000 03917nam a22005895i 4500
001 978-981-10-7356-4
003 DE-He213
005 20210201191411.0
007 cr nn 008mamaa
008 171229s2018 si | s |||| 0|eng d
020 _a9789811073564
_9978-981-10-7356-4
050 4 _aTK7888.4
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aWeichslgartner, Andreas.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aInvasive Computing for Mapping Parallel Programs to Many-Core Architectures
_h[electronic resource] /
_cby Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich.
250 _a1st ed. 2018.
264 1 _aSingapore :
_bSpringer Singapore :
_bImprint: Springer,
_c2018.
300 _aXXII, 164 p. 80 illus., 77 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Architecture and Design Methodologies,
_x2367-3478
500 _aAcceso multiusuario
505 0 _aIntroduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
520 _aThis book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties.  The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aElectronic circuits.
650 0 _aMicroprocessors.
650 1 4 _aCircuits and Systems.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24068
650 2 4 _aProcessor Architectures.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13014
650 2 4 _aElectronic Circuits and Devices.
_0https://scigraph.springernature.com/ontologies/product-market-codes/P31010
700 1 _aWildermann, Stefan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aGlaß, Michael.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aTeich, Jürgen.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811073557
776 0 8 _iPrinted edition:
_z9789811073571
776 0 8 _iPrinted edition:
_z9789811356223
830 0 _aComputer Architecture and Design Methodologies,
_x2367-3478
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-981-10-7356-4
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c243063
_d243062