SlideShare uma empresa Scribd logo
1 de 25
CHAPTER 12 Parallel and Distributed Algorithms
Algorithm 12.1.1 Maximum This algorithm returns the maximum value in array  a [0], ... ,  a [ n  - 1]. The value of  a . length  is the number of elements in the array. Input Parameters:  a Output Parameters: None maximum ( a ) { n  =  a . length current_max  =  a [0] for  i  = 1 to  n  - 1 if ( a [ i ] >  current_max ) current_max  =  a [ i ] return  current_max }
Algorithm 12.2.2 Parallel Search Given an array  a  of size  n  and a number  x , this algorithm searches for  x  in  a  and returns true if there is an  i  such that  a [ i ] =  x  and false otherwise. Input Parameters:  a , x Output Parameters: None parallel_search ( a , x ) { n  =  a . length found  = false for  i  = 0 to  n  - 1 in parallel if ( a [ i ] ==  x ) found  = true return  found }
Algorithm 12.2.4 Locate Given an array  a  and a value  x , the algorithm returns an index  i   such that  a [ i ] =  x  if there is one, and -1 otherwise. Input Parameters:  a , x Output Parameters: None locate ( a , x ) { n  =  a . length location  = -1 found  = false for  i  = 0 to  n  - 1 in parallel if ( a [ i ] ==  x ) location  =  i return  location }
Cache Coherence Problem What value does  a [ i ] contain, after performing this code? n  =  a . length x  = 0 for  i  = 0 to  n  in parallel if ( i  ==  n ) x  = 1 else a [ i ] =  x
Algorithm 12.2.5 ER Broadcast This algorithm takes as input a value  x  and an array  a  and assigns  x  to all elements of the array. Input Parameters:  a , x Output Parameters: None er_broadcast ( a , x ) { n  =   a . length a [0] =  x for  i  = 0 to   lg  n   - 1 for  j  = 0 to 2 i   -  1 in parallel if (2 i  +  j  <  n ) a [2 i  +  j  ] =  a [ j ] }
Algorithm 12.2.11 Sequential   -Sum This algorithm computes  given an array  a  as input. Input Parameters:  a , x Output Parameters: None sequential _  _ sum ( a ) { n  =  a . length current_sum  =  a [0] for  i  = 1 to  n  - 1 current_sum  =  current_sum      a [ i ] return  current_sum }
Algorithm 12.2.12 Parallel   -Sum This EREW algorithm computes  given an array  a  as input. Input Parameters:  a , x Output Parameters: None parallel _  _ sum ( a ) { n  =  a . length for  i  = 0 to   lg  n   - 1 for  j  = 0 to   n /2 i+1    - 1 in parallel if ( j  * 2 i+1  + 2 i  <  n ) a [ j  * 2 i+1  + 2 i ] =  a [ j  * 2 i+1  + 2 i ]     a [ j  * 2 i+1  + 2 i ] return  a [0] }
Algorithm 12.2.16 Optimal   -Sum This algorithm computes  given an array  a  as input.
Input Parameters:  a Output Parameters: None optimal _  _ sum ( a ) { n  =  a . length blocksize  = 2  lg lg  n    // first, compute    sum of all blocks of  // size  blocksize  ≈ lg  n for  i  = 0 to   n / blocksize   in parallel { base  =  i  *  blocksize for  j  = 1 to  blocksize  - 1 if ( base  +  j  <  n ) a [ base ] =  a [ base ]     a [ base  +  j ] } // second, compute the    sum of the remaining  //   n / blocksize   elements for  i  = lg  blocksize  to   lg  n   - 1 for  j  = 0 to   n /2 i+1    - 1 in parallel if ( j  * 2 i+1  + 2 i  <  n ) a [ j  * 2 i+1  + 2 i ] =  a [ j  * 2 i+1  + 2 i ]     a [ j  * 2 i+1  + 2 i ] return  a [0] }
Algorithm 12.2.20 Optimal ER Broadcast This algorithm takes as input a value  x  and an array  a  and assigns  x  to all elements of the array.
Input Parameters:  a , x Output Parameters: None optimal_er_broadcast ( a , x ) { n  =  a . length n  =   n /lg  n  a [0] =  x // Use  er_broadcast to fill the first  n ’ cells of  a  with  x for  i  = 0 to   lg  n ’   - 1 for  j  = 0 to 2 i  - 1 in parallel if (2 i  +  j  <  n ’) a [2 i  + j ] =  a [ j ] // Spread the contents using  n  processors // each performing the sequential algorithm for  i  = 1 to   lg  n  for  j  = 0 to  n ’ - 1 in parallel if ( i  ×  n ’ +  j  <  n ) a [ i  ×  n ’ +  j ] =  a [ j ] }
Algorithm 12.2.25 Sequential Prefix This algorithm computes the prefixes  for all 0  ≤  k  <  n  given an  n -element array  a  as input. Input Parameters:  a Output Parameters: None sequential _ prefix ( a ) { n  =  a . length sum [0]  = a [0] for  i  = 0 to  n  - 1 sum [ i ] =  sum [ i  – 1]     a [ i ] }
Algorithm 12.2.26 Parallel Prefix This algorithm computes the prefixes  for all 0  ≤  k  <  n  given an  n -element array  a  as input. Input Parameters:  a Output Parameters: None parallel _ prefix ( a ) { n  =  a . length for  i  = 0 to  n  - 1 sum [ j ] =  a [ j ] for  i  = 0 to   lg  n  for  j  = 0 to n   - 1 in parallel if ( j  + 2 i  <  n ) sum [ j  + 2 i ] =  sum [ j ]     sum [ j  + 2 i ] }
