“…Instead, we perform the first phase that involves identification of infeasible CFPs once for each program, and the second phase that involves computation of FPMFP is performed once for each different data flow analysis. The core ideas of FPMFP have been presented before [19,20]. This paper enhances the core ideas significantly and provides a complete treatment.…”