{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:05:04Z","timestamp":1725541504942},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642106712"},{"type":"electronic","value":"9783642106729"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10672-9_6","type":"book-chapter","created":{"date-parts":[[2009,12,2]],"date-time":"2009-12-02T09:08:11Z","timestamp":1259744891000},"page":"47-62","source":"Crossref","is-referenced-by-count":13,"title":["Scalable Context-Sensitive Points-to Analysis Using Multi-dimensional Bloom Filters"],"prefix":"10.1007","author":[{"given":"Rupesh","family":"Nasre","sequence":"first","affiliation":[]},{"given":"Kaushik","family":"Rajan","sequence":"additional","affiliation":[]},{"given":"R.","family":"Govindarajan","sequence":"additional","affiliation":[]},{"given":"Uday P.","family":"Khedker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Steensgaard, B.: Points-to analysis in almost linear time. In: POPL (1996)","DOI":"10.1145\/237721.237727"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Berndl, M., Lhotak, O., Qian, F., Hendren, L., Umanee, N.: Points-to analysis using BDDs. In: PLDI (2003)","DOI":"10.1145\/781131.781144"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Heintze, N., Tardieu, O.: Ultra-fast aliasing analysis using CLA: A million lines of C code in a second. In: PLDI (2001)","DOI":"10.1145\/378795.378855"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-36579-6_12","volume-title":"Compiler Construction","author":"O. Lhotak","year":"2003","unstructured":"Lhotak, O., Hendren, L.: Scaling Java points-to analysis using spark. In: Hedin, G. (ed.) CC 2003. LNCS, vol.\u00a02622, pp. 153\u2013169. Springer, Heidelberg (2003)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Emami, M., Ghiya, R., Hendren, L.J.: Context-sensitive interprocedural points-to analysis in the presence of function pointers. In: PLDI (1994)","DOI":"10.1145\/178243.178264"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Landi, W., Ryder, B.G., Zhang, S.: Interprocedural modification side effect analysis with pointer aliasing. In: PLDI (1993)","DOI":"10.1145\/155090.155096"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Whaley, J., Rinard, M.: Compositional pointer and escape analysis for java programs. In: OOPSLA (1999)","DOI":"10.1145\/320384.320400"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Wilson, R.P., Lam, M.S.: Efficient context-sensitive pointer analysis for C programs. In: PLDI (1995)","DOI":"10.1145\/207110.207111"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: PLDI (2004)","DOI":"10.1145\/996841.996859"},{"issue":"7","key":"6_CR10","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B.H. Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. In: SIGCOMM (1998)","DOI":"10.1145\/285237.285287"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Rugina, R., Rinard, M.: Pointer analysis for multithreaded programs. In: PLDI (1999)","DOI":"10.1145\/301618.301645"},{"key":"6_CR13","unstructured":"The LLVM compiler infrastructure, \n                    \n                      http:\/\/llvm.org"},{"key":"6_CR14","unstructured":"Standard Template Library, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Standard_Template_Library"},{"key":"6_CR15","unstructured":"Andersen, L.O.: Program analysis and specialization for the C programming language. PhD Thesis (1994)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Rountev, A., Chandra, S.: Offline variable substitution for scaling points-to analysis. In: PLDI (2000)","DOI":"10.1145\/349299.349310"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Das, M.: Unification-based pointer analysis with directional assignments. In: PLDI (2000)","DOI":"10.1145\/349299.349309"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Fahndrich, M., Rehof, J., Das, M.: Scalable context-sensitive flow analysis using instantiation constraints. In: PLDI (2000)","DOI":"10.1145\/349299.349332"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Kahlon, V.: Bootstrapping: a technique for scalable flow and context-sensitive pointer alias analysis. In: PLDI (2008)","DOI":"10.1145\/1375581.1375613"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Faehndrich, M., Foster, J.S., Su, Z., Aiken, A.: Partial online cycle elimination in inclusion constraint graphs. In: PLDI (1998)","DOI":"10.1145\/277650.277667"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-540-74061-2_17","volume-title":"Static Analysis","author":"B. Hardekopf","year":"2007","unstructured":"Hardekopf, B., Lin, C.: Exploiting pointer and location equivalence to optimize pointer analysis. In: Riis Nielson, H., Fil\u00e9, G. (eds.) SAS 2007. LNCS, vol.\u00a04634, pp. 265\u2013280. Springer, Heidelberg (2007)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Hardekopf, B., Lin, C.: Semi-sparse flow-sensitive pointer analysis. In: POPL (2009)","DOI":"10.1145\/1594834.1480911"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Zhu, J., Calman, S.: Symbolic pointer analysis revisited. In: PLDI (2004)","DOI":"10.1145\/996841.996860"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-540-85261-2_23","volume-title":"Languages and Compilers for Parallel Computing","author":"O. Lhotak","year":"2008","unstructured":"Lhotak, O., Curial, S., Amaral, J.N.: Using ZBDDs in points-to analysis. In: Adve, V., Garzar\u00e1n, M.J., Petersen, P. (eds.) LCPC 2007. LNCS, vol.\u00a05234, pp. 338\u2013352. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10672-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T16:58:12Z","timestamp":1558285092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10672-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642106712","9783642106729"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10672-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}