Dominator Tree Certification and Independent Spanning Trees

نویسندگان

  • Loukas Georgiadis
  • Robert E. Tarjan
چکیده

How does one verify that the output of a complicated program is correct? One can formally prove that the program is correct, but this may be beyond the power of existing methods. Alternatively one can check that the output produced for a particular input satisfies the desired input-output relation, by running a checker on the input-output pair. Then one only needs to prove the correctness of the checker. But for some problems even such a checker may be too complicated to formally verify. There is a third alternative: augment the original program to produce not only an output but also a correctness certificate, with the property that a very simple program (whose correctness is easy to prove) can use the certificate to verify that the input-output pair satisfies the desired input-output relation. We consider the following important instance of this general question: How does one verify that the dominator tree of a flow graph is correct? Existing fast algorithms for finding dominators are complicated, and even verifying the correctness of a dominator tree in the absence of additional information seems complicated. We define a correctness certificate for a dominator tree, show how to use it to easily verify the correctness of the tree, and show how to augment fast dominator-finding algorithms so that they produce a correctness certificate. We also relate the dominator certificate problem to the problem of finding independent spanning trees in a flow graph, and we develop algorithms to find such trees. All our algorithms run in linear time. Previous algorithms apply just to the special case of only trivial dominators, and they take at least quadratic time. ∗This work is a rewritten and expanded combination of two conference papers, “Dominator Tree Verification and Vertex-Disjoint Paths,” Proc. 16th ACM-SIAM Symposium on Discrete Algorithms, pp. 433–442, 2005, and “Dominators, Directed Bipolar Orders, and Independent Spanning Trees,” Proc. 39th International Colloquium on Automata, Languages and Programming, pp. 375–386, 2012. Department of Computer Science, University of Ioannina, Greece. E-mail: [email protected]. Department of Computer Science, Princeton University, 35 Olden Street, Princeton, NJ, 08540, and Hewlett-Packard Laboratories. E-mail: [email protected]. Research at Princeton University partially supported by NSF grants CCF-0830676 and CCF-0832797. Research while visiting Stanford University partially supported by an AFOSR MURI grant. The information contained herein does not necessarily reflect the opinion or policy of the federal government and no official endorsement should be inferred.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dominators in Directed Graphs: A Survey of Recent Results, Applications, and Open Problems

The computation of dominators is a central tool in program optimization and code generation, and it has applications in other diverse areas including constraint programming, circuit testing, and biology. In this paper we survey recent results, applications, and open problems related to the notion of dominators in directed graphs, including dominator verification and certification, computing ind...

متن کامل

Counting the number of spanning trees of graphs

A spanning tree of graph G is a spanning subgraph of G that is a tree. In this paper, we focus our attention on (n,m) graphs, where m = n, n + 1, n + 2, n+3 and n + 4. We also determine some coefficients of the Laplacian characteristic polynomial of fullerene graphs.

متن کامل

Providing a Simple Method for the Calculation of the Source and Target Reliabili- ty in a Communication Network (SAT)

The source and target reliability in SAT network is de- fined as the flawless transmission from the source node to all the other nodes. In some references, the SAT pro- cess has been followed between all the node pairs but it is very time-consuming in today’s widespread networks and involves many costs. In this article, a method has been proposed to compare the reliability in complex networks b...

متن کامل

Providing a Simple Method for the Calculation of the Source and Target Reliabili- ty in a Communication Network (SAT)

The source and target reliability in SAT network is de- fined as the flawless transmission from the source node to all the other nodes. In some references, the SAT pro- cess has been followed between all the node pairs but it is very time-consuming in today’s widespread networks and involves many costs. In this article, a method has been proposed to compare the reliability in complex networks b...

متن کامل

Lecture notes on “Analysis of Algorithms”: Directed Minimum Spanning Trees

We say that u is dominated by v if and only if every path from r to u passes through v. It is not difficult to show that if u is dominated by both v1 and v2, then either v1 dominates v2, or v2 dominates v1. We say that v is the immediate dominator of u if and only if every dominator of u is also a dominator of v. It follows from the previous observation that every vertex u has a unique immediat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1210.8303  شماره 

صفحات  -

تاریخ انتشار 2012