Flylib.com
List of Tables
Previous page
Table of content
Chapter 2: Numeric Representation
Table 2-1: Binary/Hexadecimal Conversion Chart
Table 2-2: Binary/Octal Conversion Chart
Table 2-3: Number of Values Representable with Bit Strings
Table 2-4: Powers of Two
Table 2-5: Sign Extension Examples
Table 2-6: Zero Extension Examples
Chapter 3: Binary Arithmetic and Bit Operations
Table 3-1: AND truth table
Table 3-2: OR truth table
Table 3-3: XOR truth table
Table 3-4: NOT truth table
Chapter 4: Floating-Point Representation
Table 4-1: Binary Representations for NaN
Table 4-2: Operations Involving Infinity
Table 4-3: Dealing with Operands That Have Different Signs
Chapter 5: Character Representation
Table 5-1: ASCII Character Groups Determined by Bits Five and Six
Table 5-2: ASCII Codes for the Numeric Digits
Table 5-3: Common Character Set Functions
Table 5-4: The HyCode Character Set
Chapter 6: Memory Organization and Access
Table 6-1: 80x86 Addressing Capabilities
Chapter 8: Boolean Logic and Digital Design
Table 8-1: AND truth table
Table 8-2: OR truth table
Table 8-3: Truth Table Format for a Function of Three Variables
Table 8-4: Common Names for Boolean Functions of Two Variables
Table 8-5: Truth table for F = AB + C
Table 8-6: Generating Minterms from Binary Numbers
Table 8-7: Truth table for F
53
,504
Table 8-8: OR truth table for two variables
Table 8-9: S/R Flip-Flop Output States Based on Current Inputs and Previous Outputs
Chapter 10: Instruction Set Architecture
Table 10-1: reg Field Encodings
Table 10-2: mod Field Encodings
Table 10-3: mod-r/m Encodings
Table 10-4: Scale Values
Table 10-5: Register Values for sib Encoding
Table 10-6: Base Register Values for sib Encoding
Table 10-7: The Scaled Indexed Addressing Modes
Previous page
Table of content
The Art of Assembly Language
ISBN: 1593270038
EAN: 2147483647
Year: 2003
Pages: 144
Authors:
Randall Hyde
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Monitoring and Controlling Risky Projects
Appendix A Selected Detail From the PERIL Database
Image Processing with LabVIEW and IMAQ Vision
NI Vision Builder for Automated Inspection
Charge-Coupled Devices
Other Image Sources
Camera Interfaces and Protocols
Pattern Matching
Postfix: The Definitive Guide
Separate Domains with Virtual Accounts
UUCP, Fax, and Other Deliveries
Strict Syntax Parameters
Transport Layer Security
Other Considerations
Information Dashboard Design: The Effective Visual Communication of Data
Clarifying the Vision
Highlighting Important Data Ineffectively or Not at All
Test Your Design for Usability
Putting It All Together
A Final Word
.NET-A Complete Development Cycle
Visual Studio.NET: Platform of Choice
References for Further Reading
Project Management Issues
Requirements for Image Postprocessing Components
Integrating Externally Supplied Software
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Using Memory to Store Scheduler Information
Creating the Quartz Database Structure
Listeners as Extension Points
Brief Overview of Java RMI
The EJB 2.1 Specification: Finally Some Light
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies