Mandatory Assignment 1

نویسنده

  • Magnus Erik Hvass Pedersen
چکیده

The purpose of this document is to verify attendance of the author to the Scientific Computing course, at the Danish Technical University (DTU). A study of cache usage and its impact on computational performance of matrix multiplication is presented, where experiments are conducted on various combinations of algorithms for performing such multiplication, and datastructures for storing the matrices. Although the basic theory is briefly recapped, the reader is still assumed to be familiar with the project description, basic linear algebra, and various aspects of computer architecture, memory layout, and the programming languages C and C++ in particular. After a brief introduction to what matrix multiplication is all about, we move straight to the development and implementation, which is carried out in phases. First, an object-oriented framework is implemented, allowing for easy experimentation with combinations of different data-structures for storing the matrices, and different traversal algorithms for computing the matrix product. This framework however, induces a significant overhead in computational time, so a specialized implementation is made, utilizing the knowledge obtained from experimenting with the object-oriented framework. Finally, this more efficient algorithm will be used in a study of block-decomposition of matrix multiplication, in an attempt to improve cache performance even further.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing a Hierarchical Hub Covering Problem with Mandatory Dispersion of Central Hubs

The hierarchical hub location problem is encountered three-level network that is applied in production-distribution system, education system, emergency medical services, telecommunication network, etc. This paper addresses the hierarchical hub covering problem with single assignment accounting for mandatory dispersion of central hubs restriction as a special case. This formulation with incorpor...

متن کامل

Can Propensity Score Methods Match the Findings from a Random Assignment Evaluation of Mandatory Welfare-to-Work Programs?

This paper assesses nonexperimental estimators using results from a six-state random assignment study of mandatory welfare-to-work programs. The assessment addresses two questions: which nonexperimental methods provide the most accurate estimates; and do the best methods work well enough to replace random assignment? Three tentative conclusions emerge. Nonexperimental bias was larger in the med...

متن کامل

Assuring patient safety: registered nurses' responsibility in all roles and settings to guard against working when fatigued.

Education: 6. Schools of nursing should address decision-making within their curriculum related to the impact that fatigue and the habitual The American Nurses Association (ANA) takes the position that, regardless of the number of hours worked, all registered nurses have an ethical responsibility to carefully consider their level of fatigue when deciding whether to accept any assignment extendi...

متن کامل

Compiler Construction Assignment

This assignment consists of implementing a compiler that translates programs written in a subset of the Pascal programming language into code executable by SPIM [4]. SPIM is a simulator for the MIPS architecture, following the analysis-synthesis model. The assignment is based on the programming project suggested in Aho et al.[1]. Please read appendix A from this book for information on the subs...

متن کامل

A FAMILY OF MODELS FOR RULE-BASED USER-ROLE ASSIGNMENT by

A FAMILY OF MODELS FOR RULE-BASED USER-ROLE ASSIGNMENT Mohammad Abdullah Al-Kahtani, Ph.D. George Mason University, 2003 Dissertation Director: Dr. Ravi Sandhu Conventional role based access control (RBAC) was designed with closed-enterprise environment in mind where a security officer(s) manually assigns users to roles. However, today, an increasing number of service-providing enterprises make...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005