{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T05:28:26Z","timestamp":1741152506945,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642198601"},{"type":"electronic","value":"9783642198618"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19861-8_5","type":"book-chapter","created":{"date-parts":[[2011,3,14]],"date-time":"2011-03-14T17:39:26Z","timestamp":1300124366000},"page":"62-81","source":"Crossref","is-referenced-by-count":5,"title":["Probabilistic Points-to Analysis for Java"],"prefix":"10.1007","author":[{"given":"Qiang","family":"Sun","sequence":"first","affiliation":[]},{"given":"Jianjun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yuting","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Das, M., Liblit, B., F\u00e4hndrich, M., Rehof, J.: Estimating the impact of scalable pointer analysis on optimization. In: Proceedings of the 8th International Static Analysis Symposium, pp. 260\u2013278 (2001)","DOI":"10.1007\/3-540-47764-0_15"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Hind, M., Pioli, A.: Which pointer analysis should I use? In: Proceedings of the 2000 ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 113\u2013123 (2000)","DOI":"10.1145\/347636.348916"},{"issue":"6","key":"5_CR3","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/32.926173","volume":"27","author":"R. Chatterjee","year":"2001","unstructured":"Chatterjee, R., Ryder, B.G., Landi, W.A.: Complexity of points-to analysis of Java in the presence of exceptions. IEEE Transactions on Software Engineering\u00a027(6), 481\u2013512 (2001)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1044834.1044835","volume":"14","author":"A. Milanova","year":"2002","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to analysis for Java. ACM Transactions on Software Engineering and Methodology\u00a014, 1\u201341 (2002)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation, pp. 131\u2013144 (2004)","DOI":"10.1145\/996841.996859"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Choi, J.D., Burke, M., Carini, P.: Efficient flow-sensitive interprocedural computation of pointer-induced aliases and side effects. In: Proceedings of the 20th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 232\u2013245 (1993)","DOI":"10.1145\/158511.158639"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Hardekopf, B., Lin, C.: Semi-sparse flow-sensitive pointer analysis. In: Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 226\u2013238 (2009)","DOI":"10.1145\/1480881.1480911"},{"issue":"10","key":"5_CR8","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/TPDS.2004.56","volume":"15","author":"P.S. Chen","year":"2004","unstructured":"Chen, P.S., Hwang, Y.S., Ju, R.D.C., Lee, J.K.: Interprocedural probabilistic pointer analysis. IEEE Transactions on Parallel and Distributed Systems\u00a015(10), 893\u2013907 (2004)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Oancea, C.E., Mycroft, A., Harris, T.: A lightweight in-place implementation for software thread-level speculation. In: Proceedings of the 21st Annual ACM Symposium on Parallel Algorithms and Architectures, pp. 223\u2013232 (2009)","DOI":"10.1145\/1583991.1584050"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Scholz, B., Horspool, R.N., Knoop, J.: Optimizing for space and time usage with speculative partial redundancy elimination. In: Proceedings of the 2004 ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp. 221\u2013230 (2004)","DOI":"10.1145\/997163.997195"},{"key":"5_CR11","unstructured":"Dai, X., Zhai, A., chung Hsu, W., chung Yew, P.: A general compiler framework for speculative optimizations using data speculative code motion. In: Proceedings of the 2005 International Symposium on Code Generation and Optimization, pp. 280\u2013290 (2005)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Dean, J., Grove, D., Chambers, C.: Optimization of object-oriented programs using static class hierarchy analysis. In: Proceedings of the 9th European Conference on Object-Oriented Programming, pp. 77\u2013101 (1995)","DOI":"10.1007\/3-540-49538-X_5"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Bacon, D.F., Sweeney, P.F.: Fast static analysis of C++ virtual function calls. In: Proceedings of the 1996 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications, pp. 324\u2013341 (1996)","DOI":"10.1145\/236338.236371"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Sundaresan, V., Hendren, L., Razafimahefa, C., Vall\u00e9e-Rai, R., Lam, P., Gagnon, E., Godin, C.: Practical virtual method call resolution for Java. In: Proceedings of the 2000 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications, pp. 264\u2013280 (2000)","DOI":"10.1145\/354222.353189"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Ramalingam, G.: Data flow frequency analysis. In: Proceedings of the 1996 Conference on Programming Language Design and Implementation, pp. 267\u2013277 (1996)","DOI":"10.1145\/231379.231433"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Wu, Y., Larus, J.R.: Static branch frequency and program profile analysis. In: Proceedings of the 27th Annual International Symposium on Microarchitecture, pp. 1\u201311 (1994)","DOI":"10.1145\/192724.192725"},{"key":"5_CR17","unstructured":"Vall\u00e9e-Rai, R., Hendren, L.J.: Jimple: simplifying