer Square Root
Square root plays a major role in applications like computer graphics, image processing. To increase the performance of computation, many algorithms have been proposed to carry out the computation task in hardware instead of software. One very common and relatively quick method for finding the square root of a number is the Newton-Raphson method which requires extensive use of division to produ...
متن کامل