Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Invasive Computing for Mapping Paral...
~
SpringerLink (Online service)
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures/ by Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich.
Author:
Weichslgartner, Andreas.
other author:
Wildermann, Stefan.
Description:
XXII, 164 p. 80 illus., 77 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Electronic circuits. -
Online resource:
https://doi.org/10.1007/978-981-10-7356-4
ISBN:
9789811073564
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
Weichslgartner, Andreas.
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
[electronic resource] /by Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich. - 1st ed. 2018. - XXII, 164 p. 80 illus., 77 illus. in color.online resource. - Computer Architecture and Design Methodologies,2367-3478. - Computer Architecture and Design Methodologies,.
Introduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
ISBN: 9789811073564
Standard No.: 10.1007/978-981-10-7356-4doiSubjects--Topical Terms:
563332
Electronic circuits.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
LDR
:02792nam a22004095i 4500
001
991844
003
DE-He213
005
20200630230211.0
007
cr nn 008mamaa
008
201225s2018 si | s |||| 0|eng d
020
$a
9789811073564
$9
978-981-10-7356-4
024
7
$a
10.1007/978-981-10-7356-4
$2
doi
035
$a
978-981-10-7356-4
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
100
1
$a
Weichslgartner, Andreas.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1283524
245
1 0
$a
Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
$h
[electronic resource] /
$c
by Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich.
250
$a
1st ed. 2018.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2018.
300
$a
XXII, 164 p. 80 illus., 77 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
505
0
$a
Introduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
520
$a
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
650
0
$a
Electronic circuits.
$3
563332
650
0
$a
Microprocessors.
$3
632481
650
1 4
$a
Circuits and Systems.
$3
670901
650
2 4
$a
Processor Architectures.
$3
669787
650
2 4
$a
Electronic Circuits and Devices.
$3
782968
700
1
$a
Wildermann, Stefan.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1283525
700
1
$a
Glaß, Michael.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1283526
700
1
$a
Teich, Jürgen.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1268289
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811073557
776
0 8
$i
Printed edition:
$z
9789811073571
776
0 8
$i
Printed edition:
$z
9789811356223
830
0
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
$3
1269988
856
4 0
$u
https://doi.org/10.1007/978-981-10-7356-4
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login