1987
DOI: 10.1109/mc.1987.1663508
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Microprocessor Architectures for Memory Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

1990
1990
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…When preempting a job to execute an urgent job, the operating system will need to transfer the states to a swap memory space before the new job can start. The time spent for swapping the memory space is referred to as the swapping time [39], [40].…”
Section: A Preemption Using In-memory Process Swappingmentioning
confidence: 99%
“…When preempting a job to execute an urgent job, the operating system will need to transfer the states to a swap memory space before the new job can start. The time spent for swapping the memory space is referred to as the swapping time [39], [40].…”
Section: A Preemption Using In-memory Process Swappingmentioning
confidence: 99%
“…In a system featuring a memory management unit (MMU) interposed between the processor and the primary memory system, the MMU is usually aimed at: (i) translating the virtual addresses generated by the processor into physical addresses in the primary memory; (ii) implementing a virtual memory system (that is, a virtual memory space much larger than the physical space); and (iii) supporting forms of memory protection and security [9]. the least recently used algorithm is typically used to find an entry to be replaced.…”
Section: Hardware Costsmentioning
confidence: 99%
“…An application process will be created for the execution of the program. Different applications execute in their own addressing spaces, and they are invisible from one and other by the 2764 Information Technology Applications in Industry, Computer Engineering and Materials Science use of virtual memory system [7]. In traditional hardware, protection mechanism normally implemented with page or segment table where access right information is maintained, as shown in Figure 4.…”
Section: Compilation Approachmentioning
confidence: 99%