19%
11.05.2021
, 32, 64, 128, 256, 512, 1024, 2048, 4096, 8192]
A = single( rand(N,N) );
B = single( rand(N,N) );
start = clock();
C = A*B;
elapsedTime = etime(clock(), start);
gFlops = 2*N*N*N / (elapsedTime * 1e+9);
disp(sprintf("N = %4d
19%
10.06.2015
to the first sed I know that here is only a SINGLE space
45 display_list="$(sed ':a;N;$!ba;s/\n / /g'<<<"$xrandr_current" | sed \
-n -e 's/^\([a-zA-Z0-9_-]\+\) connected.* \([0-9]\+\)mm.* \([0-9]\+\)mm
19%
04.12.2024
applications from creating child processes
No
d4f940ab-401b-4efc-aadc-ad5f3c50688a
Blocks credential theft from the local security authority subsystem (lsass.exe)
Yes
9e6c4e1f
19%
15.12.2016
are over i
= 2,n
− 1 and j
= 2,n
−1. Here is how you can write the iteration over the domain using array notation:
a(2:n-1,2:n-1) = 0.25 * &
(a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n
19%
09.01.2013
.
2013-05-08 20:07:45 INFO Created Auto Scaling group
policy named:
arn:aws:autoscaling:eu-west-1:894012917938:scalingPolicy:
927c9769-d96e-46ba-b08f-099650ae7a3d:autoScalingGroupName/awseb-
e-mnpsy5bpzk
19%
11.06.2014
Your identification has been saved in /root/.ssh/id_rsa.
07 Your public key has been saved in /root/.ssh/id_rsa.pub.
08 The key fingerprint is:
09 9b:e4:e2:27:92:04:4a:9b:ee:82:cc:9f:4d:4b:4d:c1 root
19%
25.09.2013
)
8 (4)
7.2
0.9
Nehalem-EP (2009)
8 (4)
32
4
Westmere-EP (2010)
12 (6)
42
3.5
Westmere-EP (2010)
8 (4)
42
18%
21.08.2012
6 ### 8/5/2012
7
8 ### Set the job name
9 #PBS -N mpi_pi_fortran90
10
11 ### Run in the queue named “batch”
12 #PBS -q batch
13
14 ### Specify the number of cpus for your job. This example
18%
04.08.2020
->tv_nsec) * 1E-9;
24 }
25
26 int main(int argc, char* argv[argc+1]) {
27 if (argc < 2) {
28 fprintf(stderr, "Usage: %s NNN, NNN iterations\n",
29 argv[0]);
30 return EXIT_FAILURE;
31 }
32
18%
25.09.2023
guest
82a84,88
>
> tee /etc/.htpasswd <<'EOF'
> guest:$apr1$gz4n7s6o$P.O/V1k9rZuV9nN/5lh3l0
> admin:$apr1$esczj7wu$ffu/6j8vETMAMJaVTKn7a1
> EOF
Monit is configured to load service