Algorithm 12.2.31 Sequential List Ranking This algorithm takes as an input the first node  u  of a linked list. Each node has fields  next , the next node of the list or null for the last node in the list, and  rank , which is assigned the distance of the node from the end of the list. Input Parameters:  u Output Parameters: None sequential_list_ranking ( u ) { n  = 0 // counter for total number of nodes node  =  u while ( node  ! = null) { n  =  n  + 1 node  =  node . next } node  =  u  // start again at the beginning while ( node  ! = null) { node . rank  =  n n  =  n  - 1 node  =  node . next } }
Algorithm 12.2.32 List Ranking This algorithm takes as an input the first node  u  of a linked list  L ( u ). Each node has fields  next , the next node of the list or null for the last node in the list, and  rank , which is assigned the distance of the node from the end of the list.
Input Parameters:  u Output Parameters: None list_ranking(u) { for each  node  in  L ( u ) in parallel node . rank  = 1 done  = false do { for each  node  in  L ( u ) in parallel if ( node . next  == null) done  = true else { node . rank  =  node . rank  +  node . next . rank node . next  =  node . next . next } } while (! done ) }
Algorithm 12.4.11 Minimum Label This algorithm takes as input a two-dimensional array  a  with indexes ranging from 0 to  n  + 1. Every element of the array contains fields  color  and  label . The color field of elements in rows and columns with indexes 0 or  n  + 1 is assumed to be zero.  The algorithm computes a component labeling for  a  and stores it in the label  field .
Input Parameters:  a , n Output Parameters: None minimum_label ( a , n ) { // initialize the label field of // every black pixel to a unique value for  i , j     {1, ... ,  n } in parallel if ( a [ i , j ]. color  == 1) a [ i , j ]. label  =  i  ×  n  +  j else   a [ i , j ]. label  = 0 // perform the second step on // every label  n 2  times for  k  = 1 to  n 2 for  i , j     {1, ... ,  n } in parallel for  x  =  i  - 1 to  i  + 1 for  y  =  j  - 1 to  j  + 1 if ( a [ x , y ]. color  == 1)   a [ i , j ]. label  =  min( a [ i , j ]. label ,  a [ x , y ]. label ) }
Algorithm 12.5.2 Ring Broadcast This algorithm is run on a ring network. The initiator runs  init_ring_broadcast , and the noninitiators run  ring_broadcast .  All processors terminate successfully after having received a message from the initiator. init_ring_broadcast () { send  token  to successor receive  token  from predecessor terminate } ring_broadcast () { receive  token  from predecessor send  token  to successor terminate }
Algorithm 12.5.4 Broadcast This algorithm works on any (fixed) connected network. The initiator runs  init_broadcast  and the noninitiators  broadcast . All processors terminate successfully after having received a message from the initiator. In the algorithms we assume that the current machine we are running the code on is called  p . init_broadcast () { N  = { q  |  q  is a neighbor of  p } for each  q      N send  token  to neighbor  q terminate } broadcast () { receive  token  from neighbor  q N  = { q  |  q  is a neighbor of  p } for each  q      N send  token  to neighbor  q terminate }
Algorithm 12.5.5 Echo This algorithm works on any (fixed) connected network. The initiator runs  init_echo  and the noninitiators  echo . All processors terminate successfully after having received a message from the initiator. The initiator terminates after all processors have received its message. The machine on which we are running the code is called  p . init_echo () { N  = { q  |  q  is a neighbor of  p } for each  q      N send  token  to neighbor  q counter  = 0 while ( counter  < | N |) { receive  token counter ++ } terminate }
echo () { receive  token  from neighbor  q parent  =  q N  = { q  |  q  is a neighbor of  p } - { parent } for each  q      N send  token  to neighbor  q counter  = 0 while ( counter  < | N |) { receive  token counter ++ } send token to neighbor parent terminate }
Algorithm 12.5.9 Leader Election This algorithm runs on the unidirectional ring. The initiators run  init_election  and the noninitiators run  election . All processors terminate successfully, and exactly one initiator has its  leader  attribute set to true. In the algorithms, we assume that the current machine we are running the code on is called  p . Every processor has a next neighbor,  p . next , to which it can send messages.
init_election() { send     token , p . ID    to  p . next min  =  p . ID receive     token , I      while ( p . ID  !=  I ) { if ( I  <  min ) min  =  I send     token , I     to  p . next receive     token , I      } if ( p . ID  ==  min ) p . leader  = true else p . leader  = false terminate } election () { p . leader  = false // noninitiator is never chosen as leader do { receive     token , I      send     token , I     to  p . next } while (true) }

