X86 instruction listings

Known as: List of x86 assembly language instructions, X86 instruction set, ARPL 
The x86 instruction set refers to the set of instructions that x86-compatible microprocessors support. The instructions are usually part of an… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1971-2017
05010019712017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
The discovery of causal relationships from purely observational data is a fundamental problem in science. The most elementary… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2014
Highly Cited
2014
1. The leaf economics spectrum (LES) provides a useful framework for examining species strategies as shaped by their evolutionary… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
We describe recent algorithmic developments that have enabled large eddy simulations of reactor flows on up to P = 65, 000… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper presents a range of applications of the Regional Atmospheric Modeling System (RAMS), a comprehensive mesoscale… (More)
  • table 1
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
Large-eddy simulations (LESs) of an industrial gas turbine burner are carried out for both nonreacting and reacting flow using a… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In recent years, Large Eddy Simulation (LES) has been successfully applied to non-premixed and premixed turbulent combustion… (More)
  • figure 1
  • figure 2
Is this relevant?
2002
2002
The efficacy of large-eddy simulation ~LES! with wall modeling for complex turbulent flows is assessed by considering turbulent… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or in general against information… (More)
  • figure 3
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In this paper, the present state of the large-eddy simulation (LES) technique is discussed. Modeling and numerical issues that… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1986
Highly Cited
1986
We prove that for every planar graph H there is a number w such that every graph with no minor isomorphic to H can be constructed… (More)
Is this relevant?