Independent loops statement, Computer Networking

INDEPENDENT Loops

HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done independently---that is, in any order or concurrently---without affecting the result . In effect, this directive changes a do-loop from an implicitly parallel construct to an explicitly parallel construct.

 The INDEPENDENT directive must instantaneously precede the do-loop to which it applies. In its easiest form, it has no additional argument and asserts simply that no iteration of the do-loop can affect any other iteration.

Example 9

In the following code fragment, the directives indicate that the outer two loops are independent. The inner loop assigns the elements of A repeatedly and hence it is not independent.

!HPF$   INDEPENDENT

do i=1,n1  ! Loop over i independent

!HPF$   INDEPENDENT

do j=1,n2      ! Loop over j independent

do k=1,n3          ! Inner loop not independent

A(i,j) = A(i,j) + B(i,j,k)*C(i,j)

enddo enddo

enddo

Posted Date: 3/2/2013 8:12:47 AM | Location : United States







Related Discussions:- Independent loops statement, Assignment Help, Ask Question on Independent loops statement, Get Answer, Expert's Help, Independent loops statement Discussions

Write discussion on Independent loops statement
Your posts are moderated
Related Questions
Coaxial Cable Coaxial  cable  carries signals  of higher  frequency ranges than those in twisted pair cable. In part  because the two media are constructed quite  differently.

What are TP-Lite and TP-Heavy Monitors? TP-Lite is simply the integration of TP Monitor functions in the database engines. TP-Heavy is TP Monitors which handles the Client/S


Importace of Clientsin intranet server The most interesting thing is that almost every computer can be connected as a client to the Intranet server. The client could be based

Commands SMTP uses commands  and response  to transfer  message between a client  and a  server.  Each  commands  or reply  is terminated by a two character ( carriage re

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar


Define in details about computer networks ? Discuss a variety of types of networks topologies in computer network. Also discuss a variety of costs and disadvantage of all topology

(a) You are provided with the following: A. An RSA facility complete with public/private key pair B. A CBC (cipher block chaining) facility incorporating the IDEA block ciph

Describe at one disadvantage of a peer to peer network. When you are accessing the resources that are shared by one of the workstations on the network, that workstation takes