Mais conteúdo relacionado

Mais procurados

Algorithm Design and Complexity - Course 5
Algorithm Design and Complexity - Course 5Algorithm Design and Complexity - Course 5
Algorithm Design and Complexity - Course 5
Traian Rebedea
 
Dsp manual completed2
Dsp manual completed2Dsp manual completed2
Dsp manual completed2
bilawalali74
 

Mais procurados (19)

algorithm Unit 2
algorithm Unit 2 algorithm Unit 2
algorithm Unit 2
 
Algorithm Design and Complexity - Course 5
Algorithm Design and Complexity - Course 5Algorithm Design and Complexity - Course 5
Algorithm Design and Complexity - Course 5
 
Divide and Conquer
Divide and ConquerDivide and Conquer
Divide and Conquer
 
Alg1
Alg1Alg1
Alg1
 
Chapter 3 Arrays in Java
Chapter 3 Arrays in JavaChapter 3 Arrays in Java
Chapter 3 Arrays in Java
 
Digital Signal Processing Lab Manual ECE students
Digital Signal Processing Lab Manual ECE studentsDigital Signal Processing Lab Manual ECE students
Digital Signal Processing Lab Manual ECE students
 
Dsp manual completed2
Dsp manual completed2Dsp manual completed2
Dsp manual completed2
 
Introducción al Análisis y diseño de algoritmos
Introducción al Análisis y diseño de algoritmosIntroducción al Análisis y diseño de algoritmos
Introducción al Análisis y diseño de algoritmos
 
Linear Convolution using Matlab Code
Linear Convolution  using Matlab CodeLinear Convolution  using Matlab Code
Linear Convolution using Matlab Code
 
(chapter 4) A Concise and Practical Introduction to Programming Algorithms in...
(chapter 4) A Concise and Practical Introduction to Programming Algorithms in...(chapter 4) A Concise and Practical Introduction to Programming Algorithms in...
(chapter 4) A Concise and Practical Introduction to Programming Algorithms in...
 
