Exploitation of parallelism, computer science, Basic Computer Science

Exploitation of Parallelism

Similar calculations have of course been a subject of dynamic research in computer technology for the past several years. Whereas parallelism within just one brand has been efficiently used (instruction-level parallelism), the issue of dividing just one person application onto several such brand chips is yet to be satisfactorily settled. Although the components for the design of several brand models - the storage, system community, input/output subsystems,etc. - has obtained much attention, effective dividing of a common application (written in C, for example) across a given set of brand chips organized in particular settings is still an open issue. The need to recognize parallelism from within the over's pacified sequencing in popular crucial dialects such as C, the need to deal with over head due to interaction and synchronization between brand chips, and needing energetic fill controlling for some programs (an included source of overhead) reduces the dividing issue for common application.

If we convert from common objective calculations to application-specific areas, however, parallelism is often simpler to find and manipulate. This is because much more is known about the computational framework of the performance being integrated. In such situations, we do not have to depend on the restricted capability of computerized resources to consider this high-level framework from general, low-level requirements (for example, from a common objective selection terminology such as C). Instead, it may be possible to hire specialized computational designs -such as one of the several versions of dataflow and particular state device models- that provide appropriate framework in our focused programs, and significantly assist in the guide or automated derivation of enhanced implementations. Such requirements designs will be undesirable in a general-purpose perspective due toothier restricted usefulness, but they provide a remarkable chance to the developer of included programs. The use of specialized computational models- particularly dataflow-based designs - is especially frequent in the DSPdomain

In the same way, concentrating on a particular program domain may motivate the development of highly more efficient system architectures. For example, one of the most substantially examined family members of application-specific similar processor chips is the type of systolic range architectures Kun88] [Rao85]. These architectures contain regularly organized arrays of processor chips that convey regionally, onto which assess type of programs, specified in a statistical form, can be ystematicallymapped.

Posted Date: 3/9/2012 8:09:27 AM | Location : United States







Related Discussions:- Exploitation of parallelism, computer science, Assignment Help, Ask Question on Exploitation of parallelism, computer science, Get Answer, Expert's Help, Exploitation of parallelism, computer science Discussions

Write discussion on Exploitation of parallelism, computer science
Your posts are moderated
Related Questions
#questionWrite a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two poi

Using only the digits 1-6 how many five digit numbers can be formed? How many of these have at least a 5? How many of them have either no 5 or no 6?

Time Sharing Time sharing allows a large number of users at various remote terminals to simultaneously use a centrally located computer for problem solving. Each user operates

concepts and components of computer security

Assume that s is a string variable  that is supposed to contain a value to be converted to integer. Write a fragment of code that converts the value to integer variable  and displ

Storage capacity and Cost per bit of storage: Storage capacit y:  It is the amount of data that can be stored in the storage unit. A large capacity is preferred.  Cost pe

Optical Mark Recognition (OMR): OMR is the scanning of paper to detect the presence or absence of a mark in a predetermined position. Now days, it is used as an input device f

what is the need of a port in a computer?

The CPU has four internal registers, each of 16 bits. The first four, AX, BX, CX, and DX are common use registers and can also be used as 8 bit registers, if used in such a way it

Question (a) Describe the following built-in functions and illustrate each using simple examples. Specify every possible parameters where required Replace() StrComp()