LEADER 03743nam 22005895 450 001 9910299898603321 005 20200630230211.0 010 $a981-10-7356-2 024 7 $a10.1007/978-981-10-7356-4 035 $a(CKB)4100000001381555 035 $a(DE-He213)978-981-10-7356-4 035 $a(MiAaPQ)EBC5210931 035 $a(PPN)222226226 035 $a(EXLCZ)994100000001381555 100 $a20171229d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInvasive Computing for Mapping Parallel Programs to Many-Core Architectures /$fby Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich 205 $a1st ed. 2018. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2018. 215 $a1 online resource (XXII, 164 p. 80 illus., 77 illus. in color.) 225 1 $aComputer Architecture and Design Methodologies,$x2367-3478 311 $a981-10-7355-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aIntroduction -- Invasive Computing -- Fundamentals -- Self-Embedding -- Hybrid Application Mapping -- Hybrid Mapping for Increased Security -- Conclusions and Future Work. 330 $aThis book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties.  The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources. 410 0$aComputer Architecture and Design Methodologies,$x2367-3478 606 $aElectronic circuits 606 $aMicroprocessors 606 $aCircuits and Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/T24068 606 $aProcessor Architectures$3https://scigraph.springernature.com/ontologies/product-market-codes/I13014 606 $aElectronic Circuits and Devices$3https://scigraph.springernature.com/ontologies/product-market-codes/P31010 615 0$aElectronic circuits. 615 0$aMicroprocessors. 615 14$aCircuits and Systems. 615 24$aProcessor Architectures. 615 24$aElectronic Circuits and Devices. 676 $a005.275 700 $aWeichslgartner$b Andreas$4aut$4http://id.loc.gov/vocabulary/relators/aut$01058106 702 $aWildermann$b Stefan$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aGlaß$b Michael$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aTeich$b Jürgen$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299898603321 996 $aInvasive Computing for Mapping Parallel Programs to Many-Core Architectures$92497190 997 $aUNINA