DFT and IDFT Matlab Code
DFT and IDFT Matlab CodeDFT and IDFT Matlab Code
DFT and IDFT Matlab Code
 
Algorithm Design and Complexity - Course 4 - Heaps and Dynamic Progamming
Algorithm Design and Complexity - Course 4 - Heaps and Dynamic ProgammingAlgorithm Design and Complexity - Course 4 - Heaps and Dynamic Progamming
Algorithm Design and Complexity - Course 4 - Heaps and Dynamic Progamming
 
Chapter 4 - Classes in Java
Chapter 4 - Classes in JavaChapter 4 - Classes in Java
Chapter 4 - Classes in Java
 
Machnical Engineering Assignment Help
Machnical Engineering Assignment HelpMachnical Engineering Assignment Help
Machnical Engineering Assignment Help
 
Extractors & Implicit conversions
Extractors & Implicit conversionsExtractors & Implicit conversions
Extractors & Implicit conversions
 
Mechanical Engineering Homework Help
Mechanical Engineering Homework HelpMechanical Engineering Homework Help
Mechanical Engineering Homework Help
 
DCDR
DCDRDCDR
DCDR
 
بررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارش
بررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارشبررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارش
بررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارش
 
Algorithm Design and Complexity - Course 1&2
Algorithm Design and Complexity - Course 1&2Algorithm Design and Complexity - Course 1&2
Algorithm Design and Complexity - Course 1&2
 

Destaque (9)

Lecture3
Lecture3Lecture3
Lecture3
 
Parallel and Distributed Algorithms for Large Text Datasets Analysis
Parallel and Distributed Algorithms for Large Text Datasets AnalysisParallel and Distributed Algorithms for Large Text Datasets Analysis
Parallel and Distributed Algorithms for Large Text Datasets Analysis
 
Lecture1
Lecture1Lecture1
Lecture1
 
Lecture6
Lecture6Lecture6
Lecture6
 
Lecture5
Lecture5Lecture5
Lecture5
 
Lecture2
Lecture2Lecture2
Lecture2
 
Lecture4
Lecture4Lecture4
Lecture4
 
Advanced full text searching techniques using Lucene
Advanced full text searching techniques using LuceneAdvanced full text searching techniques using Lucene
Advanced full text searching techniques using Lucene
 
seminar report on Li-Fi Technology
seminar report on Li-Fi Technologyseminar report on Li-Fi Technology
seminar report on Li-Fi Technology
 

Semelhante a Chap12alg

Advanced Datastructures and algorithms CP4151unit1b.pdf
Advanced Datastructures and algorithms CP4151unit1b.pdfAdvanced Datastructures and algorithms CP4151unit1b.pdf
Advanced Datastructures and algorithms CP4151unit1b.pdf
Sheba41
 

Semelhante a Chap12alg (20)

Chap08alg
Chap08algChap08alg
Chap08alg
 
Chap07alg
Chap07algChap07alg
Chap07alg
 
Chap07alg
Chap07algChap07alg
Chap07alg
 
Chap05alg
Chap05algChap05alg
Chap05alg
 
Chap05alg
Chap05algChap05alg
Chap05alg
 
Ada notes
Ada notesAda notes
Ada notes
 
Chap06alg
Chap06algChap06alg
Chap06alg
 
Chap06alg
Chap06algChap06alg
Chap06alg
 
Cs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer keyCs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer key
 
Lect-2.pptx
Lect-2.pptxLect-2.pptx
Lect-2.pptx
 
Chap03alg
Chap03algChap03alg
Chap03alg
 
Chap03alg
Chap03algChap03alg
Chap03alg
 
Data structure 8.pptx
Data structure 8.pptxData structure 8.pptx
Data structure 8.pptx
 
