Invasive Tightly Coupled Processor Arrays (Record no. 79695)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03468nam a22005295i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-10-1058-3 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801221448.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160708s2016 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789811010583 |
-- | 978-981-10-1058-3 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.3815 |
100 1# - AUTHOR NAME | |
Author | LARI, VAHID. |
245 10 - TITLE STATEMENT | |
Title | Invasive Tightly Coupled Processor Arrays |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2016. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XXIII, 149 p. 52 illus., 49 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Computer Architecture and Design Methodologies, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction -- Invasive Tightly Coupled Processor Arrays -- Self-adaptive Power and Energy Management for TCPAs -- On-Demand Fault Tolerance on Massively Parallel Processor Arrays -- Conclusions and Future Work. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book introduces new massively parallel computer (MPSoC) architectures called invasive tightly coupled processor arrays. It proposes strategies, architecture designs, and programming interfaces for invasive TCPAs that allow invading and subsequently executing loop programs with strict requirements or guarantees of non-functional execution qualities such as performance, power consumption, and reliability. For the first time, such a configurable processor array architecture consisting of locally interconnected VLIW processing elements can be claimed by programs, either in full or in part, using the principle of invasive computing. Invasive TCPAs provide unprecedented energy efficiency for the parallel execution of nested loop programs by avoiding any global memory access such as GPUs and may even support loops with complex dependencies such as loop-carried dependencies that are not amenable to parallel execution on GPUs. For this purpose, the book proposes different invasion strategies for claiming a desired number of processing elements (PEs) or region within a TCPA exclusively for an application according to performance requirements. It not only presents models for implementing invasion strategies in hardware, but also proposes two distinct design flavors for dedicated hardware components to support invasion control on TCPAs. . |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-10-1058-3 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2016. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic circuits. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Microprocessors. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer architecture. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic Circuits and Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Processor Architectures. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2367-3486 |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.