Info hash | 53bae6d22f3b6e692673f9335e0a0198c1618426 |
Last mirror activity | 12d,04:43:38 ago |
Size | 5.56GB (5,558,550,001 bytes) |
Added | 2016-09-26 15:54:59 |
Views | 2128 |
Hits | 7827 |
ID | 3432 |
Type | multi |
Downloaded | 24543 time(s) |
Uploaded by | |
Folder | coursera-comp-arch |
Num files | 121 files [See full list] |
Mirrors | 27 complete, 1 downloading = 28 mirror(s) total [Log in to see full list] |

![]() |
129.15kB |
![]() |
1.77MB |
![]() |
817.26kB |
![]() |
140.30kB |
![]() |
807.17kB |
![]() |
178.60kB |
![]() |
133.84kB |
![]() |
167.16kB |
![]() |
366.68kB |
![]() |
256.14kB |
![]() |
179.24kB |
![]() |
888.57kB |
![]() |
564.75kB |
![]() |
104.24MB |
![]() |
19.04MB |
![]() |
99.66MB |
![]() |
27.00MB |
![]() |
55.40MB |
![]() |
34.43MB |
![]() |
60.84MB |
![]() |
2.02MB |
![]() |
85.84MB |
![]() |
67.84MB |
![]() |
24.29MB |
![]() |
97.45MB |
![]() |
28.25MB |
![]() |
49.82MB |
![]() |
16.35MB |
![]() |
52.95MB |
![]() |
133.55MB |
![]() |
167.47MB |
![]() |
32.80MB |
![]() |
14.12MB |
![]() |
9.94MB |
![]() |
20.05MB |
![]() |
8.90MB |
![]() |
24.81MB |
![]() |
60.01MB |
![]() |
64.93MB |
![]() |
7.19MB |
![]() |
40.68MB |
![]() |
169.75MB |
![]() |
33.56MB |
![]() |
8.46MB |
![]() |
30.49MB |
![]() |
66.37MB |
![]() |
148.66MB |
![]() |
70.87MB |
![]() |
58.63MB |
|
Type: Course
Tags:
Bibtex:
Tags:
Bibtex:
@article{, title= {[Coursera] Computer Architecture }, keywords= {}, journal= {}, author= {David Wentzlaff (Princeton University)}, year= {}, url= {}, license= {}, abstract= {About this course: In this course, you will learn to design the computer architecture of complex modern microprocessors. ### Introduction, Instruction Set Architecture, and Microcode This lecture will give you a broad overview of the course, as well as the description of architecture, micro-architecture and instruction set architectures. ### Pipelining Review This lecture covers the basic concept of pipeline and two different types of hazards. ### Cache Review This lecture covers control hazards and the motivation for caches. ### Superscalar 1 This lecture covers cache characteristics and basic superscalar architecture. ### Superscalar 2 & Exceptions This lecture covers the common issues for superscalar architecture. ### Superscalar 3 This lecture covers different kinds of architectures for out-of-order processors. ### Superscalar 4 This lecture covers the common methods used to improve the performance of out-of-order processors including register renaming and memory disambiguation. ### VLIW 1 This lecture covers the basic concept of very long instruction word (VLIW) processors. ### VLIW2 This lecture covers the common methods used to improve VLIW performance. ### Branch Prediction This lecture covers the motivation and implementation of branch predictors. ### Advanced Caches 1 This lecture covers the advanced mechanisms used to improve cache performance. ### Advanced Caches 2 This lecture covers more advanced mechanisms used to improve cache performance. ### Memory Protection This lecture covers memory management and protection. ### Vector Processors and GPUs This lecture covers the vector processor and optimizations for vector processors. ### Multithreading This lecture covers different types of multithreading. ### Parallel Programming 1 This lecture covers the concepts of parallelism, consistency models, and basic parallel programming techniques. ### Parallel Programming 2 This lecture covers the solutions for the consistency problem in parallel programming. ### Small Multiprocessors This lecture covers the implementation of small multiprocessors. ### Multiprocessor Interconnect 1 This lecture covers the design of interconnects for a multiprocessor. ### Multiprocessor Interconnect 2 This lecture covers the design of interconnects for multiprocessor and network topology. ### Large Multiprocessors (Directory Protocols) This lecture covers the motivation and implementation of directory protocol used for coherence on large multiproccesors. }, superseded= {}, terms= {} }