A Strong Connectivity Algorithm And Its Applications in Data Flow Analysis
A Strong Connectivity Algorithm And Its Applications in Data Flow Analysis
M Sharir
The book A Strong Connectivity Algorithm And Its Applications in Data Flow Analysis was written by author M Sharir Here you can read free online of A Strong Connectivity Algorithm And Its Applications in Data Flow Analysis book, rate and share your impressions in comments. If you don't know what to write, just answer the question: Why is A Strong Connectivity Algorithm And Its Applications in Data Flow Analysis a good or bad book?
What reading level is A Strong Connectivity Algorithm And Its Applications in Data Flow Analysis book?
To quickly assess the difficulty of the text, read a short excerpt:
In this case we compute the set S(h) = {h} u{{w: w is a T-descendant of h which can reach h along a path consisting solely of T-descendants of h} and extend the SCCROOT map, by mapping all we S (h) to h. The set S(h) is computed as follows (square brackets denote ordered tuples). S(h) := [h]; NEW := [w: (w, h) e E and w is a T-descendant of h] ; (while NEW is not empty) remove an element w from NEW; SCCROOT (w) := h; add w to S (h) ; add to NEW all nodes v where (v, w) e E, V is a T-descendant ...of h and SCCROOT (v) is undefined; end while; Note that we can test the condition 'v is a T-descendant of h' rapidly using the formula V is a T-descendant of h iff pre (h) (x ) : (m, n) G G}, n e N . N (m, n) m The algorithm in [HU] arranges nodes of N in reverse postorder (with respect to a depth-first spanning tree), and then iterates through this sequence repeatedly (starting with some 'largest' initial value of the x 's), applying (*) to obtain successive approximations of the solution, till these approximations converge to the maximal fixpoint of (*).
User Reviews: