Exhaustively reviews the key recent research into invasive computing and
details methodologies to map applications
Covers many different applications such as invading computing and
network resources for a static application graph, to NoC-based many-core
architectures
Presents techniques in a step-by-step manner, supported by examples and
figures