{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:16:15Z","timestamp":1770279375032,"version":"3.49.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T00:00:00Z","timestamp":1614384000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"publisher","award":["2016YFB1000201"],"award-info":[{"award-number":["2016YFB1000201"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012556","name":"Foundation for Innovative Research Groups","doi-asserted-by":"publisher","award":["61521092"],"award-info":[{"award-number":["61521092"]}],"id":[{"id":"10.13039\/501100012556","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802368,61872043"],"award-info":[{"award-number":["61802368,61872043"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,27]]},"DOI":"10.1109\/cgo51591.2021.9370311","type":"proceedings-article","created":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T21:33:26Z","timestamp":1615498406000},"page":"236-247","source":"Crossref","is-referenced-by-count":11,"title":["Scaling Up the IFDS Algorithm with Efficient Disk-Assisted Computing"],"prefix":"10.1109","author":[{"given":"Haofeng","family":"Li","sequence":"first","affiliation":[]},{"given":"Haining","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Hengjie","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Liqing","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Lian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303972"},{"key":"ref31","first-page":"17","article-title":"Pow-ergraph: Distributed graph-parallel computation on natural graphs","author":"gonzalez","year":"2012","journal-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation Ser OSDI'12"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17465-1_22"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236029"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2614628.2614633"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.48"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196433"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00034"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542486"},{"key":"ref13","first-page":"8:1","article-title":"Program Tailoring: Slicing by Sequential Criteria (Artifact)","volume":"2","author":"tan","year":"2016","journal-title":"DARTS-Dagstuhl Artifacts Series"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029907"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368112"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238185"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11823230_16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11970-5_8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(96)00072-2"},{"key":"ref4","year":"0","journal-title":"Llvm framework"},{"key":"ref27","year":"0","journal-title":"Flowdroid-github"},{"key":"ref3","article-title":"The Soot framework for Java program analysis: a retrospective","author":"lam","year":"2011","journal-title":"Cetus Users and Compiler Infrastructure Workshop (CETUS 2011)"},{"key":"ref6","article-title":"Boomerang: Demand-driven flow-and context-sensitive pointer analysis for java","author":"spath","year":"2016","journal-title":"European Conference on Object-Oriented Programming (ECOOP) Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/3133923","article-title":"Ideal: Efficient and precise alias-aware dataflow analysis","volume":"1","author":"spath","year":"2017","journal-title":"Proc ACM Program Lang"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025160"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2491894.2466483"},{"key":"ref2","year":"0","journal-title":"IBM Wala T j watson libraries for analysis"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"ref20","first-page":"426","article-title":"Mining apps for abnormal usage of sensitive data","author":"avdiienko","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2019.00086"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037744"},{"key":"ref24","first-page":"599","article-title":"Graphx: Graph processing in a distributed dataflow framework","author":"gonzalez","year":"2014","journal-title":"Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation ser OSDI'14"},{"key":"ref23","first-page":"31","article-title":"Graphchi: Large-scale graph computation on just a pc","author":"kyrola","year":"2012","journal-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation ser OSDI&#x2019; 12"},{"key":"ref26","year":"0","journal-title":"F-Droid"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522740"}],"event":{"name":"2021 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","location":"Seoul, Korea (South)","start":{"date-parts":[[2021,2,27]]},"end":{"date-parts":[[2021,3,3]]}},"container-title":["2021 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9370300\/9370301\/09370311.pdf?arnumber=9370311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:50Z","timestamp":1652197370000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9370311\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,27]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/cgo51591.2021.9370311","relation":{},"subject":[],"published":{"date-parts":[[2021,2,27]]}}}