語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Invasive Computing for Mapping Paral...
~
SpringerLink (Online service)
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures/ by Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich.
作者:
Weichslgartner, Andreas.
其他作者:
Wildermann, Stefan.
面頁冊數:
XXII, 164 p. 80 illus., 77 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Electronic circuits. -
電子資源:
https://doi.org/10.1007/978-981-10-7356-4
ISBN:
9789811073564
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
Weichslgartner, Andreas.
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
[electronic resource] /by Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich. - 1st ed. 2018. - XXII, 164 p. 80 illus., 77 illus. in color.online resource. - Computer Architecture and Design Methodologies,2367-3478. - Computer Architecture and Design Methodologies,.
Introduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
ISBN: 9789811073564
Standard No.: 10.1007/978-981-10-7356-4doiSubjects--Topical Terms:
563332
Electronic circuits.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
LDR
:02792nam a22004095i 4500
001
991844
003
DE-He213
005
20200630230211.0
007
cr nn 008mamaa
008
201225s2018 si | s |||| 0|eng d
020
$a
9789811073564
$9
978-981-10-7356-4
024
7
$a
10.1007/978-981-10-7356-4
$2
doi
035
$a
978-981-10-7356-4
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
100
1
$a
Weichslgartner, Andreas.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1283524
245
1 0
$a
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
$h
[electronic resource] /
$c
by Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich.
250
$a
1st ed. 2018.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2018.
300
$a
XXII, 164 p. 80 illus., 77 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
505
0
$a
Introduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
520
$a
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
650
0
$a
Electronic circuits.
$3
563332
650
0
$a
Microprocessors.
$3
632481
650
1 4
$a
Circuits and Systems.
$3
670901
650
2 4
$a
Processor Architectures.
$3
669787
650
2 4
$a
Electronic Circuits and Devices.
$3
782968
700
1
$a
Wildermann, Stefan.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1283525
700
1
$a
Glaß, Michael.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1283526
700
1
$a
Teich, Jürgen.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1268289
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811073557
776
0 8
$i
Printed edition:
$z
9789811073571
776
0 8
$i
Printed edition:
$z
9789811356223
830
0
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
$3
1269988
856
4 0
$u
https://doi.org/10.1007/978-981-10-7356-4
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入