Advertisement

Invasive Computing for Mapping Parallel Programs to Many-Core Architectures

  • Andreas Weichslgartner
  • Stefan Wildermann
  • Michael Glaß
  • Jürgen Teich

Part of the Computer Architecture and Design Methodologies book series (CADM)

Table of contents

  1. Front Matter
    Pages i-xxii
  2. Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich
    Pages 1-7
  3. Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich
    Pages 9-43
  4. Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich
    Pages 45-56
  5. Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich
    Pages 57-83
  6. Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich
    Pages 85-135
  7. Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich
    Pages 137-156
  8. Andreas Weichslgartner, Stefan Wildermann, Michael Glaß, Jürgen Teich
    Pages 157-161
  9. Back Matter
    Pages 163-164

About this book

Introduction

This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. 

The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.

Keywords

Heterogeneous Multiprocessor-On-A-Chip Networks-On-Chip Hybrid Application Mapping (HAM) Self-Embedding Invasive Hardware Multi-Core Architectures Invasive Language Constructs Parallel Computing Run-Time Mapping Shape-Based Design-Time Optimization

Authors and affiliations

  • Andreas Weichslgartner
    • 1
  • Stefan Wildermann
    • 2
  • Michael Glaß
    • 3
  • Jürgen Teich
    • 4
  1. 1.Department of Computer ScienceFriedrich-Alexander-Universität Erlangen-Nürnberg (FAU)ErlangenGermany
  2. 2.Department of Computer ScienceFriedrich-Alexander-Universität Erlangen-Nürnberg (FAU)ErlangenGermany
  3. 3.Embedded Systems/Real-Time SystemsUniversity of UlmUlmGermany
  4. 4.Department of Computer ScienceFriedrich-Alexander-Universität Erlangen-Nürnberg (FAU)ErlangenGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-10-7356-4
  • Copyright Information Springer Nature Singapore Pte Ltd. 2018
  • Publisher Name Springer, Singapore
  • eBook Packages Engineering
  • Print ISBN 978-981-10-7355-7
  • Online ISBN 978-981-10-7356-4
  • Series Print ISSN 2367-3478
  • Series Online ISSN 2367-3486
  • Buy this book on publisher's site