{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:24:38Z","timestamp":1749792278508,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031077265"},{"type":"electronic","value":"9783031077272"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-07727-2_18","type":"book-chapter","created":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T01:12:12Z","timestamp":1654045932000},"page":"322-340","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Scalable Typestate Analysis for\u00a0Low-Latency Environments"],"prefix":"10.1007","author":[{"given":"Alen","family":"Arslanagi\u0107","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pavle","family":"Suboti\u0107","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jorge A.","family":"P\u00e9rez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,6,1]]},"reference":[{"unstructured":"RAIL model. https:\/\/web.dev\/rail\/. Accessed 30 Sep 2021","key":"18_CR1"},{"unstructured":"Infer TOPL (2021). https:\/\/fbinfer.com\/docs\/checker-topl\/","key":"18_CR2"},{"unstructured":"Arslanagi\u0107, A., Suboti\u0107, P., P\u00e9rez, J.A.: Scalable Typestate Analysis for Low-Latency Environments (Extended Version). CoRR abs\/2201.10627 (2022). https:\/\/arxiv.org\/abs\/2201.10627","key":"18_CR3"},{"doi-asserted-by":"publisher","unstructured":"Arslanagi\u0107, A., Suboti\u0107, P., P\u00e9rez, J.A.: LFA checker: scalable typestate analysis for low-latency environments (2022). https:\/\/doi.org\/10.5281\/zenodo.6393183","key":"18_CR4","DOI":"10.5281\/zenodo.6393183"},{"doi-asserted-by":"publisher","unstructured":"Bierhoff, K., Aldrich, J.: Modular typestate checking of aliased objects. In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications, pp. 301\u2013320. OOPSLA 2007, Association for Computing Machinery, New York, NY, USA (2007). https:\/\/doi.org\/10.1145\/1297027.1297050","key":"18_CR5","DOI":"10.1145\/1297027.1297050"},{"issue":"3","key":"18_CR6","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10009-010-0183-5","volume":"14","author":"E Bodden","year":"2012","unstructured":"Bodden, E., Hendren, L.: The Clara framework for hybrid typestate analysis. Int. J. Softw. Tools Technol. Transf. 14(3), 307\u2013326 (2012)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-20398-5_33","volume-title":"NASA Formal Methods","author":"C Calcagno","year":"2011","unstructured":"Calcagno, C., Distefano, D.: Infer: an automatic program verifier for memory safety of C programs. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 459\u2013465. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20398-5_33"},{"unstructured":"Deline, R., F\u00e4hndrich, M.: The fugue protocol checker: is your software baroque? Technical report MSR-TR-2004-07, Microsoft Research, April 2004","key":"18_CR8"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-540-24851-4_21","volume-title":"ECOOP 2004 \u2013 Object-Oriented Programming","author":"R DeLine","year":"2004","unstructured":"DeLine, R., F\u00e4hndrich, M.: Typestates for objects. In: Odersky, M. (ed.) ECOOP 2004. LNCS, vol. 3086, pp. 465\u2013490. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24851-4_21"},{"doi-asserted-by":"publisher","unstructured":"Emmi, M., et al.: RAPID: checking API usage for the cloud in the cloud. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1416\u20131426. ESEC\/FSE 2021, Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3468264.3473934","key":"18_CR10","DOI":"10.1145\/3468264.3473934"},{"unstructured":"Fahndrich, M., Leino, R.: Heap monotonic typestate. In: Proceedings of the first International Workshop on Alias Confinement and Ownership (IWACO), July 2003. https:\/\/www.microsoft.com\/en-us\/research\/publication\/heap-monotonic-typestate\/","key":"18_CR11"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-642-18070-5_2","volume-title":"Formal Verification of Object-Oriented Software","author":"M F\u00e4hndrich","year":"2011","unstructured":"F\u00e4hndrich, M., Logozzo, F.: Static contract checking with abstract interpretation. In: Beckert, B., March\u00e9, C. (eds.) FoVeOOS 2010. LNCS, vol. 6528, pp. 10\u201330. