Known implementation schema
Exploit macro data flow computation
Induced by the skeleton structure of the source program
Pipeline
stage f
stage g
Previous slide
Next slide
Back to first slide
View graphic version