{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:24Z","timestamp":1763467824240},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403258"},{"type":"electronic","value":"9783540448983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44898-5_12","type":"book-chapter","created":{"date-parts":[[2007,11,11]],"date-time":"2007-11-11T03:21:25Z","timestamp":1194751285000},"page":"214-236","source":"Crossref","is-referenced-by-count":29,"title":["Client-Driven Pointer Analysis"],"prefix":"10.1007","author":[{"given":"Samuel Z.","family":"Guyer","sequence":"first","affiliation":[]},{"given":"Calvin","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,13]]},"reference":[{"key":"12_CR1","unstructured":"L. Andersen. Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, DIKU, DIKU report 94\/19, 1994."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"T. Ball and S. K. Rajamani. Automatically validating temporal safety properties of interfaces. In International SPIN Workshop on Model Checking of Software, May 2001.","DOI":"10.1007\/3-540-45139-0_7"},{"issue":"6","key":"12_CR3","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1145\/93548.93585","volume":"25","author":"D. R. Chase","year":"1990","unstructured":"D. R. Chase, M. Wegman, and F. K. Zadeck. Analysis of pointers and structures. ACM SIGPLAN Notices, 25(6):296\u2013310, June 1990.","journal-title":"ACM SIGPLAN Notices"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"R. Cytron, J. Ferrante, B. K. Rosen, M. K. Wegman, and F. K. Zadeck. An efficient method of computing static single assignment form. In 16th Annual ACM Symposium on Principles of Programming Languages, pages 25\u201335, 1989.","DOI":"10.1145\/75277.75280"},{"issue":"5","key":"12_CR5","first-page":"57","volume":"37","author":"M. Das","year":"2002","unstructured":"M. Das, S. Lerner, and M. Seigle. ESP: path-sensitive program verification in polynomial time. In ACM SIGPLAN Conference on Programming Language Design and Implementation, volume 37, 5, pages 57\u201368, 2002.","journal-title":"ACM SIGPLAN Conference on Programming Language Design and Implementation"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"A. Diwan, K. S. McKinley, and J. E. B. Moss. Using types to analyze and optimize object-oriented programs. ACM Transactions on Programming Languages and Systems, 23, 2001.","DOI":"10.1145\/383721.383732"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"J. S. Foster, M. Fahndrich, and A. Aiken. Polymorphic versus monomorphic flow-insensitive points-to analysis for C. In Static Analysis Symposium, pages 175\u2013198, 2000.","DOI":"10.1007\/978-3-540-45099-3_10"},{"issue":"5","key":"12_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/512529.512531","volume":"37","author":"J. S. Foster","year":"2002","unstructured":"J. S. Foster, T. Terauchi, and A. Aiken. Flow-sensitive type qualifiers. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, volume 37(5) of ACM SIGPLAN Notices, pages 1\u201312, 2002.","journal-title":"Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"S. Z. Guyer and C. Lin. An annotation language for optimizing software libraries. In Second Conference on Domain Specific Languages, pages 39\u201352, October 1999.","DOI":"10.1145\/331960.331970"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"S. Z. Guyer and C. Lin. Optimizing the use of high performance software libraries. In Languages and Compilers for Parallel Computing, pages 221\u2013238, August 2000.","DOI":"10.1007\/3-540-45574-4_15"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"N. Heintze and O. Tardieu. Demand-driven pointer analysis. In ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 24\u201334, 2001.","DOI":"10.1145\/378795.378802"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"M. Hind. Pointer analysis: Haven\u2019t we solved this problem yet? In Proceedings of the 2001 ACM SIGPLAN \u2014 SIGSOFT Workshop on Program Analysis for Software Tools and Engeneering (PASTE-01), pages 54\u201361, 2001.","DOI":"10.1145\/379605.379665"},{"issue":"1","key":"12_CR13","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/S0167-6423(00)00014-9","volume":"39","author":"M. Hind","year":"2001","unstructured":"M. Hind and A. Pioli. Evaluating the effectiveness of pointer alias analyses. Science of Computer Programming, 39(1):31\u201355, January 2001.","journal-title":"Science of Computer Programming"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"S. Horwitz, T. Reps, and M. Sagiv. Demand Interprocedural Dataflow Analysis. In Proceedings of SIGSOFT\u201995 Third ACM SIGSOFT Symposium on the Foundations of Software Engineering, pages 104\u2013115, October 1995.","DOI":"10.1145\/222124.222146"},{"issue":"10","key":"12_CR15","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1145\/191081.191130","volume":"29","author":"J. Plevyak","year":"1994","unstructured":"J. Plevyak and A. A. Chien. Precise concrete type inference for object-oriented languages. ACM SIGPLAN Notices, 29(10):324\u2013324, October 1994.","journal-title":"ACM SIGPLAN Notices"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"E. Ruf. Context-insensitive alias analysis reconsidered. In SIGPLAN Conference on Programming Language Design and Implementation, pages 13\u201322, 1995.","DOI":"10.1145\/207110.207112"},{"key":"12_CR17","unstructured":"U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proceedings of the 10th USENIX Security Symposium, 2001."},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"M. Shapiro and S. Horwitz. The effects of the precision of pointer analysis. Lecture Notes in Computer Science, 1302, 1997.","DOI":"10.1007\/BFb0032731"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"P. Stocks, B. G. Ryder, W. Landi, and S. Zhang. Comparing flow and context sensitivity on the modification-side-effects problem. In International Symposium on Software Testing and Analysis, pages 21\u201331, 1998.","DOI":"10.1145\/271771.271782"},{"issue":"1","key":"12_CR20","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/TSE.1986.6312929","volume":"12","author":"R. Strom","year":"1986","unstructured":"R. Strom and S. Yemini. Typestate: A programming language concept for enhancing software reliabiity. IEEE Transactions on Software Engineering, 12(1):157\u2013171, 1986.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR21","unstructured":"L. Wall, T. Christiansen, and J. Orwant. Programming Perl, 3rd Edition. O\u2019Reilly, July 2000."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"R. P. Wilson and M. S. Lam. Efficient context-sensitive pointer analysis for C programs. In Proceedings of the ACM SIGPLAN\u201995 Conference on Programming Language Design and Implementation, pages 1\u201312, 1995.","DOI":"10.1145\/207110.207111"},{"issue":"7","key":"12_CR23","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/277633.277635","volume":"33","author":"S. Zhang","year":"1998","unstructured":"S. Zhang, B. G. Ryder, and W. A. Landi. Experiments with combined analysis for pointer aliasing. ACM SIGPLAN Notices, 33(7):11\u201318, July 1998.","journal-title":"ACM SIGPLAN Notices"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44898-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T17:43:11Z","timestamp":1684086191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44898-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403258","9783540448983"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-44898-5_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}