Invasive Computing for Mapping Parallel Programs to Many-Core Architectures by Andreas Weichslgartner & Stefan Wildermann & Michael Glaß & Jürgen Teich
Author:Andreas Weichslgartner & Stefan Wildermann & Michael Glaß & Jürgen Teich
Language: eng
Format: epub
ISBN: 9789811073564
Publisher: Springer Singapore
4.7 Summary
In this chapter, we have described a novel and distributed methodology to map applications, specified by application graphs, onto NoCs. We refer this methodology as self-embedding. The core idea of this algorithm is that each task is responsible for mapping its succeeding tasks and messages. To prove the power of decentralized self-embedding, we have presented a model and interface for this class of algorithms and also have introduced two incarnations. We showed that a local best neighbor (BN) algorithm can compete with the global path load (PL) algorithm by offering a magnitude less monitor overhead. Also, we have developed an improved random-walk-based algorithm that offers several advantages over a random-walk algorithm using an equal distribution. In addition, we presented a concept and implementation of a hardware-based acceleration of the self-embedding algorithm which may speedup the mapping process. Dedicated hardware modules, so-called self-embedding modules (SEMs), inside NoC routers perform the distributed application mapping based upon a serialized application graph. The application graph can be split up and processed in a streaming-based manner. This mechanism can be used to accelerate the invasion process and, hence, increases the invasive speedup and efficiency according to Sect. 2.3.1. Together with hardware extensions which accelerate the infection, such as the Cicic (see Sect. 2.4.3) and the i-NA with task spawning support [17], the invasive overheads can be kept minimal.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(22432)
Hello! Python by Anthony Briggs(21622)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(20183)
Dependency Injection in .NET by Mark Seemann(19563)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(19311)
Kotlin in Action by Dmitry Jemerov(19234)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(18774)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(17576)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16965)
Grails in Action by Glen Smith Peter Ledbrook(16726)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(14219)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(12199)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10923)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10597)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(10029)
Hit Refresh by Satya Nadella(9115)
The Kubernetes Operator Framework Book by Michael Dame(8538)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8363)
Robo-Advisor with Python by Aki Ranin(8305)