메뉴 건너뛰기




Volumn 10, Issue 1, 2006, Pages 69-94

Finding dominators in practice

Author keywords

[No Author keywords available]

Indexed keywords


EID: 38549084141     PISSN: None     EISSN: 15261719     Source Type: Journal    
DOI: 10.7155/jgaa.00119     Document Type: Conference Paper
Times cited : (40)

References (45)
  • 1
    • 33846012075 scopus 로고
    • A. V. Alio, R. Sethi, and J. D. Ullman. Compilers:, Addison-Wesley, Reading, MA
    • A. V. Alio, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading, MA, 1986.
    • (1986) Principles, Techniques, and Tools
  • 3
    • 0012128836 scopus 로고
    • Graph theoretic constructs for program control flow analysis
    • Rep. RC 3923, IBM T.J. Watson Research Center
    • F. E. Allen and J. Cocke. Graph theoretic constructs for program control flow analysis. Technical Report IBM Res. Rep. RC 3923, IBM T.J. Watson Research Center, 1972.
    • (1972) Technical Report IBM Res
    • Allen, F.E.1    Cocke, J.2
  • 4
    • 4143132414 scopus 로고    scopus 로고
    • Who dominates whom in the ecosystem? Energy flow bottlenecks and cascading extinctions
    • S. Allesina and A. Bodini. Who dominates whom in the ecosystem? Energy flow bottlenecks and cascading extinctions. Journal of Theoretical Biology, 230(3):351-358, 2004.
    • (2004) Journal of Theoretical Biology , vol.230 , Issue.3 , pp. 351-358
    • Allesina, S.1    Bodini, A.2
  • 5
    • 38549124477 scopus 로고    scopus 로고
    • Secondary extinctions in ecological networks: Bottlenecks unveiled
    • In press
    • S. Allesina, A. Bodini, and C. Bondavalli. Secondary extinctions in ecological networks: Bottlenecks unveiled. Ecological Modelling, 2005. In press.
    • (2005) Ecological Modelling
    • Allesina, S.1    Bodini, A.2    Bondavalli, C.3
  • 8
    • 85037005294 scopus 로고    scopus 로고
    • Linear-time pointer-machine algorithms for pathevaluation problems on trees and graphs
    • In preparation
    • A. L. Buchsbaum, L. Georgiadis, H. Kaplan, A. Rogers, R. E. Tarjan, and J. R. Westbrook. Linear-time pointer-machine algorithms for pathevaluation problems on trees and graphs. In preparation.
    • Buchsbaum, A.L.1    Georgiadis, L.2    Kaplan, H.3    Rogers, A.4    Tarjan, R.E.5    Westbrook, J.R.6
  • 9
    • 0032266860 scopus 로고    scopus 로고
    • A. L. Buchsbaum, H. Kaplan, A. Rogers, and J. R. Westbrook. A new, simpler linear-time dominators algorithm. ACM Transactions on Programming Languages and Systems, 20(6):1265-96, 1998. Corrigendum appeared in 27(3):383-7, 2005.
    • A. L. Buchsbaum, H. Kaplan, A. Rogers, and J. R. Westbrook. A new, simpler linear-time dominators algorithm. ACM Transactions on Programming Languages and Systems, 20(6):1265-96, 1998. Corrigendum appeared in 27(3):383-7, 2005.
  • 10
    • 38549139104 scopus 로고    scopus 로고
    • Personal communication
    • K. D. Cooper, 2003. Personal communication.
    • (2003)
    • Cooper, K.D.1
  • 12
    • 38549129795 scopus 로고    scopus 로고
    • Iterative data-flow analysis, revisited
    • Technical Report TR04-432, Department of Computer Science, Rice University
    • K. D. Cooper, T. J. Harvey, and K. Kennedy. Iterative data-flow analysis, revisited. Technical Report TR04-432, Department of Computer Science, Rice University, 2004.
    • (2004)
    • Cooper, K.D.1    Harvey, T.J.2    Kennedy, K.3
  • 15
    • 2942553813 scopus 로고
    • Efficiency of equivalence algorithms
    • R. E. Miller and J. W. Thatcher, editors, Plenum Press, New York
    • M. J. Fischer. Efficiency of equivalence algorithms. In R. E. Miller and J. W. Thatcher, editors, Complexity of Computer Computations, pages 153-168. Plenum Press, New York, 1972.
    • (1972) Complexity of Computer Computations , pp. 153-168
    • Fischer, M.J.1
  • 17
    • 26444586901 scopus 로고    scopus 로고
    • Complexity-based denial-of-service attacks on mobile code systems
    • Technical Report 04-09, School of Information and Computer Science, University of California, Irvine
    • A. Gal, C. W. Probst, and M. Franz. Complexity-based denial-of-service attacks on mobile code systems. Technical Report 04-09, School of Information and Computer Science, University of California, Irvine, 2004.
    • (2004)
    • Gal, A.1    Probst, C.W.2    Franz, M.3
  • 23
    • 71049157663 scopus 로고    scopus 로고
    • Shortest path algorithms: Engineering aspects
    • Proceedings of the International Symposium on Algorithms and Computation, of, Springer-Verlag
    • A. V. Goldberg. Shortest path algorithms: Engineering aspects. In Proceedings of the International Symposium on Algorithms and Computation, volume 2223 of Lecture Notes in Computer Science, pages 502-513. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2223 , pp. 502-513
    • Goldberg, A.V.1
  • 24
    • 84943229740 scopus 로고    scopus 로고
    • A simple shortest path algorithm with linear average time
    • Proceedings of the 9th European Symposium, on Algorithms, of, Springer-Verlag
