1. ADDI Ss0, Szero, 10 ADDI Ss1, Szero, 9 SB $s0, -10(Ssp) SB $s1, -9(Ssp) LB $s2, -9(Ssp)

Operations Research : Applications and Algorithms
4th Edition
ISBN:9780534380588
Author:Wayne L. Winston
Publisher:Wayne L. Winston
Chapter9: Integer Programming
Section9.2: Formulating Integer Programming Problems
Problem 14P
icon
Related questions
Question
Lab AR tut 1
1. ADDI Ss0, Szero, 10
ADDI $s1, Szero, 9
SB Ss0, -10(Ssp)
SB $s1, -9(Ssp)
LB $s2, -9($sp)
2. ADDI $sp, $sp, -1
ADDI $sp, Ssp, 5
ADDI $sp, Ssp, -5
ADDI $sp, Ssp, -20
LB $53, 0(Ssp)
3. sit St0, $s2, $s1
beq $t0, $0, Endif
Iw $s0, 32(Ss3)
Endif:
4. bne $s1, $s2, ELSE
add $s2, $s0, $s1
j EXIT
ELSE: sw $s0, 36(Ss4)
EXIT:
5. siti Sto, Sso, 10
Transcribed Image Text:Lab AR tut 1 1. ADDI Ss0, Szero, 10 ADDI $s1, Szero, 9 SB Ss0, -10(Ssp) SB $s1, -9(Ssp) LB $s2, -9($sp) 2. ADDI $sp, $sp, -1 ADDI $sp, Ssp, 5 ADDI $sp, Ssp, -5 ADDI $sp, Ssp, -20 LB $53, 0(Ssp) 3. sit St0, $s2, $s1 beq $t0, $0, Endif Iw $s0, 32(Ss3) Endif: 4. bne $s1, $s2, ELSE add $s2, $s0, $s1 j EXIT ELSE: sw $s0, 36(Ss4) EXIT: 5. siti Sto, Sso, 10
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Types of Security Policy
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Operations Research : Applications and Algorithms
Operations Research : Applications and Algorithms
Computer Science
ISBN:
9780534380588
Author:
Wayne L. Winston
Publisher:
Brooks Cole