Computers and Technology

Consider the following technique for performing the compare-split operation. Let x1 , x2 , ..., xk be the elements stored at process Pi in increasing order, and let y1 , y2 , ..., yk be the elements stored at process Pj in decreasing order. Process Pi sends x1 to Pj . Process Pj compares x1 with y1 and then sends the larger element back to process Pi and keeps the smaller element for itself. The same procedure is repeated for pairs (x 2 , y2 ), (x3 , y3 ), ..., (xk , yk ). If for any pair (xl , yl ) for 1≤ l≤ k , xl yl , then no more exchanges are needed. Finally, each process sorts its elements.

Required:
a. Show that this method correctly performs a compare-split operation.
b. Analyze its run time, and compare the relative merits of this method to those of the method presented in the text.
c. Is this method better suited for MIMD or SIMD parallel computers?

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:20, Masielovebug
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
image
Computers and Technology, 22.06.2019 11:30, jcazares3558
Awell-diversified portfolio needs about 20-25 stocks from different categories.
Answers: 2
image
Computers and Technology, 22.06.2019 19:30, 710jonathan
The following is an excerpt from a slide presentation. today we will inverse operations solving equations using inverse operations solving inequalities using inverse operations from which part of the presentation does the slide most likely come from? a. introduction b. outline c. body d. conclusion
Answers: 1
image
Computers and Technology, 23.06.2019 00:30, hannahrasco4051
Pl i need the answer now ! which one of the following is considered a peripheral? a software b mouse c usb connector d motherboard
Answers: 1
Do you know the correct answer?
Consider the following technique for performing the compare-split operation. Let x1 , x2 , ..., xk b...

Questions in other subjects:

Konu
English, 06.01.2020 15:31
Konu
Computers and Technology, 06.01.2020 15:31
Konu
Mathematics, 06.01.2020 15:31