作者: Martin Ohmacht , Krishnan Sugavanam , Bruce M. Fleischer , Ravi Nair , Hans M. Jacobson
DOI:
关键词:
摘要: Embodiments include a method for bypassing data in an active memory device. The includes requestor determining number of transfers to grantor that have not been communicated the grantor, requesting interconnect network bypass path be used based on meeting threshold and communicating via request, granting control response request. also event delayed from other requestors, being due previously controlled by requestor, changed back network.