{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:05:28Z","timestamp":1725609928210},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540852605"},{"type":"electronic","value":"9783540852612"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85261-2_23","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T03:20:24Z","timestamp":1218511224000},"page":"338-352","source":"Crossref","is-referenced-by-count":6,"title":["Using ZBDDs in Points-to Analysis"],"prefix":"10.1007","author":[{"given":"Ond\u0159ej","family":"Lhot\u00e1k","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Curial","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Nelson","family":"Amaral","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Andersen, L.O.: Program Analysis and Specialization for the C Programming Language. PhD thesis, DIKU, Univ. of Copenhagen (DIKU report 94\/19) (May 1994)","key":"23_CR1"},{"doi-asserted-by":"crossref","unstructured":"Berndl, M., Lhot\u00e1k, O., Qian, F., Hendren, L., Umanee, N.: Points-to analysis using BDDs. In: Proceedings of PLDI 2003, pp. 103\u2013114 (2003)","key":"23_CR2","DOI":"10.1145\/781143.781144"},{"issue":"3","key":"23_CR3","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/136035.136043","volume":"24","author":"R.E. Bryant","year":"1992","unstructured":"Bryant, R.E.: Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Comput. Surv.\u00a024(3), 293\u2013318 (1992)","journal-title":"ACM Comput. Surv."},{"doi-asserted-by":"crossref","unstructured":"Coudert, O.: Solving graph optimization problems with ZBDDs. In: EDTC 1997: Proceedings of the 1997 European Conference on Design and Test, p. 224 (1997)","key":"23_CR4","DOI":"10.1109\/EDTC.1997.582363"},{"unstructured":"DaCapo Project. The DaCapo benchmark suite, http:\/\/www-ali.cs.umass.edu\/DaCapo\/gcbm.html","key":"23_CR5"},{"doi-asserted-by":"crossref","unstructured":"Emami, M., Ghiya, R., Hendren, L.J.: Context-sensitive interprocedural points-to analysis in the presence of function pointers. In: Proceedings of PLDI 1994, pp. 242\u2013256 (1994)","key":"23_CR6","DOI":"10.1145\/178243.178264"},{"doi-asserted-by":"crossref","unstructured":"Hardekopf, B., Lin, C.: The ant and the grasshopper: Fast and accurate pointer analysis for millions of lines of code. In: Proceedings of PLDI (2007)","key":"23_CR7","DOI":"10.1145\/1250734.1250767"},{"key":"23_CR8","first-page":"54","volume-title":"Proceedings of PASTE 2001","author":"M. Hind","year":"2001","unstructured":"Hind, M.: Pointer analysis: haven\u2019t we solved this problem yet? In: Proceedings of PASTE 2001, pp. 54\u201361. ACM Press, New York (2001)"},{"unstructured":"Lhot\u00e1k, O.: Spark: A flexible points-to analysis framework for Java. Master\u2019s thesis, McGill University (December 2002)","key":"23_CR9"},{"unstructured":"Lhot\u00e1k, O.: Program Analysis using Binary Decision Diagrams. PhD thesis, McGill University (January 2006)","key":"23_CR10"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-36579-6_12","volume-title":"Compiler Construction","author":"O. Lhot\u00e1k","year":"2003","unstructured":"Lhot\u00e1k, O., Hendren, L.: Scaling Java points-to analysis using Spark. In: Hedin, G. (ed.) CC 2003. LNCS, vol.\u00a02622, pp. 153\u2013169. Springer, Heidelberg (2003)"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1145\/996841.996861","volume-title":"Proceedings of PLDI 2004","author":"O. Lhot\u00e1k","year":"2004","unstructured":"Lhot\u00e1k, O., Hendren, L.: Jedd: a BDD-based relational extension of Java. In: Proceedings of PLDI 2004, pp. 158\u2013169. ACM Press, New York (2004)"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/11688839_5","volume-title":"Compiler Construction","author":"O. Lhot\u00e1k","year":"2006","unstructured":"Lhot\u00e1k, O., Hendren, L.: Context-sensitive points-to analysis: is it worth it? In: Mycroft, A., Zeller, A. (eds.) CC 2006. LNCS, vol.\u00a03923, pp. 47\u201364. Springer, Heidelberg (2006)"},{"unstructured":"Lind-Nielsen, J.: BuDDy, A Binary Decision Diagram Package, http:\/\/www.itu.dk\/research\/buddy\/","key":"23_CR14"},{"key":"23_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-58940-9","volume-title":"Algorithms and Data Structures in VLSI Design","author":"C. Meinel","year":"1998","unstructured":"Meinel, C., Theobald, T.: Algorithms and Data Structures in VLSI Design. Springer, New York (1998)"},{"unstructured":"Milanova, A.: Precise and Practical Flow Analysis of Object-Oriented Software. PhD thesis, Rutgers University (August 2003)","key":"23_CR16"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/566172.566174","volume-title":"Proceedings of ISSTA 2002","author":"A. Milanova","year":"2002","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to and side-effect analyses for Java. In: Proceedings of ISSTA 2002, pp. 1\u201311. ACM Press, New York (2002)"},{"issue":"1","key":"23_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1044834.1044835","volume":"14","author":"A. Milanova","year":"2005","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to analysis for Java. ACM Trans. Softw. Eng. Methodol.