Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,329,537 papers from all fields of science
Search
Sign In
Create Free Account
64-bit computing
Known as:
LP64
, Native x86-64 Windows software
, 64-bit OS
Expand
In computer architecture, 64-bit computing is the use of processors that have datapath widths, integer size, and memory address widths of 64 bits…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
3 GB barrier
32-bit
ARM architecture
Address space
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Fast Global Illumination Approximations on Deep G-Buffers
Michael Mara
,
M. McGuire
,
D. Nowrouzezahrai
,
D. Luebke
2014
Corpus ID: 14811858
Deep Geometry Buffers (G-buffers) combine the fine-scale and efficiency of screen-space data with much of the robustness of…
Expand
Highly Cited
2008
Highly Cited
2008
The SHAvite-3 Hash Function
E. Biham
,
O. Dunkelman
2008
Corpus ID: 6386607
. In this document we present SHAvite-3, a secure and efficient hash function based on the HAIFA construction and the AES building…
Expand
Highly Cited
2007
Highly Cited
2007
Efficient Handling of N-gram Language Models for Statistical Machine Translation
Marcello Federico
,
M. Cettolo
WMT@ACL
2007
Corpus ID: 603858
Statistical machine translation, as well as other areas of human language processing, have recently pushed toward the use of…
Expand
2007
2007
Implementing a 1GHz Four-Issue Out-of-Order Execution Microprocessor in a Standard Cell ASIC Methodology
Weiwu Hu
,
Ji-Ye Zhao
,
Shi-Qiang Zhong
,
Xu Yang
,
E. Guidetti
,
Chris Wu
Journal of Computational Science and Technology
2007
Corpus ID: 24776532
This paper introduces the microarchitecture and physical implementation of the Godson-2E processor, which is a four-issue…
Expand
Highly Cited
2005
Highly Cited
2005
Data Encryption Standard (DES)
A. Biryukov
,
C. Cannière
Encyclopedia of Cryptography and Security
2005
Corpus ID: 6547274
Background TheData Encryption Standard (DES) [] has been around for more than years. During this time, the standard was…
Expand
2000
2000
Cryptanalysis of Alleged A 5 Stream Cipher
W. Chambers
,
Walter Fumy Ed
,
J. Golic
2000
Corpus ID: 14474901
A binary stream cipher, known as A5, consisting of three short LFSRs of total length 64 that are mutually clocked in the stop/go…
Expand
1999
1999
Series approximation methods for divide and square root in the Power3/sup TM/ processor
M. Schmookler
,
R. Agarwal
,
F. Gustavson
Proceedings 14th IEEE Symposium on Computer…
1999
Corpus ID: 15674943
The Power3 processor is a 64-bit implementation of the PowerPC/sup TM/ architecture and is the successor to the Power2/sup TM…
Expand
Highly Cited
1995
Highly Cited
1995
The PowerPC 620 microprocessor: a high performance superscalar RISC microprocessor
D. Levitan
,
T. Thomas
,
P. Tu
Digest of Papers. COMPCON'95. Technologies for…
1995
Corpus ID: 33953182
The PowerPC 620 RISC microprocessor is the first chip for the application server and technical workstation product line within…
Expand
1994
1994
Architecture of a 64-bit fuzzy inference processor
A. Ungering
,
Karl Goser
Proceedings of IEEE 3rd International Fuzzy…
1994
Corpus ID: 62652300
The architecture of a 64-bit fuzzy inference processor (FIP) will be presented. A fuzzy system consisting of the FIP and a 64-bit…
Expand
Review
1993
Review
1993
Overview of the CHIP Compiler System
A. Aggoun
,
N. Beldiceanu
Workshop on Constraint Logic Programming
1993
Corpus ID: 27206835
The MIPSpro compiler system consists of a set of components that enable you to create new 32-bit and 64-bit executable programs…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE