|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-981-10-1058-3 |
003 |
DE-He213 |
005 |
20220420123148.0 |
007 |
cr nn 008mamaa |
008 |
160708s2016 si | s |||| 0|eng d |
020 |
|
|
|a 9789811010583
|9 978-981-10-1058-3
|
024 |
7 |
|
|a 10.1007/978-981-10-1058-3
|2 doi
|
050 |
|
4 |
|a TK7867-7867.5
|
072 |
|
7 |
|a TJFC
|2 bicssc
|
072 |
|
7 |
|a TEC008010
|2 bisacsh
|
072 |
|
7 |
|a TJFC
|2 thema
|
082 |
0 |
4 |
|a 621.3815
|2 23
|
100 |
1 |
|
|a LARI, VAHID.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Invasive Tightly Coupled Processor Arrays
|h [electronic resource] /
|c by VAHID LARI.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Singapore :
|b Springer Nature Singapore :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XXIII, 149 p. 52 illus., 49 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Computer Architecture and Design Methodologies,
|x 2367-3486
|
505 |
0 |
|
|a Introduction -- Invasive Tightly Coupled Processor Arrays -- Self-adaptive Power and Energy Management for TCPAs -- On-Demand Fault Tolerance on Massively Parallel Processor Arrays -- Conclusions and Future Work.
|
520 |
|
|
|a This book introduces new massively parallel computer (MPSoC) architectures called invasive tightly coupled processor arrays. It proposes strategies, architecture designs, and programming interfaces for invasive TCPAs that allow invading and subsequently executing loop programs with strict requirements or guarantees of non-functional execution qualities such as performance, power consumption, and reliability. For the first time, such a configurable processor array architecture consisting of locally interconnected VLIW processing elements can be claimed by programs, either in full or in part, using the principle of invasive computing. Invasive TCPAs provide unprecedented energy efficiency for the parallel execution of nested loop programs by avoiding any global memory access such as GPUs and may even support loops with complex dependencies such as loop-carried dependencies that are not amenable to parallel execution on GPUs. For this purpose, the book proposes different invasion strategies for claiming a desired number of processing elements (PEs) or region within a TCPA exclusively for an application according to performance requirements. It not only presents models for implementing invasion strategies in hardware, but also proposes two distinct design flavors for dedicated hardware components to support invasion control on TCPAs. .
|
650 |
|
0 |
|a Electronic circuits.
|
650 |
|
0 |
|a Microprocessors.
|
650 |
|
0 |
|a Computer architecture.
|
650 |
1 |
4 |
|a Electronic Circuits and Systems.
|
650 |
2 |
4 |
|a Processor Architectures.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811010576
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811010590
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811093173
|
830 |
|
0 |
|a Computer Architecture and Design Methodologies,
|x 2367-3486
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-981-10-1058-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|