{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:28:39Z","timestamp":1763105319302,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642329425"},{"type":"electronic","value":"9783642329432"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32943-2_6","type":"book-chapter","created":{"date-parts":[[2012,8,28]],"date-time":"2012-08-28T04:59:35Z","timestamp":1346129975000},"page":"74-89","source":"Crossref","is-referenced-by-count":14,"title":["Definite Expression Aliasing Analysis for Java Bytecode"],"prefix":"10.1007","author":[{"given":"\u0110urica","family":"Nikoli\u0107","sequence":"first","affiliation":[]},{"given":"Fausto","family":"Spoto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Soot: A Java Optimization Framework, http:\/\/www.sable.mcgill.ca\/soot\/"},{"key":"6_CR2","unstructured":"WALA: T.J. Watson Libraries for Analysis, http:\/\/wala.sourceforge.net\/"},{"key":"6_CR3","unstructured":"Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques and Tools. Addison-Wesley (1986)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-15769-1_7","volume-title":"Static Analysis","author":"E. Albert","year":"2010","unstructured":"Albert, E., Arenas, P., Genaim, S., Puebla, G., Ram\u00edrez Deantes, D.V.: From Object Fields to Local Variables: A Practical Approach to Field-Sensitive Analysis. In: Cousot, R., Martel, M. (eds.) SAS 2010. LNCS, vol.\u00a06337, pp. 100\u2013116. Springer, Heidelberg (2010)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints. In: Proc. of the 4th Symp. on Principles of Programming Languages (POPL), pp. 238\u2013252. ACM (1977)","DOI":"10.1145\/512950.512973"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Fink, S., Yahav, E., Dor, N., Ramalingam, G., Geay, E.: Effective Typestate Verification in the Presence of Aliasing. In: Proc. of the International Symposium on Software Testing and Analysis (ISSTA), pp. 133\u2013144. ACM (2006)","DOI":"10.1145\/1146238.1146254"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Hind, M.: Pointer Analysis: Haven\u2019t We Solved This Problem Yet? In: Proc. of the Workshop on Prog. Analysis for Software Tools and Engineering (PASTE), pp. 54\u201361. ACM (2001)","DOI":"10.1145\/379605.379665"},{"key":"6_CR8","unstructured":"Lindholm, T., Yellin, F.: The Java TM Virtual Machine Specification, 2nd edn. Addison-Wesley (1999)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-540-78791-4_14","volume-title":"Compiler Construction","author":"F. Logozzo","year":"2008","unstructured":"Logozzo, F., F\u00e4hndrich, M.: On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis. In: Hendren, L. (ed.) CC 2008. LNCS, vol.\u00a04959, pp. 197\u2013212. Springer, Heidelberg (2008)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, \u0110., Spoto, F.: Definite Expression Aliasing Analysis for Java Bytecode, http:\/\/profs.sci.univr.it\/~nikolic\/download\/ICTAC2012\/ICTAC2012Ext.pdf","DOI":"10.1007\/978-3-642-32943-2_6"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Nikoli\u0107, \u0110., Spoto, F.: Reachability Analysis of Program Variables. In: Gramlich, B., Miller, D., Sattler, U. (eds.) IJCAR 2012. LNCS (LNAI), vol.\u00a07364, pp. 423\u2013438. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-31365-3_33"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Ohata, F., Inoue, K.: JAAT: Java Alias Analysis Tool for Program Maintenance Activities. In: Proc. of the 9th International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC), pp. 232\u2013244. IEEE (2006)","DOI":"10.1109\/ISORC.2006.43"},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10270-009-0132-5","volume":"10","author":"F. Spoto","year":"2011","unstructured":"Spoto, F.: Precise Null-pointer Analysis. Software and Syst. Modeling\u00a010(2), 219\u2013252 (2011)","journal-title":"Software and Syst. Modeling"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Spoto, F., Ernst, M.D.: Inference of Field Initialization. In: Proc. of the 33rd International Conference on Software Engineering (ICSE), pp. 231\u2013240. ACM (2011)","DOI":"10.1145\/1985793.1985826"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32943-2_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T10:33:50Z","timestamp":1744022030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32943-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642329425","9783642329432"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32943-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}