Examples of using Memory access in English and their translations into Russian
{-}
-
Colloquial
-
Official
The clone needs full memory access.
Memory access time was 48-384 microseconds.
An Approach to Direct Memory Access Module Verification.
Memory access that does not involve the microprocessor.
Some architectures include other stages such as memory access.
Frolov An Approach to Direct Memory Access Module Verification pp.
In Java the operation of such type should follow the strict rules to perform secure memory access.
RDMA(Remote Direct Memory Access) protocols deeply rely on zero-copy techniques.
The outcome of executing this function is undefined; it may return a random value or raise a memory access error.
Many software decoders require Direct Memory Access(DMA) in order to function.
Uniform memory access(UMA) is a shared memory architecture used in parallel computers.
Yihan Lian discovered that an OOB memory access could potentially crash ntpd.
Memory access violation is most often caused by such errors in programs as array overruns or usage of a null pointer.
This can easily lead to the memory access error, buffer overflow or senseless printout.
We present principles of the device operation- they provide a set of memory-mapped registers anduse direct memory access.
However, most available memory access controllers only support mappings of up to 32 Mbit.
There are many examples of shared memory(multiprocessors): UMA(Uniform Memory Access), COMA Cache Only Memory Access.
Visualization and analysis of memory access profile Vestnik South-Ural State University(2011) No.
The paper overviews some of existing approaches to detect race conditions including DataCollider system based on concurrent memory access tracking.
These times are excluding the memory access time, which added up to approximately 1500 microseconds to those times.
To ensure the high- performance hardware(x64 architecture),these systems are additionally supported by RDMA(Remote Direct Memory Access) for high-speed connections.
Frolov An Approach to Direct Memory Access Module Verification Proceedings of the Institute for System Programming.
Ethernet in the Data Center focus includes protocols such as Data Center Bridging(DCB), Fibre Channel over Ethernet(FCoE), iSCSI,Remote direct memory access over Converged Ethernet(RoCE) and iWARP.
A method of direct memory access subsystem verification used for"Elbrus" series microprocessors has been described.
These four system resources are interrupt request(IRQ) lines,direct memory access(DMA) channels, input/output(I/O) ports, and memory addresses.
The Ultra DMA(Ultra Direct Memory Access, UDMA) interface was the fastest method used to transfer data through the ATA controller, usually between the computer and an ATA device.
System resources include interrupt request(IRQ) lines,direct memory access(DMA) channels, input/output(I/O) ports, and memory addresses.
Multiple invalid memory access issues, which could potentially lead to arbitrary code execution if the user were tricked into opening a malformed PDF document.
In the early days of microcomputer technology, memory access was only slightly slower than register access. .
This includes the balance between different types of operations, particularly arithmetic operations(addition, multiplication,division) together or between arithmetic operations and memory access operations.