博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
poj1502——MPI Maelstrom(dijkstra算法)
阅读量:2345 次
发布时间:2019-05-10

本文共 4003 字,大约阅读时间需要 13 分钟。

Description

BIT has recently taken delivery of their new supercomputer, a 32 processor Apollo Odyssey distributed shared memory machine with a hierarchical communication subsystem. Valentine McKee’s research advisor, Jack Swigert, has asked her to benchmark the new system.

Since the Apollo is a distributed shared memory machine, memory access and communication times are not uniform,'' Valentine told Swigert.Communication is fast between processors that share the same memory subsystem, but it is slower between processors that are not on the same subsystem. Communication between the Apollo and machines in our lab is slower yet.”

“How is Apollo’s port of the Message Passing Interface (MPI) working out?” Swigert asked.

Not so well,'' Valentine replied.To do a broadcast of a message from one processor to all the other n-1 processors, they just do a sequence of n-1 sends. That really serializes things and kills the performance.”

“Is there anything you can do to fix that?”

Yes,'' smiled Valentine.There is. Once the first processor has sent the message to another, those two can then send messages to two other hosts at the same time. Then there will be four hosts that can send, and so on.”

“Ah, so you can do the broadcast as a binary tree!”

“Not really a binary tree – there are some particular features of our network that we should exploit. The interface cards we have allow each processor to simultaneously send messages to any number of the other processors connected to it. However, the messages don’t necessarily arrive at the destinations at the same time – there is a communication cost involved. In general, we need to take into account the communication costs for each link in our network topologies and plan accordingly to minimize the total time required to do a broadcast.”

Input

The input will describe the topology of a network connecting n processors. The first line of the input will be n, the number of processors, such that 1 <= n <= 100.

The rest of the input defines an adjacency matrix, A. The adjacency matrix is square and of size n x n. Each of its entries will be either an integer or the character x. The value of A(i,j) indicates the expense of sending a message directly from node i to node j. A value of x for A(i,j) indicates that a message cannot be sent directly from node i to node j.

Note that for a node to send a message to itself does not require network communication, so A(i,i) = 0 for 1 <= i <= n. Also, you may assume that the network is undirected (messages can go in either direction with equal overhead), so that A(i,j) = A(j,i). Thus only the entries on the (strictly) lower triangular portion of A will be supplied.

The input to your program will be the lower triangular section of A. That is, the second line of input will contain one entry, A(2,1). The next line will contain two entries, A(3,1) and A(3,2), and so on.

Output

Your program should output the minimum communication time required to broadcast a message from the first processor to all the other processors.

Sample Input

5

50
30 5
100 20 50
10 x x 10
Sample Output

35

非常裸的最短路,套模板就能过

#include 
#include
#include
#include
#include
#include
#include
#include
#include
#define INF 0x3f3f3f3f#define MAXN 5005#define mod 1000000007using namespace std;int map[1005][1005],cost[1005][1005],vis[1005],dis[1005],n;void dijkstra(int s){ int i,j,min,v; memset(vis,0,sizeof(vis)); for(i=1; i<=n; ++i) { dis[i]=map[s][i]; } vis[s]=1; for(i=1; i<=n; ++i) { min=INF; for(j=1; j<=n; ++j) { if(!vis[j]&&dis[j]
dis[v]+map[v][j]) { dis[j]=dis[v]+map[v][j]; } } } }}int main(){ scanf("%d",&n); char a[20]; for(int i=1; i<=n; ++i) for(int j=1; j<=n; ++j) if(i!=j) map[i][j]=map[j][i]=INF; else map[i][j]=0; for(int i=2; i<=n; ++i) for(int j=1; j<=i-1; ++j) { scanf("%s",a); if(a[0]!='x') { sscanf(a,"%d",&map[i][j]); map[j][i]=map[i][j]; } } dijkstra(1); int ans=-1; for(int i=2;i<=n;++i) ans=max(ans,dis[i]); printf("%d\n",ans); return 0;}

转载地址:http://jscvb.baihongyu.com/

你可能感兴趣的文章
有两个32bit的数A、B,使用下面方式得到32bit的数C、D。哪一种可以使用C、D得到A、B的值?----阿里巴巴2015校招研发在线
查看>>
如何设计数据表、解决数据库并发访问瓶颈、数据库事务----阿里巴巴2015校招研发在线
查看>>
皮划艇找瓶子--------阿里巴巴2015校招研发在线
查看>>
HTTP的会话有四个过程,请选出不是的一个()----百度2016研发工程师笔试题(六)
查看>>
在ISO/OSI参考模型中,网络层的主要功能是()----百度2016研发工程师笔试题(六)
查看>>
MapReduce框架中,在Map和Reduce之间的combiner的作用是()----百度2016研发工程师笔试题(六)
查看>>
计算页号----百度2016研发工程师笔试题(六)
查看>>
在一个分时操作系统中,进程出现由运行状态进入就绪状态,由阻塞状态进入就绪状态的原因分别可能是()
查看>>
数据库 alter 语句的使用----百度2016研发工程师笔试题(六)
查看>>
数据库恢复的基础是利用转储的冗余数据。这些转储的冗余数据包括()----百度2016研发工程师笔试题(六)
查看>>
在一棵度为3的树中,度为3的节点个数为2,度为2的节点个数为1,则度为0的节点个数为()----百度2016研发工程师笔试题(六)
查看>>
在/etc/fstab文件中指定的文件系统加载参数中, 参数一般用于CD-ROM等移动设备。----百度2016研发工程师笔试题(六)
查看>>
在多级存储体系中,“Cache-主存”结构的作用是解决( )的题目。----腾讯2014研发笔试卷
查看>>
C++ 实现 0-1 背包问题
查看>>
指针数组 数组指针 指针函数 函数指针
查看>>
对类成员访问权限的控制,是通过设置成员的访问控制属性实现的,下列不是访问控制属性的是( )
查看>>
字符串常量放在只读存储区
查看>>
#define 和 typedef 的区别
查看>>
不属于冯诺依曼体系结构必要组成部分是:
查看>>
有1000亿条记录,每条记录由url,ip,时间组成,设计一个系统能够快速查询以下内容(程序设计题)
查看>>