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18070-5_2"},{"doi-asserted-by":"publisher","unstructured":"Jakobsen, M., Ravier, A., Dardha, O.: Papaya: global typestate analysis of aliased objects. In: 23rd International Symposium on Principles and Practice of Declarative Programming. PPDP 2021, Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3479394.3479414","key":"18_CR13","DOI":"10.1145\/3479394.3479414"},{"doi-asserted-by":"crossref","unstructured":"Kellogg, M., Ran, M., Sridharan, M., Sch\u00e4f, M., Ernst, M.D.: Verifying object construction. In: ICSE 2020, Proceedings of the 42nd International Conference on Software Engineering. Seoul, Korea, May 2020","key":"18_CR14","DOI":"10.1145\/3377811.3380341"},{"doi-asserted-by":"crossref","unstructured":"Khedker, U., Sanyal, A., Sathe, B.: Data Flow Analysis: Theory and Practice. CRC Press, Boca Raton (2017). https:\/\/books.google.rs\/books?id=9PyrtgNBdg0C","key":"18_CR15","DOI":"10.1201\/9780849332517"},{"doi-asserted-by":"publisher","unstructured":"Lam, P., Kuncak, V., Rinard, M.: Generalized typestate checking using set interfaces and pluggable analyses. SIGPLAN Not. 39(3), 46\u201355 (2004). https:\/\/doi.org\/10.1145\/981009.981016","key":"18_CR16","DOI":"10.1145\/981009.981016"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-11970-5_8","volume-title":"Compiler Construction","author":"NA Naeem","year":"2010","unstructured":"Naeem, N.A., Lhot\u00e1k, O., Rodriguez, J.: Practical extensions to the IFDS algorithm. In: Gupta, R. (ed.) CC 2010. LNCS, vol. 6011, pp. 124\u2013144. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11970-5_8"},{"doi-asserted-by":"publisher","unstructured":"Paul, R., Turzo, A.K., Bosu, A.: Why security defects go unnoticed during code reviews? A case-control study of the chromium OS project. In: 43rd IEEE\/ACM International Conference on Software Engineering, ICSE 2021, Madrid, Spain, 22\u201330 May 2021, pp. 1373\u20131385. IEEE (2021). https:\/\/doi.org\/10.1109\/ICSE43902.2021.00124","key":"18_CR18","DOI":"10.1109\/ICSE43902.2021.00124"},{"doi-asserted-by":"publisher","unstructured":"Reps, T., Horwitz, S., Sagiv, M.: precise interprocedural dataflow analysis via graph reachability. In: Proceedings of the 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 49\u201361. POPL 1995, Association for Computing Machinery, New York, NY, USA (1995). https:\/\/doi.org\/10.1145\/199448.199462","key":"18_CR19","DOI":"10.1145\/199448.199462"},{"doi-asserted-by":"publisher","unstructured":"Strom, R.E., Yemini, S.: Typestate: a programming language concept for enhancing software reliability. IEEE Trans. Softw. Eng. 12(1), 157\u2013171 (1986). https:\/\/doi.org\/10.1109\/TSE.1986.6312929","key":"18_CR20","DOI":"10.1109\/TSE.1986.6312929"},{"doi-asserted-by":"crossref","unstructured":"Suboti\u0107, P., Miliki\u0107, L., Stoji\u0107, M.: A static analysis framework for data science notebooks. In: ICSE 2022: The 44th International Conference on Software Engineering, 21\u201329 May 2022","key":"18_CR21","DOI":"10.1109\/ICSE-SEIP55303.2022.9794067"},{"doi-asserted-by":"publisher","unstructured":"Szab\u00f3, T., Erdweg, S., Voelter, M.: IncA: a DSL for the definition of incremental program analyses. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, pp. 320\u2013331. ASE 2016, Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2970276.2970298","key":"18_CR22","DOI":"10.1145\/2970276.2970298"},{"doi-asserted-by":"publisher","unstructured":"Yahav, E., Fink, S.: The SAFE Experience, pp. 17\u201333. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19823-6_3","key":"18_CR23","DOI":"10.1007\/978-3-642-19823-6_3"}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-07727-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T21:57:27Z","timestamp":1675720647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-07727-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031077265","9783031077272"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-07727-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Integrated Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lugano","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ifm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifmconference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Also includes: 1 abstract of an invited talk, 2 invited papers, 7 extended abstracts of presentations accepted at PhD symposium","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}