Solved

Java - Dijkstra's Distributed Algorithm

Posted on 2004-08-19
11
766 Views
Last Modified: 2008-01-09
Hi All,

I am writing my University's final research, and I have to write a distributed program in Java that implements dijkstra's algorithm in a grid computing environment.

Does anybody know where I can find this algorithm well explained ?

Does anybody have how to explain it to me ?

Thanks,
root.
0
Comment
Question by:root_start
11 Comments
 
LVL 86

Expert Comment

by:CEHJ
ID: 11846541
0
 
LVL 92

Expert Comment

by:objects
ID: 11848624
0
 
LVL 3

Author Comment

by:root_start
ID: 12025334
Hi again All,

I know dijkstra's  algorithm, what I really need is this algorithm parallel.

Thanks,
root
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 92

Accepted Solution

by:
objects earned 100 total points
ID: 12031953
0
 
LVL 86

Expert Comment

by:CEHJ
ID: 12247661
>>
I will leave the following recommendation for this question in the Cleanup topic area:
   Accept: objects {http:#12031953}
>>

Not sure why an answer rejected by the questioner should be in line for the full points, especially since it didn't address the grid computing part of the question ...
0
 
LVL 20

Expert Comment

by:Venabili
ID: 12338004
>>Not sure why an answer rejected by the questioner
Where? This is the last post and it is never answered by the Asker. Besides - it is a corect answer after the last comment from the Asker...
0
 
LVL 86

Expert Comment

by:CEHJ
ID: 12341735
OK - but the questioner was also asking about grid computing:

>>
I have to write a distributed program in Java that implements dijkstra's algorithm in a grid computing environment.
>>
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An old method to applying the Singleton pattern in your Java code is to check if a static instance, defined in the same class that needs to be instantiated once and only once, is null and then create a new instance; otherwise, the pre-existing insta…
For beginner Java programmers or at least those new to the Eclipse IDE, the following tutorial will show some (four) ways in which you can import your Java projects to your Eclipse workbench. Introduction While learning Java can be done with…
Viewers learn about the third conditional statement “else if” and use it in an example program. Then additional information about conditional statements is provided, covering the topic thoroughly. Viewers learn about the third conditional statement …
Viewers will learn about if statements in Java and their use The if statement: The condition required to create an if statement: Variations of if statements: An example using if statements:

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now