Main Memory

How Computers Work: Processor And Main Memory (Second Edition)  eBooks & eLearning

Posted by lengen at Jan. 24, 2017
How Computers Work: Processor And Main Memory (Second Edition)

How Computers Work: Processor And Main Memory (Second Edition) by Roger Young
English | Apr. 17, 2009 | ISBN: 1442113987 | 158 Pages | PDF | 1 MB

Computers are the most complex machines that have ever been created. This book will tell you how they work, and no technical knowledge is required. It explains in great detail the operation of a simple but functional computer. Although transistors are mentioned, relays are used in the example circuitry for simplicity.

How Computers Work: Processor and Main Memory  eBooks & eLearning

Posted by tot167 at May 27, 2008
How Computers Work: Processor and Main Memory

Roger Young “How Computers Work: Processor and Main Memory"
1st Books Library | 2002-08-01 | ISBN: 1403325820 | 152 pages | PDF | 1,1 Mb

A Primer on Compression in the Memory Hierarchy  eBooks & eLearning

Posted by readerXXI at Aug. 8, 2017
A Primer on Compression in the Memory Hierarchy

A Primer on Compression in the Memory Hierarchy
by Somayeh Sardashti and Angelos Arelakis
English | 2016 | ISBN: 1627054154 | 87 Pages | PDF | 1.5 MB

In Memory Data Management and Analysis  eBooks & eLearning

Posted by step778 at May 24, 2017
In Memory Data Management and Analysis

Arun Jagatheesan, Justin Levandoski, Thomas Neumann, "In Memory Data Management and Analysis"
2015 | pages: 157 | ISBN: 3319139592 | PDF | 7,9 mb

Detecting Peripheral-based Attacks on the Host Memory (repost)  eBooks & eLearning

Posted by libr at April 17, 2015
Detecting Peripheral-based Attacks on the Host Memory (repost)

Detecting Peripheral-based Attacks on the Host Memory (T-Labs Series in Telecommunication Services) by Patrick Stewin
English | 2014 | ISBN: 3319135147, 3319135163 | 108 pages | PDF | 7 MB

Detecting Peripheral-based Attacks on the Host Memory  eBooks & eLearning

Posted by interes at Feb. 19, 2015
Detecting Peripheral-based Attacks on the Host Memory

Detecting Peripheral-based Attacks on the Host Memory (T-Labs Series in Telecommunication Services) by Patrick Stewin
English | 2014 | ISBN: 3319135147, 3319135163 | 108 pages | PDF | 7 MB
Embedded Flash Memory for Embedded Systems: Technology, Design for Sub-systems, and Innovations

Embedded Flash Memory for Embedded Systems: Technology, Design for Sub-systems, and Innovations By Hideto Hidaka
English | PDF | 2017 (2018 Edition) | 253 Pages | ISBN : 3319553054 | 14.64 MB

This book provides a comprehensive introduction to embedded flash memory, describing the history, current status, and future projections for technology, circuits, and systems applications. The authors describe current main-stream embedded flash technologies from floating-gate 1Tr, floating-gate with split-gate (1.5Tr), and 1Tr/1.5Tr SONOS flash technologies and their successful creation of various applications. Comparisons of these embedded flash technologies and future projections are also provided.
Representations of Forgetting in Life Writing and Fiction (Palgrave Macmillan Memory Studies)

Representations of Forgetting in Life Writing and Fiction (Palgrave Macmillan Memory Studies) by Gunnthorunn Gudmundsdottir
English | 2016 | ISBN: 1137598638, 9781137598639, B01N8TUVW3 | 188 Pages | PDF | 1.99 MB

TrojanHunter 6.2 Build 1062  Software

Posted by speedzodiac_ at April 14, 2017
TrojanHunter 6.2 Build 1062

TrojanHunter 6.2 Build 1062 | 4.8 MB

TrojanHunter is an advanced trojan scanner and toolbox, that searches for and removes trojans from your system. It uses several proven methods to find a wide variety of trojans such as file scanning, port scanning, memory scanning and registry scanning. The difference to many other trojan scanners is that TrojanHunter also allows you to add custom trojan definitions and detection rules using the easy to understand dialogs.

Analysis of Cache Performance for Operating Systems and Multiprogramming  eBooks & eLearning

Posted by leonardo78 at Jan. 10, 2017
Analysis of Cache Performance for Operating Systems and Multiprogramming

Analysis of Cache Performance for Operating Systems and Multiprogramming by Agarwal
Publisher: Springer | 1989 | ISBN: 1461288975 | 190 pages | PDF | 6,3 MB

As we continue to build faster and fast. er computers, their performance is be­ coming increasingly dependent on the memory hierarchy. Both the clock speed of the machine and its throughput per clock depend heavily on the memory hierarchy.