Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Algorithm 430 [H]: Immediate predominators in a directed graph

Published: 01 August 1972 Publication History

Abstract

We assume a directed graph whose nodes are labeled by integers between 1 and n. The arcs of this graph correspond to the flow of control between blocks of a computer program. The initial node of this graph (corresponding to the entry point of the program) is labeled by the integer 1. For optimizing the object code generated by a compiler, the relationship of immediate predominator has been used by Lowry and Medlock [3]. We say that node i predominates node k if every path from node 1 to node k passes through (i.e. both into and out of) node i. Node j is an immediate predominator of node k if node j predominates node k and if every other node i which predominates node k also predominates node j. It can easily be proved that if k ≠ 1 and node k is reachable from node 1t hen node k has exactly one immediate predominator. In case k = 1, or node k is not reachable from node 1, the immediate predominator of node k is undefined, and the value 0 will be given by the procedure PREDOMINATOR.

References

[1]
Allen, F.E. Program optimization. Annual Rev. in Automatic Programming 5 (1969), 239-307.
[2]
Dijkstra, E.W. A note on two problems in connexion with graphs, Numerische Mathematik 1, 5 (Oct. 1959), 269-271.
[3]
Lowry,. Edward S. and Medlock, C. W. Object code optimization, Comm. ACM 12, 1 (Jan. 1969), 13-22.
[4]
Munro, Jan. Efficient determination of the transitive closure of a directed graph. To be published.
[5]
Purdom, Paul Jr. A transitive closure algorithm, BIT 10, 1 (1970), 76-95.
[6]
Warshall, S. A theorem on Boolean matrices. J.ACM 9 (Jan. 1962), 11-12.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 1972
Published in CACM Volume 15, Issue 8

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. articulation
  2. connectivity
  3. directed graph
  4. graph theory
  5. immediate predominator
  6. optimizing compiler
  7. predominator
  8. program optimization
  9. shortest path

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)73
  • Downloads (Last 6 weeks)7
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Predictable and optimized single-path code for predicated processorsJournal of Systems Architecture10.1016/j.sysarc.2024.103214154(103214)Online publication date: Sep-2024
  • (2023)BibliographyEngineering a Compiler10.1016/B978-0-12-815412-0.00023-1(793-813)Online publication date: 2023
  • (2023)Data-Flow AnalysisEngineering a Compiler10.1016/B978-0-12-815412-0.00015-2(449-516)Online publication date: 2023
  • (2023)Efficient parallel algorithms for path problems in directed graphsAlgorithmica10.1007/BF017587807:1-6(631-648)Online publication date: 22-Mar-2023
  • (2021)Planar reachability under single vertex or edge failuresProceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3458064.3458227(2739-2758)Online publication date: 10-Jan-2021
  • (2014)Translation from BPMN to BPEL, current techniques and limitationsProceedings of the 5th Symposium on Information and Communication Technology10.1145/2676585.2676602(21-30)Online publication date: 4-Dec-2014
  • (2013)Dominator Certification and Independent Spanning Trees: An Experimental StudyExperimental Algorithms10.1007/978-3-642-38527-8_26(284-295)Online publication date: 2013
  • (2012)BibliographyEngineering a Compiler10.1016/B978-0-12-088478-0.00024-4(765-785)Online publication date: 2012
  • (2012)An experimental study of dynamic dominatorsProceedings of the 20th Annual European conference on Algorithms10.1007/978-3-642-33090-2_43(491-502)Online publication date: 10-Sep-2012
  • (2011)IMPROVING CLASS FIREWALL REGRESSION TEST SELECTION BY REMOVING THE CLASS FIREWALLInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819400700330617:03(359-378)Online publication date: 21-Nov-2011
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media