Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Invasive computing for mapping paral...
~
SpringerLink (Online service)
Invasive computing for mapping parallel programs to many-core architectures
Record Type:
Electronic resources : Monograph/item
Title/Author:
Invasive computing for mapping parallel programs to many-core architecturesby Andreas Weichslgartner ... [et al.].
other author:
Weichslgartner, Andreas.
Published:
Singapore :Springer Singapore :2018.
Description:
xxii, 164 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Parallel programming (Computer science)
Online resource:
http://dx.doi.org/10.1007/978-981-10-7356-4
ISBN:
9789811073564$q(electronic bk.)
Invasive computing for mapping parallel programs to many-core architectures
Invasive computing for mapping parallel programs to many-core architectures
[electronic resource] /by Andreas Weichslgartner ... [et al.]. - Singapore :Springer Singapore :2018. - xxii, 164 p. :ill., digital ;24 cm. - Computer architecture and design methodologies,2367-3478. - Computer architecture and design methodologies..
Introduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
ISBN: 9789811073564$q(electronic bk.)
Standard No.: 10.1007/978-981-10-7356-4doiSubjects--Topical Terms:
215285
Parallel programming (Computer science)
LC Class. No.: QA76.642 / .I583 2018
Dewey Class. No.: 621.3815
Invasive computing for mapping parallel programs to many-core architectures
LDR
:02370nmm a2200325 a 4500
001
530019
003
DE-He213
005
20180807151619.0
006
m d
007
cr nn 008maaau
008
181107s2018 si s 0 eng d
020
$a
9789811073564$q(electronic bk.)
020
$a
9789811073557$q(paper)
024
7
$a
10.1007/978-981-10-7356-4
$2
doi
035
$a
978-981-10-7356-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.642
$b
.I583 2018
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
082
0 4
$a
621.3815
$2
23
090
$a
QA76.642
$b
.I62 2018
245
0 0
$a
Invasive computing for mapping parallel programs to many-core architectures
$h
[electronic resource] /
$c
by Andreas Weichslgartner ... [et al.].
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2018.
300
$a
xxii, 164 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Computer architecture and design methodologies,
$x
2367-3478
505
0
$a
Introduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
520
$a
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
650
0
$a
Parallel programming (Computer science)
$3
215285
650
0
$a
Computer architecture.
$3
183006
650
0
$a
Parallel processing (Electronic computers)
$3
184697
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Processor Architectures.
$3
274498
650
2 4
$a
Electronic Circuits and Devices.
$3
495609
700
1
$a
Weichslgartner, Andreas.
$3
803545
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Computer architecture and design methodologies.
$3
753537
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-7356-4
950
$a
Engineering (Springer-11647)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000151661
電子館藏
1圖書
電子書
EB QA76.642 .I62 2018 2018
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-981-10-7356-4
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login