Independent loops statement, Computer Networking

INDEPENDENT Loops

HPF gives additional opportunities for parallel implementation by using the INDEPENDENT directive to assert that the iterations of a do-loop can be done independently---that is, in any order or concurrently---without affecting the result . In effect, this directive changes a do-loop from an implicitly parallel construct to an explicitly parallel construct.

 The INDEPENDENT directive must instantaneously precede the do-loop to which it applies. In its easiest form, it has no additional argument and asserts simply that no iteration of the do-loop can affect any other iteration.

Example 9

In the following code fragment, the directives indicate that the outer two loops are independent. The inner loop assigns the elements of A repeatedly and hence it is not independent.

!HPF$   INDEPENDENT

do i=1,n1  ! Loop over i independent

!HPF$   INDEPENDENT

do j=1,n2      ! Loop over j independent

do k=1,n3          ! Inner loop not independent

A(i,j) = A(i,j) + B(i,j,k)*C(i,j)

enddo enddo

enddo

Posted Date: 3/2/2013 8:12:47 AM | Location : United States







Related Discussions:- Independent loops statement, Assignment Help, Ask Question on Independent loops statement, Get Answer, Expert's Help, Independent loops statement Discussions

Write discussion on Independent loops statement
Your posts are moderated
Related Questions
Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des

Q. What is network layer of osi model? - Describe end-to-end delivery of packets. - Defines logical addressing thus that any endpoint can be identified. - Defines how ro


Q. Example on Multiplicative Decrease? w = 1 for (each new ACK received) w = w+1 until (loss detected or w >= ssthresh) Not so slow - Exponential increase


The most expensive method of accessing the Internet is to employ leased lines that directly connect to the ISP. This will enhance access rate to anywhere between 64 K and 1.5 Mbps,

Triggers are special user defined actions usually in the form of stored procedures, that are automatically requested by the server based on data related events. It can perform diff

Q. What is Shielded Twisted Pair? - A metal foil or braided-mesh covering encases every pair of insulated conductors to prevent electromagnetic noise called crosstalk - Cros

Name the types of OSPF Configuration? Ans) There are Two Types of OSPF configuration A ) SINGLE AREA b) MULTI AREA

Question: (a) Explain and illustrate different architectures for IEEE802.11 (WiFi). (b) The MAC management of IEEE802.11 handles transmitter activity for power management.