Comment on the performance and scalability of this scheme

Assignment Help Basic Computer Science
Reference no: EM131091093

[FK88] Consider the distributed tree search scheme in which processors are allocated to separate parts of the search tree dynamically. Initially, all the processors are assigned to the root. When the root node is expanded (by one of the processors assigned to it), disjoint subsets of processors at the root are assigned to each successor, in accordance with a selected processor-allocation strategy. One possible processorallocation strategy is to divide the processors equally among ancestor nodes. This process continues until there is only one processor assigned to a node. At this time, the processor searches the tree rooted at the node sequentially. If a processor finishes searching the search tree rooted at the node, it is reassigned to its parent node. If the parent node has other successor nodes still being explored, then this processor is allocated to one of them. Otherwise, the processor is assigned to its parent. This process continues until the entire tree is searched. Comment on the performance and scalability of this scheme.

Reference no: EM131091093

Questions Cloud

Word critical analysis of the chosen topic : The article and the two documentries is about doping in sports and focuses on the cases of Lance Armstrong and Marion Jones--two atheltes who were found guilty of using performance enhancing drugs, but suffered two very different consequences.
Complete a series of substitution values vertically : We have combined three chapters in Excel for this project: Excel - CH06: What-If Analysis, Excel - CH09: Multiple-Sheet Workbook Management, and Excel – CH12: Templates, Styles and Macros.
Goal reflections checklist : The UNST definition of this goal either incorporated into your narrative or quoted above your reflection.
Derive the isoefficiency function of this scheme : derive the isoefficiency function of this scheme.
Comment on the performance and scalability of this scheme : Comment on the performance and scalability of this scheme.
Derive analytical expressions for the scalability : Assume that the cost of communicating a piece of work between any two processors is negligible. Derive analytical expressions for the scalability of the single-level loadbalancing scheme.
Discuss the empirical rule in this context : If you look up the word empirical in a dictionary, you will find that it means "relying on experiment and observation rather than on theory." Discuss the empirical rule in this context.
Determine the isoefficiency term due to this termination : Determine the isoefficiency term due to this termination detection scheme for a spanning tree of depth log p.
Comment on the value of the constants associated : Comment on the value of the constants associated with this isoefficiency term

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Program to demonstrate your work

Modify the prior class to include try catch finally block. You need to tell me where you implemented the try catch block and why? (Hint you can implement the try catch on the test program level, super class level or the sub class level)

  Create an executable file and enable set-user-id permission

Log in as a normal, unprivileged user, create an executable file (or copy an existing file such as /bin/sleep), and enable the set-user-ID permission bit on that file (chmod u+s). Try modifying the file (e.g., cat >> file). What happens to the fil..

  Secure data access and encryption of a patientdatabase

OverviewIn this lab, you implemented policies that map to the Sarbanes-Oxley Act (SOX), the PaymentCard Industry Data Security Standard (PCI-DSS), and the Health Insurance Portability andAccountability Act (HIPAA). You ensured secure data acce..

  The reflexive closure of r has how many elements

For this question let:A = {a, b, c, d} and R is a subset of A * A where, R = {(a, a), (b,b), (c, c), (a, b), (b, c), (c, d), (d, c)} a) The reflexive closure of R has how many elements? b) The symmetric closure of R has how many elements? c) The tran..

  Create a script that presents a movie guessing game

create a script that presents a Movie guessing game. Allow the users to guess the best picture award from last year. Allow them to guess the word letter-by-letter by entering a character in a form.

  In html write code for input one number in a input box

in HTML I need the user to input one number in a input box, and another in another input box. Press a button, and have it display in another box.

  Find the company with the smallest payroll

Find the company with the smallest payroll.

  What are the 10 most important things

What are the 10 most important things I need to know about learning The basics of C++ ?

  Explain classic five-stage risc integer pipeline

Assume that the initial value of R3 is R2 + 496. Use the classic five-stage RISC integer pipeline and assume all memory accesses take 1 clock cycle.

  Identify and describe any potential ethical issues

Identify and describe any potential ethical issues that could arise in connection with the new architecture.

  Transposition technique to encrypt a message

You have been hired by a local company to consult with its security staff on encryption techniques. The staff has not been formally trained, so you will be demonstrating the principles of encryption through some simple exercises.Use a 2-stage transpo..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd