Independent loops statement, Computer Networking

INDEPENDENT Loops

HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done independently---that is, in any order or concurrently---without affecting the result . In effect, this directive changes a do-loop from an implicitly parallel construct to an explicitly parallel construct.

 The INDEPENDENT directive must instantaneously precede the do-loop to which it applies. In its easiest form, it has no additional argument and asserts simply that no iteration of the do-loop can affect any other iteration.

Example 9

In the following code fragment, the directives indicate that the outer two loops are independent. The inner loop assigns the elements of A repeatedly and hence it is not independent.

!HPF$   INDEPENDENT

do i=1,n1  ! Loop over i independent

!HPF$   INDEPENDENT

do j=1,n2      ! Loop over j independent

do k=1,n3          ! Inner loop not independent

A(i,j) = A(i,j) + B(i,j,k)*C(i,j)

enddo enddo

enddo

Posted Date: 3/2/2013 8:12:47 AM | Location : United States







Related Discussions:- Independent loops statement, Assignment Help, Ask Question on Independent loops statement, Get Answer, Expert's Help, Independent loops statement Discussions

Write discussion on Independent loops statement
Your posts are moderated
Related Questions
Define the uses of Intranet Intranet can largely eliminate paper-based documents, which otherwise become outdated over passage of time. Increased communication will also lead t

Q. Show the Communication between Switches? Communication between Switches - Must know which station belongs to which VLAN as well as membership of stations connected to

1.  A virtual memory system has a virtual address space of 4 Gigabytes and a page size of 8 Kilobytes.  Each page table entry occupies 4 bytes.   a)  How many bits remain unchanged

What is difference among routing and routed protocols? Ans) i) Routing use for top path selection ii) Routed protocol carries on source and destination information.

what is a WAN

Can you describe the RPC and Client server Architecture?

Used in IP Networks to break up larger networks into slighter subnetworks. It is used to decrease network traffic, Optimized network performance, and make simpler management i.e. t

Path Layer The path  layer maps services  such as DS3, FDDI, and ATM into the SONET  payload formal. This layer  provides  end to end  communications  signals  labelling path m

What is Stateful Multi-Layer Inspection (SMLI) They are considered as the third generation of firewall technology and usually combine the facilities of the above two. They are

Calculate the Network Address, the broadcast address and the host range, for the following host address i. 192.168.180.94/27 ii. 172.23.8.19 /21 iii. 147.252.238.20 255.255.240.0 b