Invasive Computing for Mapping Parallel Programs to Many-Core Architectures Invasive Computing for Mapping Parallel Programs to Many-Core Architectures
Computer Architecture and Design Methodologies

Invasive Computing for Mapping Parallel Programs to Many-Core Architectures

    • CHF 95.00
    • CHF 95.00

Beschreibung des Verlags

This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. 
The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.

GENRE
Gewerbe und Technik
ERSCHIENEN
2017
29. Dezember
SPRACHE
EN
Englisch
UMFANG
186
Seiten
VERLAG
Springer Nature Singapore
GRÖSSE
4.9
 MB

Andere Bücher in dieser Reihe

Implementation and Analysis of Ciphers in Quantum Computing Implementation and Analysis of Ciphers in Quantum Computing
2024
Emerging Computing: From Devices to Systems Emerging Computing: From Devices to Systems
2022
A Practical Guide for Simulation and FPGA Implementation of Digital Design A Practical Guide for Simulation and FPGA Implementation of Digital Design
2022
Classical and Physical Security of Symmetric Key Cryptographic Algorithms Classical and Physical Security of Symmetric Key Cryptographic Algorithms
2022
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
2021
Lattice-Based Public-Key Cryptography in Hardware Lattice-Based Public-Key Cryptography in Hardware
2019