{"title":"在虚域上,智能二次存储器中的令牌传输和浮动码","authors":"G. Lipovski","doi":"10.1145/800180.810248","DOIUrl":null,"url":null,"abstract":"In analyzing two implemented intelligent secondary memories, CASSM and RAP, we recognize a common mechanism which is here called an imaginary field. The mechanism can be generalized to suggest further design possibilities. It further explains the complex and controversial CASSM mechanism, “pointer transfer” in terms of separate but related principles—imaginary fields, token transfers, and floating codes—such that further designs can utilize some or all of the techniques.","PeriodicalId":328859,"journal":{"name":"Computer Architecture Workshop","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"On imaginary fields, token transfers and floating codes in intelligent secondary memories\",\"authors\":\"G. Lipovski\",\"doi\":\"10.1145/800180.810248\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In analyzing two implemented intelligent secondary memories, CASSM and RAP, we recognize a common mechanism which is here called an imaginary field. The mechanism can be generalized to suggest further design possibilities. It further explains the complex and controversial CASSM mechanism, “pointer transfer” in terms of separate but related principles—imaginary fields, token transfers, and floating codes—such that further designs can utilize some or all of the techniques.\",\"PeriodicalId\":328859,\"journal\":{\"name\":\"Computer Architecture Workshop\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Architecture Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/800180.810248\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Architecture Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800180.810248","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On imaginary fields, token transfers and floating codes in intelligent secondary memories
In analyzing two implemented intelligent secondary memories, CASSM and RAP, we recognize a common mechanism which is here called an imaginary field. The mechanism can be generalized to suggest further design possibilities. It further explains the complex and controversial CASSM mechanism, “pointer transfer” in terms of separate but related principles—imaginary fields, token transfers, and floating codes—such that further designs can utilize some or all of the techniques.