1 - 7 of 7 Chapters
[One of the most important trends in computer architecture in recent years is the paradigm shift toward multi and many-core chips. This chapter outlines the implications and challenges of future many-core architectures and gives an overview of the book’s contributions.]
[As this book originates in the context of invasive computing, this chapter gives an overview of the invasive computing paradigm and its realization in software and hardware. It starts with its basic principles and then gives an overview how the paradigm is expressed at the language level....
[This chapter introduces the required formal foundation on which the mapping algorithms in later chapters build on. It details the formal application and architecture models which abstract from any actual invasive hardware and software. Further, important concepts of predictability and...
[In this chapter, a self-embedding algorithm is presented which solves the mapping problem consisting of task binding to tiles, respectively processors, and message routing to NoC links as formalized in the previous chapter in an autonomous way. In the realm of invasive computing, self-embedding...
[Previously, a new class of distributed application run-time mapping algorithms called self-embedding was presented. They are not designed for hard real-time applications which require an upper bound for end-to-end latency. To achieve predictability or even *-predictability, a static...
[In this chapter, it is shown that the introduced hybrid application mapping can also be utilized to increase security in heterogeneous many-core systems. In the case of security, it is proposed to use the concept of spatial isolation enabled by invasion to close side channels. This requires a...
[In this chapter, the book is summarized and the contributions are revisited. Further, an outlook of future research directions is given and first steps toward there are presented. This includes considering fault tolerance as nonfunctional requirement in our hybrid application mapping...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.