Invasive Computing for Mapping Parallel Programs to Many-Core Architectures (Record no. 77725)

000 -LEADER
fixed length control field 03614nam a22005655i 4500
001 - CONTROL NUMBER
control field 978-981-10-7356-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801215646.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 171229s2018 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789811073564
-- 978-981-10-7356-4
082 04 - CLASSIFICATION NUMBER
Call Number 621.3815
100 1# - AUTHOR NAME
Author Weichslgartner, Andreas.
245 10 - TITLE STATEMENT
Title Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2018.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XXII, 164 p. 80 illus., 77 illus. in color.
490 1# - SERIES STATEMENT
Series statement Computer Architecture and Design Methodologies,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
520 ## - SUMMARY, ETC.
Summary, etc This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties.  The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
700 1# - AUTHOR 2
Author 2 Wildermann, Stefan.
700 1# - AUTHOR 2
Author 2 Glaß, Michael.
700 1# - AUTHOR 2
Author 2 Teich, Jürgen.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-981-10-7356-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2018.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic circuits.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Microprocessors.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer architecture.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Processor Architectures.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2367-3486
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.