Anbieter: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Deutschland
xxii, 164 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Sprache: Englisch.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 114,22
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: moluna, Greven, Deutschland
EUR 92,27
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 151,15
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 164 pages. 9.25x6.25x0.50 inches. In Stock.
Sprache: Englisch
Verlag: Springer, Palgrave Macmillan, 2018
ISBN 10: 9811073554 ISBN 13: 9789811073557
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposedideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.