Navigation

31.07.2018 Invited Talk Prof. Teich and title of Visiting Professorial Fellow at University of New South Wales, Australia

University of New South Wales (UNSW), Sydney, Australia

Prof. Teich gave his invited talk “Hybrid Application Mapping for NoC-Based MPSoCs with Guarantees on Timing, Reliability and Security” at the University of New South Wales (UNSW), Australia. The University conferred upon Prof. Teich the academic title of Visiting Professorial Fellow with effect from 1 July 2018 to 30 June 2021.This is seen as an acknowledgement of his achievement, expertise, leadership and other excellence in his field.
In this talk, an overview of techniques for systematically mapping parallel program applications to NoC-based multi-core architectures (MPSoCs) was presented. Complex applications requiring heterogenous processing resources are often described by task graphs with data dependencies. Here, nodes present actors or tasks which are typically activated periodically based on the availability of data. One prominent domain of applications fitting this model is stream processing. Here, it is often important to guarantee either bandwidth or execution time requirements. But typically, also security and reliability aspects may exist that impose further constraints on the mapping of the tasks as well as their communication to cores, respectively routes in the underlying NoC. In the focus of the presentation were techniques called “Hybrid Application Mapping (HAM)”. Here, a careful analysis and characterization of symmetric mappings by constellations of cores and routes is explored in a static (compile-time) phase of Design Space Exploration (DSE). At run-time, the operating system then only needs to search within a much smaller space of pre-characterised constellations for finding a concrete mapping that will satisfy the given non-functional constraints by construction. In order to allow the analysis of applications statically and independently, however, techniques for isolation are needed. This is achieved using a novel programming paradigm called Invasive Computing. Here, cores are “invaded” at run-time for exclusive usage before execution rather than shared. For a rather general class of NoC-based MPSoC architectures, it was shown that HAM allows to provide guarantees not only guarantees on timing, but also on reliability and on certain security properties on demand of an individual application through the enforced isolation of resources. As a case study, we applied and demonstrated the concepts for a video-based cyber-physical real-time control application.