01 - DAA - PPT.pptx
01 - DAA - PPT.pptx01 - DAA - PPT.pptx
01 - DAA - PPT.pptx
 
Advanced Datastructures and algorithms CP4151unit1b.pdf
Advanced Datastructures and algorithms CP4151unit1b.pdfAdvanced Datastructures and algorithms CP4151unit1b.pdf
Advanced Datastructures and algorithms CP4151unit1b.pdf
 
Line Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - NotesLine Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - Notes
 
21-algorithms.ppt
21-algorithms.ppt21-algorithms.ppt
21-algorithms.ppt
 
cgrchapter2version-1-200729063505 (1).pdf
cgrchapter2version-1-200729063505 (1).pdfcgrchapter2version-1-200729063505 (1).pdf
cgrchapter2version-1-200729063505 (1).pdf
 
21-algorithms (1).ppt
21-algorithms (1).ppt21-algorithms (1).ppt
21-algorithms (1).ppt
 
Mid point line Algorithm - Computer Graphics
Mid point line Algorithm - Computer GraphicsMid point line Algorithm - Computer Graphics
Mid point line Algorithm - Computer Graphics
 

Mais de Munkhchimeg (20)

Protsesor
ProtsesorProtsesor
Protsesor
 
Lecture916
Lecture916Lecture916
Lecture916
 
Lecture915
Lecture915Lecture915
Lecture915
 
Lecture914
Lecture914Lecture914
Lecture914
 
Lecture913
Lecture913Lecture913
Lecture913
 
Lecture911
Lecture911Lecture911
Lecture911
 
Lecture912
Lecture912Lecture912
Lecture912
 
Lecture910
Lecture910Lecture910
Lecture910
 
Lecture5
Lecture5Lecture5
Lecture5
 
Lecture9
Lecture9Lecture9
Lecture9
 
Lecture8
Lecture8Lecture8
Lecture8
 
Lecture7
Lecture7Lecture7
Lecture7
 
Lecture6
Lecture6Lecture6
Lecture6
 
Lecture4
Lecture4Lecture4
Lecture4
 
Lecture3
Lecture3Lecture3
Lecture3
 
Ded Algorithm
Ded AlgorithmDed Algorithm
Ded Algorithm
 
Ded Algorithm1
Ded Algorithm1Ded Algorithm1
Ded Algorithm1
 
Tobch Lecture
Tobch LectureTobch Lecture
Tobch Lecture
 
Lecture914
Lecture914Lecture914
Lecture914
 
Tobch Lecture
Tobch LectureTobch Lecture
Tobch Lecture
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Chap12alg

