Energy-aware Scheduling on Multiprocessor Platforms


Book Description

Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-held devices to large data centers. As the performance requirements increase, energy-consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which allows processors to dynamically adjust the supply voltage and the clock frequency to operate on different power/energy levels, is considered an effective way to achieve the goal of energy-saving. This book surveys existing works that have been on energy-aware task scheduling on DVFS multiprocessor platforms. Energy-aware scheduling problems are intrinsically optimization problems, the formulations of which greatly depend on the platform and task models under consideration. Thus, Energy-aware Scheduling on Multiprocessor Platforms covers current research on this topic and classifies existing works according to two key standards, namely, homogeneity/heterogeneity of multiprocessor platforms and the task types considered. Under this classification, other sub-issues are also included, such as, slack reclamation, fixed/dynamic priority scheduling, partition-based/global scheduling, and application-specific power consumption, etc.







Handbook of Energy-Aware and Green Computing - Two Volume Set


Book Description

Implementing energy-efficient CPUs and peripherals as well as reducing resource consumption have become emerging trends in computing. As computers increase in speed and power, their energy issues become more and more prevalent. The need to develop and promote environmentally friendly computer technologies and systems has also come to the forefront




Reliable and Autonomous Computational Science


Book Description

Increasing size and complexity of software and hardware systems makes it harder to ensure their reliability. At the same time, the issues of autonomous computing become more critical as we more and more rely on software systems in our daily life. Such complexity is getting even more critical with the ubiquitous computing of embedded devices and other pervasive systems. These trends ask for techniques and tools for developing reliable and autonomous software which can support software engineers in their efforts. This book summarizes the state of the art of research in the diverse fields concerned, including novel designs, case studies and experimental as well as theoretical results.




Designing Embedded Processors


Book Description

To the hard-pressed systems designer this book will come as a godsend. It is a hands-on guide to the many ways in which processor-based systems are designed to allow low power devices. Covering a huge range of topics, and co-authored by some of the field’s top practitioners, the book provides a good starting point for engineers in the area, and to research students embarking upon work on embedded systems and architectures.




Ubiquitous Computing and Ambient Intelligence: Personalisation and User Adapted Services


Book Description

This book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2014, held in Belfast, UK, in December 2014. The 57 papers presented together with 7 papers of the workshop AmIUA 2014, 8 papers of the workshop IoT 2014, 7 papers of the workshop EUSPAI 2014, and 6 papers of the workshop VSS 2014 were carefully reviewed and selected from numerous submissions. The papers are grouped in topical sections on key application domains for ambient intelligence, human interaction in ambient intelligence, ICT instrumentation and middleware support for smart environments and objects, adding intelligence for environment adaption, and security and privacy issues in AAL.




Context-Aware Computing


Book Description

The book addresses the impact of ambient intelligence, particularly its user-centric context-awareness requirement on data management strategies and solutions. Techniques of conceptualizing, capturing, protecting, modelling, and querying context information, as well as context-aware data management application are discussed, making the book is an essential reference for computer scientists, information scientists and industrial engineers.




System-on-Chip


Book Description

This book highlights both the key achievements of electronic systems design targeting SoC implementation style, and the future challenges presented by the continuing scaling of CMOS technology.




Geo-Spatial Knowledge and Intelligence


Book Description

This two-volume set (CCIS 848 and CCIS 849) constitutes the thoroughly refereed proceedings of the 5th International Conference Geo-Spatial Knowledge and Intelligence, GSKI 2017, held in Chiang Mai, Thailand, in December 2018.The 142 full papers presented were carefully reviewed and selected from 579 submissions. They are organized in topical sections on smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental process; applications of geo-informatics in resource management and sustainable ecosystem.




Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms


Book Description

This book focuses on how real-time task schedules for reconfigurable hardware-based embedded platforms may be affected due to the vulnerability of hardware and proposes self-aware security strategies to counteract the various threats. The emergence of Industry 4.0 has witnessed the deployment of reconfigurable hardware or field programmable gate arrays (FPGAs) in diverse embedded applications. These are associated with the execution of several real-time tasks arranged in schedules. However, they are associated with several issues. Development of fully and partially reconfigurable task schedules are discussed that eradicates the existing problems. However, such real-time task schedules may be jeopardized due to hardware threats. Analysis of such threats is discussed and self-aware security techniques are proposed that can detect and mitigate such threats at runtime.




Recent Books