Share Email Print

Proceedings Paper

Building a high performance, secure, reliable and compliant heterogeneous computing capability through the integration of core and edge processing
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Heterogeneous computing and heterogeneous clouds refer to emerging architectures to build a variety of processors including CPUs, GPUs, FPGAs, and more specialized processing elements into an interconnected mesh environment to provide an ideal processing capability for a variety of complex tasks and data types. The concept expands to cover edge computing enabling preprocessing, data selection, and data conditioning/labeling to enhance the overall outcome. The combination of processors will be augmented by a variety of interconnect and memory architectures and configurations leading to customizable settings and flows meeting the changing needs of data and customers. This variety of environments, tasks, and interconnects creates a new landscape that greatly varies from our standard computing infrastructure therefore reducing our expertise in identifying threats based on network, memory, and processing based on trends resulting in an unknown trust level. The goal is to build and operate a heterogeneous platform that provides dynamic resource assignments and capability elasticity to meet standard and surge needs in an environment that provides data security, isolation and attribution. Access control also becomes an essential element of the new environment.

Paper Details

Date Published: 10 May 2019
PDF: 18 pages
Proc. SPIE 11013, Disruptive Technologies in Information Sciences II, 110130C (10 May 2019); doi: 10.1117/12.2518267
Show Author Affiliations
B. S. Farroha, U.S. Dept. of Defense (United States)
The John Hopkins Univ. (United States)
D. L. Farroha, U.S. Dept. of Defense (United States)

Published in SPIE Proceedings Vol. 11013:
Disruptive Technologies in Information Sciences II
Misty Blowers; Russell D. Hall; Venkateswara R. Dasari, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?