Exhaustively reviews the key recent research into invasive computing and details methodologies to map applications Covers many different applications such as invading computing and network resources for a static application graph, to NoC-based many-core architectures Presents techniques in a step-by-step manner, supported by examples and figures
Read More
Exhaustively reviews the key recent research into invasive computing and details methodologies to map applications Covers many different applications such as invading computing and network resources for a static application graph, to NoC-based many-core architectures Presents techniques in a step-by-step manner, supported by examples and figures
Read Less