Java bytecode for analyses and transformations. Sable technical report, McGill (1998)"},{"key":"5_CR18","unstructured":"Vall\u00e9e-Rai, R.: The Jimple framework. Sable technical report, McGill (1998)"},{"key":"5_CR19","unstructured":"Soot: http:\/\/www.sable.mcgill.ca\/soot"},{"issue":"4","key":"5_CR20","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1145\/325478.325519","volume":"21","author":"M. Hind","year":"1999","unstructured":"Hind, M., Burke, M., Carini, P., deok Choi, J.: Interprocedural pointer alias analysis. ACM Transactions on Programming Languages and Systems\u00a021(4), 848\u2013894 (1999)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"5_CR21","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","volume":"10","author":"H. Do","year":"2004","unstructured":"Do, H., Elbaum, S., Rothermel, G.: Infrastructure support for controlled experimentation with software testing and regression testing techniques. Empirical Software Engineering: An International Journal\u00a010, 405\u2013435 (2004)","journal-title":"Empirical Software Engineering: An International Journal"},{"key":"5_CR22","unstructured":"Ashes Suite Collection, http:\/\/www.sable.mcgill.ca\/software"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Blackburn, S.M., Garner, R., Hoffman, C., Khan, A.M., McKinley, K.S., Bentzur, R., Diwan, A., Feinberg, D., Frampton, D., Guyer, S.Z., Hirzel, M., Hosking, A., Jump, M., Lee, H., Moss, J.E.B., Phansalkar, A., Stefanovi\u0107, D., VanDrunen, T., von Dincklage, D., Wiedermann, B.: The DaCapo benchmarks: Java benchmarking development and analysis. In: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications, pp. 169\u2013190 (2006)","DOI":"10.1145\/1167473.1167488"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Hind, M.: Pointer analysis: haven\u2019t we solved this problem yet? In: Proceedings of the 2001 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, pp. 54\u201361 (2001)","DOI":"10.1145\/379605.379665"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Emami, M., Ghiya, R., Hendren, L.J.: Context-sensitive interprocedural points-to analysis in the presence of function pointers. In: Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation, pp. 242\u2013256 (1994)","DOI":"10.1145\/773473.178264"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Landi, W., Ryder, B.G., Zhang, S.: Interprocedural modification side effect analysis with pointer aliasing. In: Proceedings of the ACM SIGPLAN 1993 Conference on Programming Language Design and Implementation, pp. 56\u201367 (1993)","DOI":"10.1145\/173262.155096"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Whaley, J., Rinard, M.: Compositional pointer and escape analysis for Java programs. In: Proceedings of the 14th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications, pp. 187\u2013206 (1999)","DOI":"10.1145\/320385.320400"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Wilson, R., Lam, M.S.: Efficient context-sensitive pointer analysis for C programs. In: Proceedings of the ACM SIGPLAN 1995 Conference on Programming Language Design and Implementation, pp. 1\u201312 (1995)","DOI":"10.1145\/223428.207111"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Yu, H., Xue, J., Huo, W., Feng, X., Zhang, Z.: Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code. In: Proceedings of the 8th International Symposium on Code Generation and Optimization, pp. 218\u2013229 (2010)","DOI":"10.1145\/1772954.1772985"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Steensgaard, B.: Points-to analysis in almost linear time. In: Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 32\u201341 (1996)","DOI":"10.1145\/237721.237727"},{"key":"5_CR31","unstructured":"Andersen, L.: Program analysis and specialization for the C programming language. DIKU report 94-19, University of Copenhagen (1994)"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-45099-3_10","volume-title":"Static Analysis","author":"J.S. Foster","year":"2000","unstructured":"Foster, J.S., F\u00e4hndrich, M., Aiken, A.: Polymorphic versus monomorphic flow-insensitive points-to analysis for C. In: SAS 2000. LNCS, vol.\u00a01824, pp. 175\u2013199. Springer, Heidelberg (2000)"},{"key":"5_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/11688839_5","volume-title":"Compiler Construction","author":"O. Lhot\u00e1k","year":"2006","unstructured":"Lhot\u00e1k, O., Hendren, L.: Context-sensitive points-to analysis: Is it worth it? In: Mycroft, A., Zeller, A. (eds.) CC 2006. LNCS, vol.\u00a03923, pp. 47\u201364. Springer, Heidelberg (2006)"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Silva, J.D., Steffan, J.G.: A probabilistic pointer analysis for speculative optimizations. In: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 416\u2013425 (2006)","DOI":"10.1145\/1168857.1168908"}],"container-title":["Lecture Notes in Computer Science","Compiler Construction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19861-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T08:29:35Z","timestamp":1741076975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19861-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642198601","9783642198618"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19861-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}