A Review of ARM Processor Architecture History, Progress and Applications
X. Gong, Z. Shao, Q. Du, A. Yu, and J. Zhang, “Performance overhead analysis of virtualisation on ARM,” Int. J. Inf. Commun. Technol., vol. 12, no. 1–2, pp. 143–161, 2018.
S. Harris and D. Harris, Digital design and computer architecture: arm edition. Morgan Kaufmann, 2015.
B. Saeedi, “Comparison between Intel®AtomTM and ARM Cortex-A53.”
H. Seo, “Memory efficient implementation of modular multiplication for 32-bit ARM Cortex-M4,” Appl. Sci., vol. 10, no. 4, 2020, doi: 10.3390/app10041539.
M. Crinson, Modern architecture and the end of empire. Routledge, 2017.
N. Zlatanov, “ARM Architecture and RISC Applications.” 2016.
J. Grant, “Parallel Performance of ARM ThunderX2 for Atomistic Simulation Algorithms,” no. 1.
D. Yokoyama, B. Schulze, F. Borges, and G. Mc Evoy, The survey on ARM processors for HPC, vol. 75, no. 10. Springer US, 2019.
E. Limonova, A. Terekhin, D. Nikolaev, and V. Arlazarov, “Fast implementation of morphological filtering using arm neon extension,” Int. J. Appl. Eng. Res., vol. 11, no. 24, pp. 11675–11680, 2016.
C. Lin, H. Qian, and Z. Wang, “A High-Throughout Real-Time Prewitt Operator on Embedded NEON+ ARM System,” in 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), 2018, pp. 270–273.
N. Liu, M. Yu, W. Zang, and R. Sandhu, “On the Cost-Effectiveness of TrustZone Defense on ARM Platform,” pp. 1–12.
A. Reid, “Who guards the guards? Formal validation of the Arm v8-M architecture specification,” Proc. ACM Program. Lang., vol. 1, no. OOPSLA, p. 88, 2017.
S. Lee and H. Yoo, “ARM Cortex-M0 DesignStart를 활용한 커스텀 시스템 설계 및 검증 Custom system design and verification using ARM Cortex-M0 DesignStart,” vol. 24, no. 2, 2020.
S. McIntosh-Smith, J. Price, T. Deakin, and A. Poenaru, “A performance analysis of the first generation of HPC-optimized Arm processors,” Concurr. Comput. , vol. 31, no. 16, pp. 1–13, 2019, doi: 10.1002/cpe.5110.
S. Aslan and S. C. .Ileri, “Performance Analysis of ARM big. LITTLE Architecture Based Mobile Processor with Multi-thread Face Detection,” in 2019 4th International Conference on Computer Science and Engineering (UBMK), 2019, pp. 336–339.
S. Pinto and N. Santos, “Demystifying Arm TrustZone: A Comprehensive Survey,” ACM Comput. Surv., vol. 51, no. 6, p. 130, 2019.
Y. M. P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow, “IoTPOT: A novel honeypot for revealing current IoT threats,” J. Inf. Process., 2016, doi: 10.2197/ipsjjip.24.522.
A. Lessoff, “Art and Architecture,” A Companion to Gilded Age Progress. Era, pp. 149–164, 2017, doi: 10.1002/9781118913994.ch12.
“Audience The ARM,” vol. 1, no. April, pp. 123–141, 1985.
Journal of Applied and Emerging Sciences by BUITEMS is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at www.buitms.edu.pk.
Permissions beyond the scope of this license may be available at http://journal.buitms.edu.pk/j/index.php/bj