{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:32:27Z","timestamp":1773192747487,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540330509","type":"print"},{"value":"9783540330516","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11688839_5","type":"book-chapter","created":{"date-parts":[[2006,3,28]],"date-time":"2006-03-28T07:41:48Z","timestamp":1143531708000},"page":"47-64","source":"Crossref","is-referenced-by-count":124,"title":["Context-Sensitive Points-to Analysis: Is It Worth It?"],"prefix":"10.1007","author":[{"given":"Ond\u0159ej","family":"Lhot\u00e1k","sequence":"first","affiliation":[]},{"given":"Laurie","family":"Hendren","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-49538-X_2","volume-title":"ECOOP \u201995 - Object-Oriented Programming","author":"O. Agesen","year":"1995","unstructured":"Agesen, O.: The Cartesian Product Algorithm. In: Olthoff, W. (ed.) ECOOP 1995. LNCS, vol.\u00a0952, pp. 2\u201351. Springer, Heidelberg (1995)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/BFb0055513","volume-title":"Types in Compilation","author":"A. Aiken","year":"1998","unstructured":"Aiken, A., Faehndrich, M., Foster, J.S., Su, Z.: A toolkit for constructing type- and constraint-based program analyses. In: Leroy, X., Ohori, A. (eds.) TIC 1998. LNCS, vol.\u00a01473, pp. 78\u201396. Springer, Heidelberg (1998)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Berndl, M., Lhot\u00e1k, O., Qian, F., Hendren, L., Umanee, N.: Points-to analysis using BDDs. In: Proceedings of PLDI 2003, pp. 103\u2013114 (2003)","DOI":"10.1145\/781131.781144"},{"key":"5_CR4","unstructured":"Burke, M., Carini, P., Choi, J., Hind, M.: Interprocedural pointer alias analysis. Technical Report RC 21055, IBM T. J. Watson Research Center (December 1997)"},{"key":"5_CR5","unstructured":"DaCapo Benchmark Suite, \n                    \n                      http:\/\/www-ali.cs.umass.edu\/DaCapo\/gcbm.html"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-49538-X_5","volume-title":"ECOOP \u201995 - Object-Oriented Programming","author":"J. Dean","year":"1995","unstructured":"Dean, J., Grove, D., Chambers, C.: Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In: Olthoff, W. (ed.) ECOOP 1995. LNCS, vol.\u00a0952, pp. 77\u2013101. Springer, Heidelberg (1995)"},{"key":"5_CR7","unstructured":"Dufour, B.: Objective quantification of program behaviour using dynamic metrics. Master\u2019s thesis, McGill University (June 2004)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Emami, M., Ghiya, R., Hendren, L.J.: Context-sensitive interprocedural points-to analysis in the presence of function pointers. In: Proceedings of PLDI 1994, pp. 242\u2013256 (1994)","DOI":"10.1145\/178243.178264"},{"key":"5_CR9","unstructured":"Heintze, N.: Analysis of large code bases: the compile-link-analyze model (1999), \n                    \n                      http:\/\/cm.bell-labs.com\/cm\/cs\/who\/nch\/cla.ps"},{"key":"5_CR10","first-page":"54","volume-title":"Proceedings of PASTE 2001","author":"M. Hind","year":"2001","unstructured":"Hind, M.: Pointer analysis: haven\u2019t we solved this problem yet? In: Proceedings of PASTE 2001, pp. 54\u201361. ACM Press, New York (2001)"},{"issue":"4","key":"5_CR11","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1145\/325478.325519","volume":"21","author":"M. Hind","year":"1999","unstructured":"Hind, M., Burke, M., Carini, P., Choi, J.-D.: Interprocedural pointer alias analysis. ACM Trans. Program. Lang. Syst.\u00a021(4), 848\u2013894 (1999)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"5_CR12","unstructured":"Lhot\u00e1k, O.: Program Analysis using Binary Decision Diagrams. PhD thesis, McGill University (Jan 2006)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-36579-6_12","volume-title":"Compiler Construction","author":"O. Lhot\u00e1k","year":"2003","unstructured":"Lhot\u00e1k, O., Hendren, L.: Scaling Java Points-to Analysis Using spark. In: Hedin, G. (ed.) CC 2003. LNCS, vol.\u00a02622, pp. 153\u2013169. Springer, Heidelberg (2003)"},{"key":"5_CR14","first-page":"158","volume-title":"Proceedings of PLDI 2004","author":"O. Lhot\u00e1k","year":"2004","unstructured":"Lhot\u00e1k, O., Hendren, L.: Jedd: a BDD-based relational extension of Java. In: Proceedings of PLDI 2004, pp. 158\u2013169. ACM Press, New York (2004)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-48166-4_13","volume-title":"Software Engineering - ESEC\/FSE \u201999","author":"D. Liang","year":"1999","unstructured":"Liang, D., Harrold, M.J.: Efficient points-to analysis for whole-program analysis. In: Nierstrasz, O., Lemoine, M. (eds.) ESEC 1999 and ESEC-FSE 1999. LNCS, vol.