What is the run time if you use q(n) processes

Assignment Help Basic Computer Science
Reference no: EM131091130

In the parallel formulation of Prim's minimum spanning tree algorithm (Section 10.2), the maximum number of processes that can be used efficiently on a hypercube is Q(n/log n). By using Q(n/log n) processes the run time is Q(n log n). What is the run time if you use Q(n) processes? What is the minimum parallel run time that can be obtained on a message-passing parallel computer? How does this time compare with the run time obtained when you use Q(n/log n) processes?

Reference no: EM131091130

Questions Cloud

Analyze the performance of the parallel formulation : Analyze the performance of the parallel formulation of the modified algorithm on a p-process message-passing architecture.
Does the scalability of this formulation depend : Does the scalability of this formulation depend on the desired efficiency and the architectural characteristics of the machine?
Problems prospectus ofagriculturein begusarai district : Write a Dissertation Project work Problems &prospectus of agriculture in begusarai district It contains following points:- Introduction Geographical features
Continuing professional development : Chapter 16 of the text, Introduction to Teaching, discusses how to succeed in a teacher education program and how to continue to improve one's teaching once someone begins teaching. Submit a 600-word journal entry (not including a title page or r..
What is the run time if you use q(n) processes : What is the minimum parallel run time that can be obtained on a message-passing parallel computer? How does this time compare with the run time obtained when you use Q(n/log n) processes?
How breadth-first ranking of vertices of g can be performed : Show how the breadth-first ranking of vertices of G can be performed on a p-process mesh.
Take either a free version of the myers-briggs : Take either a free version of the Myers-Briggs (Links to an external site.) test or the VALS (Links to an external site.) survey to gain insight into your personality and motivations. Do you agree with the results?
How many processes can be used to update the l values : Describe an algorithm that uses p1 processes to maintain the priority queue.
What is the parallel run time of this formulation : The last element in each sublist has a pointer to the element in the next process. What is the parallel run time and speedup of this formulation? What is the maximum number of processes that it can use?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write in hexadecimal representation

what instructions do they represent - Suppose both signed and unsigned cases. Write them in hexadecimal representation.

  Discuss instantiating a thread in java

What methods are available for managing threads & how do we use them?

  How they can be represented in an er schema diagram

There are several composite keys for section, and some attributes are components of more than one key. Identify three composite keys, and show how they can be represented in an ER schema diagram.

  Determine minimum number of pieces for location of centroid

Determine the minimum number of pieces which can be used in determining location of the centroid? For finiding the centroid of area, two square segments are considered; square ABCD and square DEFG.

  Methods of user-based and user-controlled navigation

Discuss different methods of user-based and user-controlled navigation. Define five common types of links used in a navigation system.

  Managing cyber crime to protect business

Provide a scenario of a cyber crime by way of example that will demonstrate to your business a situation that might occur.

  Keeping the focus on national security concerns

How should government justify telling private industry how to set up or improve their cybersecurity?• Keeping the focus on national security concerns, clearly discuss the compelling sociopolitical reasons, motivations, or arguments for or against gov..

  Explain enterprise architecture using zachman framework

In your opinion, does framework necessarily lead to the top-down approach to development, e.g. you start with models in row 1, then work on row 2 models, and so on?

  What value is the log function sensitive

If x~y(both have values close to each other but not same), then we would expect some cancellation in computing log(x)-log(y). on the other hand, log(x)-log(y)=log(x/y), and the latter involves no cancellation. Does this mean that computing log..

  An issue in computer security is the concept of externality

An issue in computer security is the concept of externality. This is a term from economics. It means the cost of a decision is borne by people other than those taking the decision. For example, in the case of botnets, the 'costs' include (among..

  Write a select statement that returns four columns

Write a Select statement that returns four columns from the Invoices table, named Number, Total, Credits, and Balance

  Create scenario making purchase or develop use case diagram

You are developing the requirements for an online shopping system. To place an order, a user connects to the system, searches to find items to purchase, selects one or more items, and supplies credit card information to pay for them.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd