Simulation of Invasive Applications and Invasive Architectures (C02) (TRR 89)

Third Party Funds Group - Sub project


Acronym: TRR 89

Start date : 01.07.2010

End date : 30.06.2014

Website: http://invasic.informatik.uni-erlangen.de/en/tp_c2.php


Overall project details

Overall project

DFG SFB/Transregio 89 "Invasive Computing" (TRR 89) July 1, 2010 - Dec. 31, 2022

Overall project speaker:

Project details

Short description

In the first funding phase, Project C2 developed both techniques and the framework InvadeSIM for the timed functional simulation of invasive resource-aware programs on heterogeneous tiled architectures. This enabled us to gain important insights into the concepts of invasive computing across different platform layers, i.e., modelling of different heterogeneous tiled architectures, invasion strategies (solving of constraint satisfaction problems by agents), and resource-aware application programming. Based on this foundation, in the second funding phase, the main focus of Project C2 is the systematic co-exploration across all these platform layers. Investigated is the systematic co-exploration of optimal architecture configurations and invasion strategies fitting best a given mix of resource-aware applications. The research includes (a) design space exploration techniques based on (semi-)simulative and probabilistic methods, (b) the classification of invasive applications into parallel computing patterns, and (c) modelling the dynamic behaviour of invasive applications.

Scientific Abstract

In the first funding phase, Project C2 developed both techniques and the framework InvadeSIM for the timed functional simulation of invasive resource-aware programs on heterogeneous tiled architectures. This enabled us to gain important insights into the concepts of invasive computing across different platform layers, i.e., modelling of different heterogeneous tiled architectures, invasion strategies (solving of constraint satisfaction problems by agents), and resource-aware application programming. Based on this foundation, in the second funding phase, the main focus of Project C2 is the systematic co-exploration across all these platform layers. Investigated is the systematic co-exploration of optimal architecture configurations and invasion strategies fitting best a given mix of resource-aware applications. The research includes (a) design space exploration techniques based on (semi-)simulative and probabilistic methods, (b) the classification of invasive applications into parallel computing patterns, and (c) modelling the dynamic behaviour of invasive applications.

Involved:

Contributing FAU Organisations:

Funding Source

Research Areas