Invasive computing for mapping parallel programs to many-core architectures / Andreas Weichslgartner, Stefan Wildermann, Michael Gla€, Jürgen Teich.
2018
QA76.642
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Invasive computing for mapping parallel programs to many-core architectures / Andreas Weichslgartner, Stefan Wildermann, Michael Gla€, Jürgen Teich.
ISBN
9789811073564 (electronic book)
9811073562 (electronic book)
9789811073557
9811073554
9811073562 (electronic book)
9789811073557
9811073554
Published
Singapore : Springer, [2018]
Copyright
©2018
Language
English
Description
1 online resource.
Item Number
10.1007/978-981-10-7356-4 doi
Call Number
QA76.642
Dewey Decimal Classification
005.275
Summary
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
Bibliography, etc. Note
Includes bibliographical references and index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file PDF
Source of Description
Online resource; title from PDF title page (viewed January 9, 2018).
Series
Computer architecture and design methodologies.
Available in Other Form
Linked Resources
Record Appears in
Table of Contents
Introduction
Invasive Computing
Fundamentals
Self-Embedding
Hybrid Application Mapping
Hybrid Mapping for Increased Security
Conclusions and Future Work.
Invasive Computing
Fundamentals
Self-Embedding
Hybrid Application Mapping
Hybrid Mapping for Increased Security
Conclusions and Future Work.