\u00a01687, pp. 199\u2013215. Springer, Heidelberg (1999)"},{"key":"5_CR16","volume-title":"PASTE 2005","author":"D. Liang","year":"2005","unstructured":"Liang, D., Pennings, M., Harrold, M.J.: Evaluating the impact of context-sensitivity on andersen\u2019s algorithm for Java programs. In: PASTE 2005. ACM Press, New York (2005)"},{"key":"5_CR17","first-page":"1","volume-title":"Proceedings of ISSTA 2002","author":"A. Milanova","year":"2002","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to and side-effect analyses for Java. In: Proceedings of ISSTA 2002, pp. 1\u201311. ACM Press, New York (2002)"},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1044834.1044835","volume":"14","author":"A. Milanova","year":"2005","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to analysis for Java. ACM Trans. Softw. Eng. Methodol.\u00a014(1), 1\u201341 (2005)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"5_CR19","first-page":"43","volume-title":"Proceedings of PASTE 2004","author":"E.M. Nystrom","year":"2004","unstructured":"Nystrom, E.M., Kim, H.-S., Hwu, W.-m.W.: Importance of heap specialization in pointer analysis. In: Proceedings of PASTE 2004, pp. 43\u201348. ACM Press, New York (2004)"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/3-540-36579-6_11","volume-title":"Compiler Construction","author":"N. Nystrom","year":"2003","unstructured":"Nystrom, N., Clarkson, M.R., Myers, A.C.: Polyglot: An Extensible Compiler Framework for Java. In: Hedin, G. (ed.) CC 2003. LNCS, vol.\u00a02622, pp. 138\u2013152. Springer, Heidelberg (2003)"},{"key":"5_CR21","first-page":"43","volume-title":"Proceedings OOPSLA 2001","author":"A. Rountev","year":"2001","unstructured":"Rountev, A., Milanova, A., Ryder, B.G.: Points-to analysis for Java using annotated constraints. In: Proceedings OOPSLA 2001, pp. 43\u201355. ACM Press, New York (2001)"},{"key":"5_CR22","first-page":"13","volume-title":"Proceedings of the Conference on Programming Language Design and Implementation","author":"E. Ruf","year":"1995","unstructured":"Ruf, E.: Context-insensitive alias analysis reconsidered. In: Proceedings of the Conference on Programming Language Design and Implementation, pp. 13\u201322. ACM Press, New York (1995)"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-36579-6_10","volume-title":"Compiler Construction","author":"B.G. Ryder","year":"2003","unstructured":"Ryder, B.G.: Dimensions of Precision in Reference Analysis of Object-Oriented Programming Languages. In: Hedin, G. (ed.) CC 2003. LNCS, vol.\u00a02622, pp. 126\u2013137. Springer, Heidelberg (2003)"},{"key":"5_CR24","first-page":"189","volume-title":"Program Flow Analysis: Theory and Applications, ch.7","author":"M. Sharir","year":"1981","unstructured":"Sharir, M., Pnueli, A.: Two approaches to interprocedural data flow analysis. In: Muchnick, S.S., Jones, N.D. (eds.) Program Flow Analysis: Theory and Applications, ch.7, pp. 189\u2013233. Prentice-Hall, Englewood Cliffs (1981)"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Shivers, O.: Control flow analysis in scheme. In: Proceedings of PLDI 1988, pp. 164\u2013174 (1988)","DOI":"10.1145\/53990.54007"},{"key":"5_CR26","unstructured":"SPEC JVM 1998 Benchmarks, \n                    \n                      http:\/\/www.spec.org\/osg\/jvm98\/"},{"key":"5_CR27","unstructured":"Vall\u00e9e-Rai, R.: Ashes suite collection, \n                    \n                      http:\/\/www.sable.mcgill.ca\/ashes\/"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-45337-7_6","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"T. Wang","year":"2001","unstructured":"Wang, T., Smith, S.F.: Precise constraint-based type inference for Java. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, pp. 99\u2013117. Springer, Heidelberg (2001)"},{"key":"5_CR29","first-page":"131","volume-title":"Proceedings of PLDI 2004","author":"J. Whaley","year":"2004","unstructured":"Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: Proceedings of PLDI 2004, pp. 131\u2013144. ACM Press, New York (2004)"},{"key":"5_CR30","first-page":"1","volume-title":"Proceedings of PLDI 1995","author":"R.P. Wilson","year":"1995","unstructured":"Wilson, R.P., Lam, M.S.: Efficient context-sensitive pointer analysis for C programs. In: Proceedings of PLDI 1995, pp. 1\u201312. ACM Press, New York (1995)"},{"key":"5_CR31","first-page":"145","volume-title":"Proceedings of PLDI 2004","author":"J. Zhu","year":"2004","unstructured":"Zhu, J., Calman, S.: Symbolic pointer analysis revisited. In: Proceedings of PLDI 2004, pp. 145\u2013157. ACM Press, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Compiler Construction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11688839_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T01:15:42Z","timestamp":1552353342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11688839_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540330509","9783540330516"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11688839_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}