{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:41:02Z","timestamp":1725536462206},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642032363"},{"type":"electronic","value":"9783642032370"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03237-0_16","type":"book-chapter","created":{"date-parts":[[2009,8,3]],"date-time":"2009-08-03T05:24:37Z","timestamp":1249277077000},"page":"222-237","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Pointer Analysis Using Bisimilarity"],"prefix":"10.1007","author":[{"given":"Luke","family":"Simon","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","volume-title":"Compilers: principles, techniques, and tools","year":"2007","unstructured":"Aho, A.V., Lam, M.S., Sethi, R., Ullman, J.D. (eds.): Compilers: principles, techniques, and tools, 2nd edn. Pearson\/Addison Wesley, Boston (2007)","edition":"2"},{"key":"16_CR2","unstructured":"Andersen, L.O.: Program Analysis and Specialization for the C Programming Language. PhD thesis, DIKU, University of Copenhagen (DIKU report 94\/19) (May 1994)"},{"issue":"5","key":"16_CR3","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/780822.781144","volume":"38","author":"M. Berndl","year":"2003","unstructured":"Berndl, M., Lhot\u00e1k, O., Qian, F., Hendren, L., Umanee, N.: Points-to analysis using BDDs. ACM SIGPLAN Notices\u00a038(5), 103\u2013114 (2003)","journal-title":"ACM SIGPLAN Notices"},{"key":"16_CR4","volume-title":"Model Checking","author":"E.M. Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"issue":"1","key":"16_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/151646.151648","volume":"15","author":"R. Cleaveland","year":"1993","unstructured":"Cleaveland, R.: The concurrency workbench: A semantics-based verification tool for the verification of concurrent systems. ACM Transactions on Programming Languages and Systems\u00a015(1), 36\u201372 (1993)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"1-3","key":"16_CR6","first-page":"221","volume":"311","author":"A. Dovier","year":"2004","unstructured":"Dovier, A., Piazza, C., Policriti, A.: An efficient algorithm for computing bisimulation equivalence. Theor.\u00a0Comput.\u00a0Sci.\u00a0311(1-3), 221\u2013256 (2004)","journal-title":"Theor.\u00a0Comput.\u00a0Sci."},{"issue":"5","key":"16_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/277652.277667","volume":"33","author":"M. F\u00e4hndrich","year":"1998","unstructured":"F\u00e4hndrich, M., Foster, J.S., Su, Z., Aiken, A.: Partial online cycle elimination in inclusion constraint graphs. ACM SIGPLAN Notices\u00a033(5), 85\u201396 (1998)","journal-title":"ACM SIGPLAN Notices"},{"issue":"9","key":"16_CR8","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/32.629493","volume":"23","author":"R. Focardi","year":"1997","unstructured":"Focardi, R., Gorrieri, R.: The compositional security checker: A tool for the verification of information flow security properties. IEEE Trans. Software Eng.\u00a023(9), 550\u2013571 (1997)","journal-title":"IEEE Trans. Software Eng."},{"key":"16_CR9","first-page":"290","volume-title":"PLDI","author":"B. Hardekopf","year":"2007","unstructured":"Hardekopf, B., Lin, C.: The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code. In: Ferrante, J., McKinley, K.S. (eds.) PLDI, pp. 290\u2013299. ACM Press, New York (2007)"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-540-74061-2_17","volume-title":"Static Analysis","author":"B. Hardekopf","year":"2007","unstructured":"Hardekopf, B., Lin, C.: Exploiting pointer and location equivalence to optimize pointer analysis. In: Riis Nielson, H., Fil\u00e9, G. (eds.) SAS 2007. LNCS, vol.\u00a04634, pp. 265\u2013280. Springer, Heidelberg (2007)"},{"issue":"5","key":"16_CR11","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1145\/381694.378855","volume":"36","author":"N. Heintze","year":"2001","unstructured":"Heintze, N., Tardieu, O.: Ultra-fast aliasing analysis using CLA: A million lines of C code in a second. ACM SIGPLAN Notices\u00a036(5), 254\u2013263 (2001)","journal-title":"ACM SIGPLAN Notices"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-45937-5_16","volume-title":"Compiler Construction","author":"G.C. Necula","year":"2002","unstructured":"Necula, G.C., McPeak, S., Rahul, S.P., Weimer, W.: CIL: Intermediate language and tools for analysis and transformation of C programs. In: Horspool, R.N. (ed.) CC 2002. LNCS, vol.\u00a02304, pp. 213\u2013228. Springer, Heidelberg (2002)"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0020-0190(94)90047-7","volume":"49","author":"E. Nuutila","year":"1993","unstructured":"Nuutila, E., Soisalon-Soininen, E.: On finding the strongly connected components in a directed graph. Information Processing Letters\u00a049, 9\u201314 (1993)","journal-title":"Information Processing Letters"},{"issue":"6","key":"16_CR14","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1137\/0216062","volume":"16","author":"R. Paige","year":"1987","unstructured":"Paige, R., Tarjan, R.E.: Three partition refinement algorithms. SIAM J. Comput.\u00a016(6), 973\u2013989 (1987)","journal-title":"SIAM J. Comput."},{"key":"16_CR15","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/996821.996835","volume-title":"PASTE","author":"D.J. Pearce","year":"2004","unstructured":"Pearce, D.J., Kelly, P.H.J., Hankin, C.: Efficient field-sensitive pointer analysis for C. In: Flanagan, C., Zeller, A. (eds.) PASTE, pp. 37\u201342. ACM Press, New York (2004)"},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1290520.1290524","volume":"30","author":"D.J. Pearce","year":"2007","unstructured":"Pearce, D.J., Kelly, P.H.J., Hankin, C.: Efficient field-sensitive pointer analysis of C. ACM Transactions on Programming Languages and Systems\u00a030(1), 4:1\u20134:42 (2007)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"5","key":"16_CR17","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/358438.349310","volume":"35","author":"A. Rountev","year":"2000","unstructured":"Rountev, A., Chandra, S.: Off-line variable substitution for scaling points-to analysis. ACM SIGPLAN Notices\u00a035(5), 47\u201356 (2000)","journal-title":"ACM SIGPLAN Notices"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03237-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T06:18:18Z","timestamp":1685081898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03237-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642032363","9783642032370"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03237-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}