ARM7

Known as: ARM7500, ARM v7, LPC2106 
(This article is about ARM7 processor cores. For the ARMv7-A and ARMv7-R instruction set architecture, see ARM architecture.) ARM7 is a group of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1995-2017
0204019952017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
High-voltage pulse power supply technology is a new effective improvement in electric dust precipitation. A High-voltage pulse… (More)
  • figure 2
  • figure 4
  • figure 3
  • figure 6
  • figure 8
Is this relevant?
2010
2010
Here introduces a monitor system technically based on ARM7 embedded micro processor (HMS30C7202) and Micro C/OS-II embedded… (More)
  • figure 1
  • figure 2
Is this relevant?
2009
2009
Embedded System has more and more applications today. Introduced Embedded Operating System in Embedded System has been a tendency… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
This paper presents an implemention of an ARM7 microprocessor with multicore capabilities. The required modifications to support… (More)
  • figure 2
  • figure 1
  • figure 3
  • table I
  • table II
Is this relevant?
2007
2007
A detailed analysis of different code compression algorithms is provided in this paper. The performances of the algorithms have… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
The design and verification of a 32-bit general-purpose microprocessor, which is compatible with ARM7 RISC core, is described. In… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Today's System on Chip (SoC) technology can achieve unprecedented computing speed that is shifting the IC design bottleneck from… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2004
2004
The hyperelliptic curve cryptosystem is one of the emerging cryptographic primitives of the last years. This system offers the… (More)
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
  • figure 2.5
Is this relevant?
2001
2001
The increasing connectivity o ered by constrained computing devices signals a vital need for public-key cryptography in such… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?