Independent loops statement, Computer Networking

INDEPENDENT Loops

HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done independently---that is, in any order or concurrently---without affecting the result . In effect, this directive changes a do-loop from an implicitly parallel construct to an explicitly parallel construct.

 The INDEPENDENT directive must instantaneously precede the do-loop to which it applies. In its easiest form, it has no additional argument and asserts simply that no iteration of the do-loop can affect any other iteration.

Example 9

In the following code fragment, the directives indicate that the outer two loops are independent. The inner loop assigns the elements of A repeatedly and hence it is not independent.

!HPF$   INDEPENDENT

do i=1,n1  ! Loop over i independent

!HPF$   INDEPENDENT

do j=1,n2      ! Loop over j independent

do k=1,n3          ! Inner loop not independent

A(i,j) = A(i,j) + B(i,j,k)*C(i,j)

enddo enddo

enddo

Posted Date: 3/2/2013 8:12:47 AM | Location : United States







Related Discussions:- Independent loops statement, Assignment Help, Ask Question on Independent loops statement, Get Answer, Expert's Help, Independent loops statement Discussions

Write discussion on Independent loops statement
Your posts are moderated
Related Questions
Responses Responses  are sent  from the  server to the client. A responses is a three  digit code that  may be followed by additional textual information.

Operating system for Clients All of the clients running popular operating systems such as Microsoft Windows, Mac OS, UNIX, etc., could be used to function as backbone software

It is possible for a datagram to generate ICMP errors after it has been fragmented. For example, suppose that each of two fragments cannot be delivered. Seemingly, this would mean

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th


Enable Wireless Security Step : Configure Windows to use WEP authentication.  Navigate to the Network Connections page again and right-click the Wireless Network Connection

Star Topology   Devoted point-to-point links to central controller (hub)   Controller acts like exchange   Advantages - Less expensive - Robustness   Disadv

Q. Describe the Hardware complexity of Benz Network? Hardware complexity of Benz Network:  Benz network employs lesser switches and it gives good connectivity. To come across h

Shared Programming Using Library Routines The most well-liked of them is the use of combo function called fork() and join(). Fork() function is used to make a new child proces

FAULT TREE ANALYSIS Reliability engineering, in a nutshell is concerned with failures.   How failures occur, how often they occur, and how to minimize them are the basic proble