000 | 03614nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-981-10-7356-4 | ||
003 | DE-He213 | ||
005 | 20220801215646.0 | ||
007 | cr nn 008mamaa | ||
008 | 171229s2018 si | s |||| 0|eng d | ||
020 |
_a9789811073564 _9978-981-10-7356-4 |
||
024 | 7 |
_a10.1007/978-981-10-7356-4 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aWeichslgartner, Andreas. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _945697 |
|
245 | 1 | 0 |
_aInvasive Computing for Mapping Parallel Programs to Many-Core Architectures _h[electronic resource] / _cby Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2018. |
|
300 |
_aXXII, 164 p. 80 illus., 77 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aComputer Architecture and Design Methodologies, _x2367-3486 |
|
505 | 0 | _aIntroduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work. | |
520 | _aThis book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources. | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aMicroprocessors. _945698 |
|
650 | 0 |
_aComputer architecture. _93513 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _945699 |
650 | 2 | 4 |
_aProcessor Architectures. _945700 |
700 | 1 |
_aWildermann, Stefan. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _945701 |
|
700 | 1 |
_aGlaß, Michael. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _945702 |
|
700 | 1 |
_aTeich, Jürgen. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _945703 |
|
710 | 2 |
_aSpringerLink (Online service) _945704 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811073557 |
776 | 0 | 8 |
_iPrinted edition: _z9789811073571 |
776 | 0 | 8 |
_iPrinted edition: _z9789811356223 |
830 | 0 |
_aComputer Architecture and Design Methodologies, _x2367-3486 _945705 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-10-7356-4 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c77725 _d77725 |