Concurrently read concurrently write (crcw), Computer Networking

It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which uses CRCW model of computation, n3 number of processors is employed. Whenever a concurrent write operation is executed on a specific memory location, say m, than there are chances of happening of a conflict. Thus, the write conflicts i.e. (WR, RW, and WW) have been determined in the following manner. In a condition when more than one processor tries to write on the similar memory location, the bit stored in the memory location is always the sum of the values computed by the a variety of processors.

Algorithm Matrix Multiplication using CRCW

Input// Two Matrices M1 and M2

For I=1 to n            //Operation performed in PARALLEL For j=1 to n     //Operation performed in PARALLEL For k=1 to n //Operation performed in PARALLEL

Oij = 0;

Oij = M1ik * M2kj

End For

End For

End For

The complexity of CRCW based algorithm is O(1).

Posted Date: 3/2/2013 6:54:49 AM | Location : United States







Related Discussions:- Concurrently read concurrently write (crcw), Assignment Help, Ask Question on Concurrently read concurrently write (crcw), Get Answer, Expert's Help, Concurrently read concurrently write (crcw) Discussions

Write discussion on Concurrently read concurrently write (crcw)
Your posts are moderated
Related Questions
Dynamic Process Groups To generate and manage dynamic groups, a separate library libgpvm3.a must be connected with the user programs that make use of any of the set functions.

What is Proxy Sever and Firewall Proxy Sever Also known as a proxy or application level gateway. It is an application that breaks the connection among sender and receiver.

Explain in brief about the Throughput The medium access control protocol should make as well-organized use as possible of the wireless medium to maximize capacity. Number of

TCP Connections TCP  is an end to end point to point  transport  used in internet. being a point  to point  protocols  means that  there is always  s single  sender  a single

Reliable  data  transfer over a channel bit error  rdt : 20 A more realist model  of the underlying  channel  is one  in which  bits in packet may be  computed. Such  bit erro


Describe the static routing process A static routing method does not adapt to changing conditions on the network but uses a fixed method developed ahead of time. With alternat

How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

this is Our final year project where we have to create a network infrastructure design for a banking corporation for their new setup in Australia.for this we have to create network

Can I get help for data analysis on traffic congestion using GIS