    • A. V. Goldberg. A simple shortest path algorithm with linear average time. In Proceedings of the 9th European Symposium, on Algorithms, volume 2161 of Lecture Notes in Computer Science, pages 230-241. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2161 , pp. 230-241
    • Goldberg, A.V.1
  • 25
    • 0016080882 scopus 로고
    • Characterizations of reducible flow graphs
    • M. S. Hecht and J. D. Ullman. Characterizations of reducible flow graphs. Journal of the ACM, 21(3):367-375, 1974.
    • (1974) Journal of the ACM , vol.21 , Issue.3 , pp. 367-375
    • Hecht, M.S.1    Ullman, J.D.2
  • 27
    • 85036983754 scopus 로고    scopus 로고
    • The IMPACT compiler
    • The IMPACT compiler, http://www.crhc.uiuc.edu/IMPACT.
  • 28
    • 84976706502 scopus 로고
    • Global data flow analysis and iterative algorithms
    • J. B. Kam and J. D. Ullman. Global data flow analysis and iterative algorithms. Journal of the ACM, 23:158-171, 1976.
    • (1976) Journal of the ACM , vol.23 , pp. 158-171
    • Kam, J.B.1    Ullman, J.D.2
  • 29
    • 84983965442 scopus 로고
    • An empirical study of FORTRAN programs
    • D. E. Knuth. An empirical study of FORTRAN programs. Software Practice and Experience, 1:105-133, 1971.
    • (1971) Software Practice and Experience , vol.1 , pp. 105-133
    • Knuth, D.E.1
  • 31
    • 85036972763 scopus 로고    scopus 로고
    • B. M. E. Moret and H. D. Shapiro. An empirical assessment of algorithms for constructing a minimum spanning tree. DIMACS Monographs in Discrete Mathematics and Theoretical Computer Science, 15:99-117, 1994.
    • B. M. E. Moret and H. D. Shapiro. An empirical assessment of algorithms for constructing a minimum spanning tree. DIMACS Monographs in Discrete Mathematics and Theoretical Computer Science, 15:99-117, 1994.
  • 33
    • 77953087446 scopus 로고    scopus 로고
    • On the implementation of MST-based heuristics for the Steiner problem in graphs
    • Proceedings of the 4th International Workshop on Algorithm Engineering and Experiments, of, Springer-Verlag
    • M. Poggi de Aragão and R. F. Werneck. On the implementation of MST-based heuristics for the Steiner problem in graphs. In Proceedings of the 4th International Workshop on Algorithm Engineering and Experiments, volume 2409 of Lecture Notes in Computer Science, pages 1-15. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2409 , pp. 1-15
    • Poggi de Aragão, M.1    Werneck, R.F.2
  • 34
    • 0342583478 scopus 로고
    • Algorithm 430: Immediate predominators in a directed graph
    • P. W. Purdom, Jr. and E. F. Moore. Algorithm 430: Immediate predominators in a directed graph. Communications of the ACM, 15(8):777-778, 1972.
    • (1972) Communications of the ACM , vol.15 , Issue.8 , pp. 777-778
    • Purdom Jr., P.W.1    Moore, E.F.2
  • 35
    • 33745472212 scopus 로고    scopus 로고
    • Using dominators for solving constrained path problems
    • Proceedings of the 8th International Symposium on Practical Aspects of Declarative Languages, of, Springer-Verlag
    • L. Quesada, P. Van Roy, Y. Deville, and R. Collet. Using dominators for solving constrained path problems. In Proceedings of the 8th International Symposium on Practical Aspects of Declarative Languages, volume 3819 of Lecture Notes in Computer Science, pages 73-87. Springer-Verlag, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3819 , pp. 73-87
    • Quesada, L.1    Van Roy, P.2    Deville, Y.3    Collet, R.4
  • 36
    • 0019246090 scopus 로고
    • Structural analysis: A new approach to flow analysis in optimizing compilers
    • M. Sharir. Structural analysis: A new approach to flow analysis in optimizing compilers. Computer Languages, 5(3): 141-153, 1980.
    • (1980) Computer Languages , vol.5 , Issue.3 , pp. 141-153
    • Sharir, M.1
  • 38
    • 85036983035 scopus 로고    scopus 로고
    • The Standard Performance Evaluation Corp
    • The Standard Performance Evaluation Corp. http://www.spec.org/.
  • 41
    • 0004947446 scopus 로고
    • Finding dominators in directed graphs
    • R. E. Tarjan. Finding dominators in directed graphs. SIAM Journal on Computing, 3(1):62-89, 1974.
    • (1974) SIAM Journal on Computing , vol.3 , Issue.1 , pp. 62-89
    • Tarjan, R.E.1
  • 42
    • 0016495233 scopus 로고
    • Efficiency of a good but not linear set union algorithm
    • R. E. Tarjan. Efficiency of a good but not linear set union algorithm. Journal of the ACM, 22(2):212-225, 1975.
    • (1975) Journal of the ACM , vol.22 , Issue.2 , pp. 212-225
    • Tarjan, R.E.1
  • 43
    • 0018533367 scopus 로고
    • Applications of path compression on balanced trees
    • R. E. Tarjan. Applications of path compression on balanced trees. Journal of the ACM, 26(4):690-715, 1979.
    • (1979) Journal of the ACM , vol.26 , Issue.4 , pp. 690-715
    • Tarjan, R.E.1
  • 44
    • 0021415472 scopus 로고
    • Worst-case analysis of set union algorithms
    • R. E. Tarjan and J. van Leeuwen. Worst-case analysis of set union algorithms. Journal of the ACM, 31(2):245-81, 1984.
    • (1984) Journal of the ACM , vol.31 , Issue.2 , pp. 245-281
    • Tarjan, R.E.1    van Leeuwen, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.