Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
One-instruction set computer
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== References == {{Reflist|refs= <ref name=urisc>{{Cite journal | last = Mavaddat | first = F. |author2=Parhami, B. | title = URISC: The Ultimate Reduced Instruction Set Computer | journal = International Journal of Electrical Engineering Education | volume = 25 | issue = 4 | pages = 327β334 | publisher = Manchester University Press | date = October 1988 |url=http://www.ece.ucsb.edu/~parhami/pubs_folder/parh88-ijeee-ultimate-risc.pdf | doi =10.1177/002072098802500408 | s2cid = 61797084 | access-date = 2010-10-04}} This paper considers "a machine with a single 3-address instruction as the ultimate in RISC design (URISC)". Without giving a name to the instruction, it describes a SBN OISC and its associated assembly language, emphasising that this is a ''universal'' (i.e., [[Turing-complete]]) machine whose simplicity makes it ideal for classroom use.</ref> <ref name=caamp>{{Cite book |last = Gilreath |first = William F. |author2 = Laplante, Phillip A. |title = Computer Architecture: A Minimalist Perspective |publisher = [[Springer Science+Business Media]] |year = 2003 |url = http://www.caamp.info |isbn = 978-1-4020-7416-5 |url-status = dead |archive-url = https://web.archive.org/web/20090613042342/http://www.caamp.info/ |archive-date = 2009-06-13 }} Intended for researchers, computer system engineers, computational theorists and students, this book provides an in-depth examination of various OISCs, including SBN and MOVE. It attributes SBN to W. L. van der Poel (1956).</ref> <ref name=agut>{{Citation | last1 = NΓΌrnberg | first1 = Peter J. | last2 = Wiil | first2 = Uffe K. | last3 = Hicks | first3 = David L. | title = Metainformatics: International Symposium, MIS 2003 | place = Graz, Austria | publisher = [[Springer Science+Business Media]] | date = September 2003 | chapter = A Grand Unified Theory for Structural Computing | chapter-url = https://books.google.com/books?id=uxjigT31ns4C&pg=PA1 | pages = 1β16 | url = http://www.informatik.uni-trier.de/~ley/db/conf/metainformatics/metainformatics2003.html | isbn = 978-3-540-22010-7 | access-date = 2009-09-07 | archive-date = 2015-01-03 | archive-url = https://web.archive.org/web/20150103161748/http://www.informatik.uni-trier.de/~ley/db/conf/metainformatics/metainformatics2003.html | url-status = dead }} This research paper focusses entirely on a SUBLEQ OISC and its associated assembly language, using the name SUBLEQ for "both the instruction and any language based upon it".</ref> <ref name=dwj>{{Cite journal | last = Jones | first = Douglas W. | title = The Ultimate RISC | journal = ACM SIGARCH Computer Architecture News | volume = 16 | issue = 3 | pages = 48β55 | publisher = ACM | location = New York | date = June 1988 |url=http://www.cs.uiowa.edu/~jones/arch/risc/ | doi = 10.1145/48675.48683 | s2cid = 9481528 | access-date = 2010-10-04| url-access = subscription }} "Reduced instruction set computer architectures have attracted considerable interest since 1980. The ultimate RISC architecture presented here is an extreme yet simple illustration of such an architecture. It has only one instruction, move memory to memory, yet it is useful."</ref> <ref name=deh>{{Citation | last = Catsoulis | first = John | title = Designing embedded hardware | publisher = [[O'Reilly Media]] | year = 2005 | edition = 2 | pages = 327β333 | isbn = 978-0-596-00755-3}}</ref> <ref name=crq>{{Citation | first = Oleg | last = Mazonka | author2 = Tsoutsos, Nektarios Georgios | author3 = Maniatakos, Michail | title = Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation | journal = IEEE Transactions on Information Forensics and Security | year = 2016 | volume = 11 | issue = 9 | pages = 2123β2138 | doi= 10.1109/TIFS.2016.2569062| s2cid = 261387 }}</ref> }}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)