語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Invasive computing for mapping paral...
~
SpringerLink (Online service)
Invasive computing for mapping parallel programs to many-core architectures
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Invasive computing for mapping parallel programs to many-core architecturesby Andreas Weichslgartner ... [et al.].
其他作者:
Weichslgartner, Andreas.
出版者:
Singapore :Springer Singapore :2018.
面頁冊數:
xxii, 164 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Parallel programming (Computer science)
電子資源:
http://dx.doi.org/10.1007/978-981-10-7356-4
ISBN:
9789811073564$q(electronic bk.)
Invasive computing for mapping parallel programs to many-core architectures
Invasive computing for mapping parallel programs to many-core architectures
[electronic resource] /by Andreas Weichslgartner ... [et al.]. - Singapore :Springer Singapore :2018. - xxii, 164 p. :ill., digital ;24 cm. - Computer architecture and design methodologies,2367-3478. - Computer architecture and design methodologies..
Introduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
ISBN: 9789811073564$q(electronic bk.)
Standard No.: 10.1007/978-981-10-7356-4doiSubjects--Topical Terms:
215285
Parallel programming (Computer science)
LC Class. No.: QA76.642 / .I583 2018
Dewey Class. No.: 621.3815
Invasive computing for mapping parallel programs to many-core architectures
LDR
:02370nmm a2200325 a 4500
001
530019
003
DE-He213
005
20180807151619.0
006
m d
007
cr nn 008maaau
008
181107s2018 si s 0 eng d
020
$a
9789811073564$q(electronic bk.)
020
$a
9789811073557$q(paper)
024
7
$a
10.1007/978-981-10-7356-4
$2
doi
035
$a
978-981-10-7356-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.642
$b
.I583 2018
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
082
0 4
$a
621.3815
$2
23
090
$a
QA76.642
$b
.I62 2018
245
0 0
$a
Invasive computing for mapping parallel programs to many-core architectures
$h
[electronic resource] /
$c
by Andreas Weichslgartner ... [et al.].
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2018.
300
$a
xxii, 164 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Computer architecture and design methodologies,
$x
2367-3478
505
0
$a
Introduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work.
520
$a
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
650
0
$a
Parallel programming (Computer science)
$3
215285
650
0
$a
Computer architecture.
$3
183006
650
0
$a
Parallel processing (Electronic computers)
$3
184697
650
1 4
$a
Engineering.
$3
210888
650
2 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Processor Architectures.
$3
274498
650
2 4
$a
Electronic Circuits and Devices.
$3
495609
700
1
$a
Weichslgartner, Andreas.
$3
803545
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Computer architecture and design methodologies.
$3
753537
856
4 0
$u
http://dx.doi.org/10.1007/978-981-10-7356-4
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000151661
電子館藏
1圖書
電子書
EB QA76.642 .I62 2018 2018
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-981-10-7356-4
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入