\u00a014(1), 1\u201341 (2005)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"doi-asserted-by":"crossref","unstructured":"Minato, S.: Zero-suppressed BDDs for set manipulation in combinatorial problems. In: DAC 1993: 30th International Conf. on Design Automation, pp. 272\u2013277 (1993)","key":"23_CR19","DOI":"10.1145\/157485.164890"},{"doi-asserted-by":"crossref","unstructured":"Minato, S.: Calculation of unate cube set algebra using zero-suppressed BDDs. In: 31st ACM\/IEEE Design Automation Conference (DAC 1994), pp. 420\u2013424 (1994)","key":"23_CR20","DOI":"10.1145\/196244.196446"},{"key":"23_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-1303-8","volume-title":"Binary decision diagrams and applications for VLSI CAD","author":"S. Minato","year":"1996","unstructured":"Minato, S.: Binary decision diagrams and applications for VLSI CAD. Kluwer Academic Publishers, Dordrecht (1996)"},{"issue":"2","key":"23_CR22","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/s100090100038","volume":"3","author":"S. Minato","year":"2001","unstructured":"Minato, S.: Zero-suppressed BDDs and their applications. International Journal on Software Tools for Technology Transfer (STTT)\u00a03(2), 156\u2013170 (2001)","journal-title":"International Journal on Software Tools for Technology Transfer (STTT)"},{"unstructured":"Mishchenko, A.: An introduction to zero-suppressed binary decision diagrams. Technical report, Portland State University (June 2001)","key":"23_CR23"},{"issue":"5","key":"23_CR24","first-page":"739","volume":"35","author":"H.G. Okuno","year":"1994","unstructured":"Okuno, H.G.: Reducing combinatorial explosions in solving search-type combinatorial problems with binary decision diagrams. Trans. of Information Processing Society of Japan (IPSJ) (in Japanese)\u00a035(5), 739\u2013753 (1994)","journal-title":"Trans. of Information Processing Society of Japan (IPSJ), (in Japanese)"},{"unstructured":"Standard Performance Evaluation Corporation. SPEC JVM98 benchmarks (1998), http:\/\/www.spec.org\/osg\/jvm98\/","key":"23_CR25"},{"key":"23_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-46423-9_2","volume-title":"Compiler Construction","author":"R. Vall\u00e9e-Rai","year":"2000","unstructured":"Vall\u00e9e-Rai, R., Gagnon, E., Hendren, L.J., Lam, P., Pominville, P., Sundaresan, V.: Optimizing Java bytecode using the Soot framework: Is it feasible? In: Watt, D.A. (ed.) CC 2000. LNCS, vol.\u00a01781, pp. 18\u201334. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: Proceedings of PLDI 2004, pp. 131\u2013144 (2004)","key":"23_CR27","DOI":"10.1145\/996841.996859"},{"key":"23_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/BFb0031826","volume-title":"Formal Methods in Computer-Aided Design","author":"T. Yoneda","year":"1996","unstructured":"Yoneda, T., Hatori, H., Takahara, A., Minato, S.: BDDs vs. zero-suppressed BDDs: for CTL symbolic model checking of petri nets. In: Srivas, M., Camilleri, A. (eds.) FMCAD 1996. LNCS, vol.\u00a01166, pp. 435\u2013449. Springer, Heidelberg (1996)"},{"doi-asserted-by":"crossref","unstructured":"Zhu, J.: Symbolic pointer analysis. In: Proceedings of the 2002 IEEE\/ACM International Conference on Computer-Aided Design, pp. 150\u2013157 (2002)","key":"23_CR29","DOI":"10.1145\/774572.774594"},{"doi-asserted-by":"crossref","unstructured":"Zhu, J., Calman, S.: Symbolic pointer analysis revisited. In: Proceedings of PLDI 2004, pp. 145\u2013157 (2004)","key":"23_CR30","DOI":"10.1145\/996841.996860"}],"container-title":["Lecture Notes in Computer Science","Languages and Compilers for Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85261-2_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:23:43Z","timestamp":1606166623000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85261-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540852605","9783540852612"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85261-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}