Comment on the performance and scalability of this scheme

Assignment Help Basic Computer Science
Reference no: EM131091093

[FK88] Consider the distributed tree search scheme in which processors are allocated to separate parts of the search tree dynamically. Initially, all the processors are assigned to the root. When the root node is expanded (by one of the processors assigned to it), disjoint subsets of processors at the root are assigned to each successor, in accordance with a selected processor-allocation strategy. One possible processorallocation strategy is to divide the processors equally among ancestor nodes. This process continues until there is only one processor assigned to a node. At this time, the processor searches the tree rooted at the node sequentially. If a processor finishes searching the search tree rooted at the node, it is reassigned to its parent node. If the parent node has other successor nodes still being explored, then this processor is allocated to one of them. Otherwise, the processor is assigned to its parent. This process continues until the entire tree is searched. Comment on the performance and scalability of this scheme.

Reference no: EM131091093

Questions Cloud

Word critical analysis of the chosen topic : The article and the two documentries is about doping in sports and focuses on the cases of Lance Armstrong and Marion Jones--two atheltes who were found guilty of using performance enhancing drugs, but suffered two very different consequences.
Complete a series of substitution values vertically : We have combined three chapters in Excel for this project: Excel - CH06: What-If Analysis, Excel - CH09: Multiple-Sheet Workbook Management, and Excel – CH12: Templates, Styles and Macros.
Goal reflections checklist : The UNST definition of this goal either incorporated into your narrative or quoted above your reflection.
Derive the isoefficiency function of this scheme : derive the isoefficiency function of this scheme.
Comment on the performance and scalability of this scheme : Comment on the performance and scalability of this scheme.
Derive analytical expressions for the scalability : Assume that the cost of communicating a piece of work between any two processors is negligible. Derive analytical expressions for the scalability of the single-level loadbalancing scheme.
Discuss the empirical rule in this context : If you look up the word empirical in a dictionary, you will find that it means "relying on experiment and observation rather than on theory." Discuss the empirical rule in this context.
Determine the isoefficiency term due to this termination : Determine the isoefficiency term due to this termination detection scheme for a spanning tree of depth log p.
Comment on the value of the constants associated : Comment on the value of the constants associated with this isoefficiency term

Reviews

Write a Review

Basic Computer Science Questions & Answers

  A boolean matrix has the parity property

A Boolean matrix has the parity property when each row and each column has an even sum, i.e. contains an even number of bits which are set. Here's a 4 x 4 matrix which has the parity property:

  Preparing simple er diagram or schema

Composite and multi-valued attributes can be nested to any number of levels. Suppose we want to design an attribute (one attribute) for a STUDENT entity type to keep track of previous college education.

  Assignment on ethical issues in information systems

Question 1:Summarize the issue that you have chosen. Question 2: Express your own opinion of, or position on, the issue that you have chosen. Question 3: Identify two to three (2-3) human and technological protective measures that you would use as ..

  Write all possible topological orders for the vertices

Write all possible topological orders for the vertices in this new graph.

  The most important income distribution decisions t

The Lorenz curve is a relative measure of income. This becomes obvious when one compares Lorenz curves between nations.  The after-transfer income distribution is the Lorenz curve closest to the diagonal line. Since transfers favor the poor, they cau..

  Determine access time when there is cache miss

Determine the access time when there is cache miss? Suppose that cache waits until line has been fetched from main memory and then re-executes for hit.

  Design an enhanced entity relationship

Develop, document and design an Enhanced Entity Relationship (EER) model for this situation.  You are working for country club with thousands of members. You have been tasked with designing a database to keep track of the members and their guests.

  What modifications to the previous programming problem

Write a C++ class derived from Graph Interface, as given in Listing 20-1. Use an adjacency matrix to represent the graph.

  Find an encryption utility onyour system

Read its documentation and experiment with it. Measure how fast it is able to encrypt and decrypt data. Are these two rates the same? Try to compare these timing results using different key sizes; for example, compare single-DES with triple-DES.

  Have the spammers tried to hide their identity

What are the common characteristics of these spam emails. Have the spammers tried to hide their identity

  Continuations in place of exceptions

In addition to continuations that represent the "normal" continued execution of a program, we can use continuations in place of exceptions. For example, consider the following function f that raises an exception when the argument x is too small:

  What potential consequences would an organization face if

powerpoint 5 slides not including first and last 250 speaker notes more than 2 references1. what are the definitions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd