Declare abstract processor arrays, Computer Engineering

Assignment Help:

Think about call of two intrinsic functions discussed above for a 32-Processor (4×8) Multicomputer:   

The function call NUMBER_OF_PROCESORS () will return 32.                                                    

The function call NUMBER_OF_PROCESORS (1) will return 4.                                                     

The function call NUMBER_OF_PROCESORS (2) will return 8.                                                    

The function call PROCESSORS_SHAPE () would return an array with two elements 4 and 8.

We can employ these intrinsic functions in tandem with HPF directives and array declarations to give flexibility to programmer to declare abstract processor arrays which match available physical resources. E.g. subsequent statement !HPF$ PROCESSORS P(NUMBER_OF_PROCESSORS()) declares abstract processor array P with size equivalent to number of physical processors.


Related Discussions:- Declare abstract processor arrays

Sort, quick sort working

quick sort working

Determine the signed numbers are used in binary arithmetic, When signed num...

When signed numbers are used in binary arithmetic, then which one of the notations would have unique representation for zero ? Ans. When signed numbers are utilized in binary ar

What is asynchronous transmission, What is asynchronous transmission An...

What is asynchronous transmission An asynchronous transmission technique used in many interactive terminals employ special bits. With this method each character consists of thr

Propositional truth tables, Propositional truth tables: There {X\t} is...

Propositional truth tables: There {X\t} is a substitution that replaces all occurances of variable X with a term representing an object t as:  ∀X. A is true if and only

What is the concept of lock, Q. What is the Concept of Lock? Locks are ...

Q. What is the Concept of Lock? Locks are used for protected access of data in a shared variable system.  There are numerous kinds of locks:  1)  Binary Locks: These locks a

Identify the fastest logic gate, Which of the following is the fastest logi...

Which of the following is the fastest logic ECL, TTL, CMOS or LSI ? Ans. The fastest logic is ECL.

How a direct inward dialling is utilized, Direct inward dialling is used as...

Direct inward dialling is used as a feature in? Direct inward dialling is utilized as a feature in EPABX.

Why network layer is used, Network Layer is used for (A)  Breaking up ...

Network Layer is used for (A)  Breaking up the data in frames for transmission (B)  Deal with Error correction (C)  Automatic Recovery of Procedure (D)  Physica

Affective functioning - integrated test result, Mr. X's MMPI suggests that ...

Mr. X's MMPI suggests that he either suppresses anger and hostility or has a naturally low level of anger and hostility (O-H=58, ANG=36, TPA=41, AGGR=36). His responses on the PAS

What layers are covered under end to end layer connectivity, What layers ar...

What layers are covered under end to end layer connectivity? The layers 4 to 7 of ISO-OSI reference model communicate along with peer entities into the end systems. There is n

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd