STUDY AND PERFORMANCE ANALYSIS OF THE WYLLIE’S LIST RANKING ALGORITHM USING VARIOUS PARALLEL PROGRAMMING MODELS
Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 5
Abstract
The Wyllie’s list ranking algorithm takes a linked list data structure as an input and it pass the linked list successor elements to the succ1 array to find the Rank. The algorithm depends upon the Pointer jumping operation and its concepts. The motivation for this work is to parallelize the Wyllie’s list ranking algorithm using three different parallel programming platforms and compare its performance on all the three platforms.
Authors and Affiliations
B. Muni Lavanya
SHORT SURVEY ON GRAPHICAL DATABASE
This paper explores the features of graph databases and data models. The popularity towards work with graph models and datasets has been increased in the recent decades .Graph database has a number of advantage over the...
Recognition and Elimination of Malicious Nodes in Vehicular Ad hoc Networks (VANET’s)
A Vehicular Ad-Hoc Network, or VANET, is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed equipment (Base Stations) via radio waves. These have simila...
M-BOARD IN AN AD-HOC NETWORK ENVIRONMENT
Notice Board is very essential part of any organization. This paper presents the design and implementation of M-Board (Mobile Notice Board) for Ad-hoc Network Environment that can be established and made available for an...
A NOVEL EVOLUTIONARY ALGORITHM FOR DATA CLUSTERING IN N DIMENSIONAL SPACE
K-means clustering algorithm is one of the main algorithms applying in machine learning and pattern recognition. However, as the center of clusters are selected randomly and also due to the dependence of clustering resul...
SURVEY SOME ATTACKS ON CLIENT SIDE, BROWSER & CLOUD
Cloud computing is not a new name in the technology world but there are many new issues arises related with cloud. Every time in consumer mind a fear rotates because he is aware from vulnerabilities related with cloud. S...