Design and Implementation of Scheduling Algorithm in Network Processor.
⇑ Translate the sentence above by Google ⇑
Related: processor
Prev: If your program is a viewer or editor of data—such as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.
Next: Now, the processor can begin executing instructions.