1977
DOI: 10.1109/tc.1977.5009294
|View full text |Cite
|
Sign up to set email alerts
|

Analysis Techniques for SIMD Machine Interconnection Networks and the Effects of Processor Address Masks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

1977
1977
2001
2001

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 85 publications
(27 citation statements)
references
References 19 publications
0
27
0
Order By: Relevance
“…The nomenclature of this section is due to Siegel [11]. The Cube network is similar to the one implemented in Staran, the PM2I network is similar to Feng's Data Manipulator, while the WPM2I is Siegel's brainchild.…”
Section: Message Broadcasting On Cube Pm2i and Wpm2i Computersmentioning
confidence: 99%
See 2 more Smart Citations
“…The nomenclature of this section is due to Siegel [11]. The Cube network is similar to the one implemented in Staran, the PM2I network is similar to Feng's Data Manipulator, while the WPM2I is Siegel's brainchild.…”
Section: Message Broadcasting On Cube Pm2i and Wpm2i Computersmentioning
confidence: 99%
“…The PM2I network has 2 log N = 2m settings, corresponding to the addition or subtraction mod N of 2' for 0 < i < m. The WPM2I connections are similar to those of the PM2I network, except any "carry" or "borrow" will "wrap around" to bit bi2. Lower b6unds for message broadcasting on these computers are implicit in the work of Siegel [11]. The PM2I (or WPM2I) takes at least log N (or (log N)/2) time to perform a "shuffle," which is a legal message broadcasting pattern.…”
Section: Message Broadcasting On Cube Pm2i and Wpm2i Computersmentioning
confidence: 99%
See 1 more Smart Citation
“…Theoretically, every opération could be accompanied by a mask. There are various représentations of masks [17]. When an opération is accompanied by a mask, only PE's whose address (PEN) matches the mask will exécute that instruction.…”
Section: A Parallel Program For the Simplex Methodsmentioning
confidence: 99%
“…In addition to the data manipulator, various interconnection networks have been investigated by many researchers, for example Stone [93], Lawrie [94], Lang [95], and Siegel [96,97]. Interested readers are referred to references [93][94][95][96][97]. …”
Section: Ss Yau and Hs Fungmentioning
confidence: 99%