Two different technologies, POSIX Threads and CUDA will be combined with one application domain of password cracking. Written explanations of your results and reflections of your learning.Writing programs to solve computationally expensive problems that require High Performance Computing.Written answers to the given related theoretical questions.Ĝapturing results and depicting them as graphs.Ěnalysis of supplied programs and experimentation with them.The module is assessed by evidence that you provide of: This will enable your code to be backup up and will also provide a source of evidence in your defence if collusion is suspected. It is recommended that you use a revision control system, such as subversion, for maintaining your source code. Your source code and data files that use the specified structure.Ě learning journal that uses the specified template.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |