000 03614nam a22005655i 4500
001 978-981-10-7356-4
003 DE-He213
005 20220801215646.0
007 cr nn 008mamaa
008 171229s2018 si | s |||| 0|eng d
020 _a9789811073564
_9978-981-10-7356-4
024 7 _a10.1007/978-981-10-7356-4
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aWeichslgartner, Andreas.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_945697
245 1 0 _aInvasive Computing for Mapping Parallel Programs to Many-Core Architectures
_h[electronic resource] /
_cby Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich.
250 _a1st ed. 2018.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2018.
300 _aXXII, 164 p. 80 illus., 77 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Architecture and Design Methodologies,
_x2367-3486
505 0 _aIntroduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
520 _aThis book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties.  The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
650 0 _aElectronic circuits.
_919581
650 0 _aMicroprocessors.
_945698
650 0 _aComputer architecture.
_93513
650 1 4 _aElectronic Circuits and Systems.
_945699
650 2 4 _aProcessor Architectures.
_945700
700 1 _aWildermann, Stefan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_945701
700 1 _aGlaß, Michael.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_945702
700 1 _aTeich, Jürgen.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_945703
710 2 _aSpringerLink (Online service)
_945704
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811073557
776 0 8 _iPrinted edition:
_z9789811073571
776 0 8 _iPrinted edition:
_z9789811356223
830 0 _aComputer Architecture and Design Methodologies,
_x2367-3486
_945705
856 4 0 _uhttps://doi.org/10.1007/978-981-10-7356-4
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c77725
_d77725