State whether the following techniques or components are associated primarily with a soft ware- or hardware-based approach to exploiting ILP. In some cases, the answer may be both.1. Branch prediction2. Multiple issue3. VLIW4. Superscalar5. Dynamic scheduling6. Out-of-order execution7. Speculation8. Reorder buff er9. Register renaming
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here