Fr. 135.00

Invasive Computing for Mapping Parallel Programs to Many-Core Architectures

Anglais · Livre Relié

Expédition généralement dans un délai de 6 à 7 semaines

Description

En savoir plus

This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties.
The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposedideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.

Table des matières

Introduction.- Invasive Computing.- Fundamentals.- Self-Embedding.- Hybrid Application Mapping.- Hybrid Mapping for Increased Security.- Conclusions and Future Work.

A propos de l'auteur

Michael Glaß, geboren 1983 in Rodewisch, ist Diplom-Informatiker und seit 2006 als Doktorand an der Universität Erlangen-Nürnberg tätig. Über die Pflege von Zierfischen gelangte er zur Reptilienhaltung und züchtet seither Kornnatterfarbvarianten und Geckos der Gattung Rhacodactylus. Michael Glaß arbeitete bereits als Autor und Fotograf für verschiedene Verlage und ist Autor der Internetpräsenz Kornnatterlexikon.de.

Résumé


Exhaustively reviews the key recent research into invasive computing and details methodologies to map applications
Covers many different applications such as invading computing and network resources for a static application graph, to NoC-based many-core architectures
Presents techniques in a step-by-step manner, supported by examples and figures

Commentaires des clients

Aucune analyse n'a été rédigée sur cet article pour le moment. Sois le premier à donner ton avis et aide les autres utilisateurs à prendre leur décision d'achat.

Écris un commentaire

Super ou nul ? Donne ton propre avis.

Pour les messages à CeDe.ch, veuillez utiliser le formulaire de contact.

Il faut impérativement remplir les champs de saisie marqués d'une *.

En soumettant ce formulaire, tu acceptes notre déclaration de protection des données.