  • 1. CHAPTER 12 Parallel and Distributed Algorithms
  • 2. Algorithm 12.1.1 Maximum This algorithm returns the maximum value in array a [0], ... , a [ n - 1]. The value of a . length is the number of elements in the array. Input Parameters: a Output Parameters: None maximum ( a ) { n = a . length current_max = a [0] for i = 1 to n - 1 if ( a [ i ] > current_max ) current_max = a [ i ] return current_max }
  • 3. Algorithm 12.2.2 Parallel Search Given an array a of size n and a number x , this algorithm searches for x in a and returns true if there is an i such that a [ i ] = x and false otherwise. Input Parameters: a , x Output Parameters: None parallel_search ( a , x ) { n = a . length found = false for i = 0 to n - 1 in parallel if ( a [ i ] == x ) found = true return found }
  • 4. Algorithm 12.2.4 Locate Given an array a and a value x , the algorithm returns an index i such that a [ i ] = x if there is one, and -1 otherwise. Input Parameters: a , x Output Parameters: None locate ( a , x ) { n = a . length location = -1 found = false for i = 0 to n - 1 in parallel if ( a [ i ] == x ) location = i return location }
  • 5. Cache Coherence Problem What value does a [ i ] contain, after performing this code? n = a . length x = 0 for i = 0 to n in parallel if ( i == n ) x = 1 else a [ i ] = x
  • 6. Algorithm 12.2.5 ER Broadcast This algorithm takes as input a value x and an array a and assigns x to all elements of the array. Input Parameters: a , x Output Parameters: None er_broadcast ( a , x ) { n = a . length a [0] = x for i = 0 to  lg n  - 1 for j = 0 to 2 i - 1 in parallel if (2 i + j < n ) a [2 i + j ] = a [ j ] }
  • 7. Algorithm 12.2.11 Sequential  -Sum This algorithm computes given an array a as input. Input Parameters: a , x Output Parameters: None sequential _  _ sum ( a ) { n = a . length current_sum = a [0] for i = 1 to n - 1 current_sum = current_sum  a [ i ] return current_sum }
  • 8. Algorithm 12.2.12 Parallel  -Sum This EREW algorithm computes given an array a as input. Input Parameters: a , x Output Parameters: None parallel _  _ sum ( a ) { n = a . length for i = 0 to  lg n  - 1 for j = 0 to  n /2 i+1  - 1 in parallel if ( j * 2 i+1 + 2 i < n ) a [ j * 2 i+1 + 2 i ] = a [ j * 2 i+1 + 2 i ]  a [ j * 2 i+1 + 2 i ] return a [0] }
  • 9. Algorithm 12.2.16 Optimal  -Sum This algorithm computes given an array a as input.
  • 10. Input Parameters: a Output Parameters: None optimal _  _ sum ( a ) { n = a . length blocksize = 2  lg lg n  // first, compute  sum of all blocks of // size blocksize ≈ lg n for i = 0 to  n / blocksize  in parallel { base = i * blocksize for j = 1 to blocksize - 1 if ( base + j < n ) a [ base ] = a [ base ]  a [ base + j ] } // second, compute the  sum of the remaining //  n / blocksize  elements for i = lg blocksize to  lg n  - 1 for j = 0 to  n /2 i+1  - 1 in parallel if ( j * 2 i+1 + 2 i < n ) a [ j * 2 i+1 + 2 i ] = a [ j * 2 i+1 + 2 i ]  a [ j * 2 i+1 + 2 i ] return a [0] }
  • 11. Algorithm 12.2.20 Optimal ER Broadcast This algorithm takes as input a value x and an array a and assigns x to all elements of the array.
  • 12. Input Parameters: a , x Output Parameters: None optimal_er_broadcast ( a , x ) { n = a . length n =  n /lg n  a [0] = x // Use er_broadcast to fill the first n ’ cells of a with x for i = 0 to  lg n ’  - 1 for j = 0 to 2 i - 1 in parallel if (2 i + j < n ’) a [2 i + j ] = a [ j ] // Spread the contents using n processors // each performing the sequential algorithm for i = 1 to  lg n  for j = 0 to n ’ - 1 in parallel if ( i × n ’ + j < n ) a [ i × n ’ + j ] = a [ j ] }
  • 13. Algorithm 12.2.25 Sequential Prefix This algorithm computes the prefixes for all 0 ≤ k < n given an n -element array a as input. Input Parameters: a Output Parameters: None sequential _ prefix ( a ) { n = a . length sum [0] = a [0] for i = 0 to n - 1 sum [ i ] = sum [ i – 1]  a [ i ] }
  • 14. Algorithm 12.2.26 Parallel Prefix This algorithm computes the prefixes for all 0 ≤ k < n given an n -element array a as input. Input Parameters: a Output Parameters: None parallel _ prefix ( a ) { n = a . length for i = 0 to n - 1 sum [ j ] = a [ j ] for i = 0 to  lg n  for j = 0 to n - 1 in parallel if ( j + 2 i < n ) sum [ j + 2 i ] = sum [ j ]  sum [ j + 2 i ] }
