Register mapping and then any possible

Assignment Help Basic Computer Science
Reference no: EM13163599

A RISC machine may do both a mapping of symbolic registers to actual registers and a rearrangement of instructions for pipeline efficiency. An interesting question arises a to the order in which these operations should be done. Consider the following program fragment:
LD SR1, A
LD SR2, B
ADD SR3, SR1, SR2
LD SR4, C
LD SR5, D
ADD SR6, SR4, SR5

First do the register mapping and then any possible instruction reordering. How many machine registers are used? Has there been any pipeline improvement?
Starting with the original program, now do the instruction reordering and then any possible mapping. How many machine registers are used? Has there been any pipeline improvement?

Reference no: EM13163599

Questions Cloud

Explain prime and delta h prime make a greater contribution : Predict the following Bronsted acid-base reaction at 25 C: HF+CL- -> HCL + F- (a)Predict whether K will be greater or smaller than one? (b)Does delta S prime and delta H prime make a greater contribution to delta G prime?
Multiplexors whose control bit allows : Multiplexors whose control bit allows you to select between one of two modes right shift or left shift. Include logic to perform arithmetic shift left and arithmetic shift right . This means you must include logic to perform sign extension in ..
Determine delta h of solution smaller temperature change : experiment to determine delta H of solution, would you expect to get a larger, smaller or identical temperature change? why?
Write a method called makerow : Write a method called makeRow that is passed two arguments: an int and a String. It returns a String containing n copies of s, concatenated in a row. For instance, if we call the method with makeRow(5, "*"), the method returns *****.
Register mapping and then any possible : First do the register mapping and then any possible instruction reordering. How many machine registers are used? Has there been any pipeline improvement?
State an aqueous solution containing an unknown molecular : An aqueous solution containing 15.6 g of an unknown molecular (nonelectrolyte) compound in 109.5g of water was found to have a freezing point of -1.9 degrees C.
Compute the ph of the buffer that reults from mixing : Calculate the pH of a buffer solution that is 0.200 M HC2H3O2 and 0.100 M in NaC2H3O2. Calculate the pH of the buffer that reults from mixing
Explain what is the rate of the above reaction : What is the rate of the above reaction? What is the closest numerical value of K for the above reaction? What are the units for the rate constant for the reaction?
State ammonium carbamate found in urine of mammals : Ammonium carbamate (NH2COONH4) is found in the blood and urine of mammals. At a temperature of 466 K, Kc = 0.080 for the following equilibrium: NH2COONH4(s) 2 NH3(g) + CO2(g). If 10.2 g of ammonium carbamate is introduced into a 0.500 L containe..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compute mttf of the system

Suppose we have an eight CPU computer with four hard drives. MTTF of each cpu is 100000 hours and the MTTF of the hard drive is 50000 hours. What is the mttf of the system?

  Explain techniques to recover passwords from protected files

Explain techniques to apply to recover passwords from the protected files.

  Finding different sizes of newspaper for local newspaper

Comprise a specific recommendation regarding how many different sizes newspaper must offer.

  What type of hardware is needed to support t-1 connection

What kind of hardware is needed to support a T-1 connection to your business? You want to write a song and apply a digital signature to it, so that you can later prove that it is your song.

  Banner advertising on web sites trigger realization

Banner advertising on Web sites helps trigger realization that there is gap between reality and desired state which occurs in?

  Explaining resulting scheme is not ind-cpa-secure

Let a variant of CBC-mode encryption where sender simply increments the IV by 1 each time a message is encrypted. Illustrate that resulting scheme is not IND-CPA-secure.

  E-books distributor

You are a linguistic working at an e-books distributor. Your management has interest in finding out if commonly used words used in a book make the books more popular, therefore more books would be sold if the number of commonly used words in the book..

  Business reprocess engineering-strategic information system

Some people may say that Business Reprocess Engineering (BPR) is special case of strategic information system, whereas, others may say opposite is true. Describe this statement in scholarly detail.

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What techniques have greatest impact on website

What web design techniques would you use to help a user with these disabilities? What techniques might have the greatest impact on your website and why?

  Installation options for customer tracking system

Which installation options are available for the Customer Tracking System? Which would you recommend? How can you determine if implementation has been successful?

  Describe basic computer system and typical components

Describing the basic computer system and the typical components that perform input, output, processing, storage, and control functions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd