Concurrently read exclusively write (crew), Computer Networking

This  is one of the models based on PRAM. In this, the processors access the memory location parallel for reading while exclusively for writing operations. In the algorithm which uses CREW model of computation and n2 number of processors have been attached in the type of a two dimensional array of size n x n.

Algorithm Matrix Multiplication using CREW

Input// Two Matrices M1 and M2

For I=1 to n            //Operation executed in PARALLEL

For j=1 to n     //Operation executed in PARALLEL

{

Oij = 0;

For k=1 to n

Oij = Oij + M1ik * M2kj

End For

}

End For

End For

The complexity of CREW based algorithm is O (n).

Posted Date: 3/2/2013 6:55:35 AM | Location : United States







Related Discussions:- Concurrently read exclusively write (crew), Assignment Help, Ask Question on Concurrently read exclusively write (crew), Get Answer, Expert's Help, Concurrently read exclusively write (crew) Discussions

Write discussion on Concurrently read exclusively write (crew)
Your posts are moderated
Related Questions
QUESTION (a) Briefly describe the steps involved in Network Simplex Method. (b) In Radix Heap Algorithm, the technique of buckets is employed. However this idea is an extens

The following information was obtained from a host computer: 00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.25: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 2096

CONNECTION TO PACKET SWITCHES:  A packet switch many join to devices and to other packet switches. But the speeds are different in both parts. There are typically high-speed j

What is Piggy Backing? A process called piggybacking is used to get better the efficiency of the bidirectional protocols. When a frame is carrying data from A to B, it can also

Q. Illustrate Error Detection-Simple Parity Check? Error Detection-Simple Parity Check A redundant bit called as Parity Bit? is added to every data unit. Even Pa

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

FORMAT OF HARDWARE ADDRESS:    It have of a numeric value and its size is chosen for specific network technology. The length of the message format is one to six bytes.

Sequence Number After  the bytes have been numbered TCP assigns a sequence number to each segment   that is  being sent. These sequence number for each segment  is the numb

Question 1: (a) In the context of an information system, distinguish and relate among the terms: data, information and decision-making. (b) Describe at least two chall

RIP and IGRP are Distance Vectoring protocols that send their whole routing tables to their neighbours. In some Cisco literature, EIGRP is listed as an 'advanced distance vector