This book provides an overview of and essential insights on invasive computing.
The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security.
The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security.
Les mer
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties.
The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
Les mer
Exhaustively reviews key recent research into invasive computing and details methodologies for mapping applications Covers many different applications such as invasive computing and network resources for a static application graph, to NoC-based many-core architectures Presents techniques in a step-by-step manner, supported by examples and figures Includes supplementary material: sn.pub/extras
Les mer
Produktdetaljer
ISBN
9789811073557
Publisert
2018-01-20
Utgiver
Springer Verlag, Singapore
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, UP, 05
Språk
Product language
Engelsk
Format
Product format
Innbundet
Antall sider
22