  • 15. Algorithm 12.2.31 Sequential List Ranking This algorithm takes as an input the first node u of a linked list. Each node has fields next , the next node of the list or null for the last node in the list, and rank , which is assigned the distance of the node from the end of the list. Input Parameters: u Output Parameters: None sequential_list_ranking ( u ) { n = 0 // counter for total number of nodes node = u while ( node ! = null) { n = n + 1 node = node . next } node = u // start again at the beginning while ( node ! = null) { node . rank = n n = n - 1 node = node . next } }
  • 16. Algorithm 12.2.32 List Ranking This algorithm takes as an input the first node u of a linked list L ( u ). Each node has fields next , the next node of the list or null for the last node in the list, and rank , which is assigned the distance of the node from the end of the list.
  • 17. Input Parameters: u Output Parameters: None list_ranking(u) { for each node in L ( u ) in parallel node . rank = 1 done = false do { for each node in L ( u ) in parallel if ( node . next == null) done = true else { node . rank = node . rank + node . next . rank node . next = node . next . next } } while (! done ) }
  • 18. Algorithm 12.4.11 Minimum Label This algorithm takes as input a two-dimensional array a with indexes ranging from 0 to n + 1. Every element of the array contains fields color and label . The color field of elements in rows and columns with indexes 0 or n + 1 is assumed to be zero. The algorithm computes a component labeling for a and stores it in the label field .
  • 19. Input Parameters: a , n Output Parameters: None minimum_label ( a , n ) { // initialize the label field of // every black pixel to a unique value for i , j  {1, ... , n } in parallel if ( a [ i , j ]. color == 1) a [ i , j ]. label = i × n + j else a [ i , j ]. label = 0 // perform the second step on // every label n 2 times for k = 1 to n 2 for i , j  {1, ... , n } in parallel for x = i - 1 to i + 1 for y = j - 1 to j + 1 if ( a [ x , y ]. color == 1) a [ i , j ]. label = min( a [ i , j ]. label , a [ x , y ]. label ) }
  • 20. Algorithm 12.5.2 Ring Broadcast This algorithm is run on a ring network. The initiator runs init_ring_broadcast , and the noninitiators run ring_broadcast . All processors terminate successfully after having received a message from the initiator. init_ring_broadcast () { send token to successor receive token from predecessor terminate } ring_broadcast () { receive token from predecessor send token to successor terminate }
  • 21. Algorithm 12.5.4 Broadcast This algorithm works on any (fixed) connected network. The initiator runs init_broadcast and the noninitiators broadcast . All processors terminate successfully after having received a message from the initiator. In the algorithms we assume that the current machine we are running the code on is called p . init_broadcast () { N = { q | q is a neighbor of p } for each q  N send token to neighbor q terminate } broadcast () { receive token from neighbor q N = { q | q is a neighbor of p } for each q  N send token to neighbor q terminate }
  • 22. Algorithm 12.5.5 Echo This algorithm works on any (fixed) connected network. The initiator runs init_echo and the noninitiators echo . All processors terminate successfully after having received a message from the initiator. The initiator terminates after all processors have received its message. The machine on which we are running the code is called p . init_echo () { N = { q | q is a neighbor of p } for each q  N send token to neighbor q counter = 0 while ( counter < | N |) { receive token counter ++ } terminate }
  • 23. echo () { receive token from neighbor q parent = q N = { q | q is a neighbor of p } - { parent } for each q  N send token to neighbor q counter = 0 while ( counter < | N |) { receive token counter ++ } send token to neighbor parent terminate }
  • 24. Algorithm 12.5.9 Leader Election This algorithm runs on the unidirectional ring. The initiators run init_election and the noninitiators run election . All processors terminate successfully, and exactly one initiator has its leader attribute set to true. In the algorithms, we assume that the current machine we are running the code on is called p . Every processor has a next neighbor, p . next , to which it can send messages.
  • 25. init_election() { send  token , p . ID  to p . next min = p . ID receive  token , I  while ( p . ID != I ) { if ( I < min ) min = I send  token , I  to p . next receive  token , I  } if ( p . ID == min ) p . leader = true else p . leader = false terminate } election () { p . leader = false // noninitiator is never chosen as leader do { receive  token , I  send  token , I  to p . next } while (true) }