Bidirectional Data Flow Analysis in Code Motion: Myth and Reality

نویسنده

  • Oliver Rüthing
چکیده

Bidirectional data flow analysis has become the standard technique for solving bit-vector based code motion problems in the presence of critical edges. Unfortunately, bidirectional analyses have turned out to be conceptually and computationally harder than their unidirectional counterparts. In this paper we show that code motion in the presence of critical edges can be achieved without bidirectional data flow analyses. This is demonstrated by means of an adaption of our algorithm for lazy code motion [15], which is developed from a fresh, specification oriented view. Besides revealing a better conceptual understanding of the phenomena caused by critical edges, this also settles the foundation for a new and efficient hybrid iteration strategy that intermixes conventional round-robin iteration with the exhaustive iteration on critical subparts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effects of Multi-directionality on Pedestrian Flow Characteristics

In design and analysis, standard references assume the pedestrian flow as unidirectional. In reality however, pedestrian flow is usually bi-directional. The main question pursued in this paper is that whether the main characteristics of pedestrian flow the same under uni- and bi-directional conditions. In order to achieve this goal, effect of bi-directional stream is inv...

متن کامل

Ten turbidite myths

During the past 50 years, the turbidite paradigm has promoted many myths related to deep-water turbidite deposition. John E. Sanders (1926–1999), a pioneering process sedimentologist, first uncovered many of these turbidite myths. This paper provides a reality check by undoing 10 of these turbidite myths. Myth No. 1: turbidity currents are non-turbulent flows with multiple sediment-support mech...

متن کامل

Web Application Worms : Myth or Reality ? Automated , self - propagating attacks on vulnerabilities in custom Web application code

..................................................................... 3 Introduction ............................................................... 3 Anatomy of an Automated Application Worm ....... 4 War Searching............................................................ 5 Advanced War Searching.......................................... 7 The Search of Death ...................................

متن کامل

Laminar Flow Analysis in the Channel Bends

In this paper the laminar flow in the rectangular channel bends is simulated using numerical techniques. The turning angle of the channel bend and the area ratio of the channel cross-section are two important parameters to be examined. For flow simulation, the body fitted 3-D continuity and momentum equations are used and a body fitted general purpose code is developed. The existing results of ...

متن کامل

Laminar Flow Analysis in the Channel Bends

In this paper the laminar flow in the rectangular channel bends is simulated using numerical techniques. The turning angle of the channel bend and the area ratio of the channel cross-section are two important parameters to be examined. For flow simulation, the body fitted 3-D continuity and momentum equations are used and a body fitted general purpose code is developed. The existing results of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998