Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Choose an application
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
Parallel programming (Computer science) --- Computer architecture. --- Parallel processing (Electronic computers) --- Architecture, Computer --- Engineering. --- Microprocessors. --- Electronic circuits. --- Circuits and Systems. --- Processor Architectures. --- Electronic Circuits and Devices. --- Computer programming --- High performance computing --- Multiprocessors --- Supercomputers --- Systems engineering. --- Computer science. --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Minicomputers --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics
Choose an application
On an average morning in the tree-lined parks, plazas, and play-areas of Manhattan's Stuyvesant Town housing development, birds chirp as early risers dash off to work, elderly residents enjoy a peaceful morning stroll, and flocks of parents usher their children to school. It seems an unlikely location for conflict and strife, yet this eighteen-block area, initially planned as middle-class affordable housing, is the site of an ongoing struggle between long-term, rent-regulated residents, younger, market-rate tenants, and new owners seeking to turn this community into a luxury commodity. 'Priced Out' takes readers into this heated battle as a transitioning neighborhood wrestles with contemporary capitalist strategies and the struggle to preserve renters' rights.
Middle class --- Neighborhoods --- Housing development --- Mixed-income housing --- Rent control --- Housing --- Development, Housing --- Residential development --- Residential subdivisions --- Real estate development --- Inclusionary housing programs --- Rent regulation --- Rent restrictions --- Landlord and tenant --- Price regulation --- Affordable housing --- Homes --- Houses --- Housing needs --- Residences --- Slum clearance --- Urban housing --- City planning --- Dwellings --- Human settlements --- Neighborhood --- Neighbourhoods --- Communities --- Bourgeoisie --- Commons (Social order) --- Middle classes --- Social classes --- Law and legislation --- Social aspects --- Social conditions --- E-books
Choose an application
This book provides an overview of and essential insights on invasive computing. Pursuing a comprehensive approach, it addresses proper concepts, invasive language constructs, and the principles of invasive hardware. The main focus is on the important topic of how to map task-parallel applications to future multi-core architectures including 1,000 or more processor units. A special focus today is the question of how applications can be mapped onto such architectures while not only taking into account functional correctness, but also non-functional execution properties such as execution times and security properties. The book provides extensive experimental evaluations, investigating the benefits of applying invasive computing and hybrid application mapping to give guarantees on non-functional properties such as timing, energy, and security. The techniques in this book are presented in a step-by-step manner, supported by examples and figures. All proposed ideas for providing guarantees on performance, energy consumption, and security are enabled by using the concept of invasive computing and the exclusive usage of resources.
Choose an application
Choose an application
This agenda-setting volume disrupts conventional notions of time through a robust examination of the relations between temporality, infrastructure and urban society. With global coverage of diverse cities and regions from Berlin to Jayapura, this book re-evaluates the temporal complexities that shape our infrastructured worlds.
Choose an application
Focusing on material and social forms of infrastructure, this edited collection focuses on cities across the global North and South. Considering public health crises and climate change, the book argues that paying attention to infrastructures' past, present and future allows us to understand and respond to the current urban condition.
Listing 1 - 7 of 7 |
Sort by
|