Proceedings Frontiers in Education 35th Annual Conference
DOI: 10.1109/fie.2005.1612068
|View full text |Cite
|
Sign up to set email alerts
|

UAV Communications: Integrating a Real-World Scenario with Computer Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Each trace file used contained 1,000,000 memory accesses. Our cache simulator exercise is the last of a four-part PEX series with the first three PEXes and other course information extensively described in [1].…”
Section: Programming Exercise Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Each trace file used contained 1,000,000 memory accesses. Our cache simulator exercise is the last of a four-part PEX series with the first three PEXes and other course information extensively described in [1].…”
Section: Programming Exercise Designmentioning
confidence: 99%
“…The CS program meets the ACM 2001 curriculum guidelines [4], with computer architecture requirements split 30-50-10-5-5 (%) among digital systems, computer architecture, operating systems, networks and compiler courses respectively -more detail is in [1]. The six hours of cache memory material are organized as an overview, directmapped cache design and analysis, m-way associative design, overall performance analysis, a short introduction to virtual memory and the roles that cache, main memory, and swap space play in the memory hierarchy.…”
Section: Introductionmentioning
confidence: 99%