{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:37Z","timestamp":1772164057534,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T00:00:00Z","timestamp":1413244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-12-2-0106"],"award-info":[{"award-number":["FA8750-12-2-0106"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,14]]},"DOI":"10.1145\/2661088.2661098","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T08:29:24Z","timestamp":1413275364000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Abstracting abstract control"],"prefix":"10.1145","author":[{"given":"Dionna","family":"Glaze","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"David","family":"Van Horn","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,10,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0038-8"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.01.002"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646732.701281"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140543.1140550"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1034774.1034778"},{"key":"e_1_3_2_2_6_1","volume-title":"IFIP Congress (1)","author":"Cook Stephen A.","year":"1971","unstructured":"Stephen A. Cook . Linear time simulation of deterministic two-way pushdown automata . In IFIP Congress (1) , 1971 . Stephen A. Cook. Linear time simulation of deterministic two-way pushdown automata. In IFIP Congress (1), 1971."},{"key":"e_1_3_2_2_7_1","volume-title":"Proc. First IEEE & IFIP International Symposium on Theoretical Aspects of Software Engineering","author":"Cousot P.","year":"2007","unstructured":"P. Cousot . Abstract interpretation and application to static analysis (invited tutorial). Part I: Basic concepts of abstract interpretation; Part II: Applications of abstract interpretation . In Proc. First IEEE & IFIP International Symposium on Theoretical Aspects of Software Engineering , 2007 . P. Cousot. Abstract interpretation and application to static analysis (invited tutorial). Part I: Basic concepts of abstract interpretation; Part II: Applications of abstract interpretation. In Proc. First IEEE & IFIP International Symposium on Theoretical Aspects of Software Engineering, 2007."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2007.55"},{"key":"e_1_3_2_2_10_1","volume-title":"Department of Computer Science","author":"Danvy Olivier","year":"2006","unstructured":"Olivier Danvy . An Analytical Approach to Program as Data Objects . DSc thesis , Department of Computer Science , Aarhus University , 2006 . Olivier Danvy. An Analytical Approach to Program as Data Objects . DSc thesis, Department of Computer Science, Aarhus University, 2006."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/91556.91622"},{"key":"e_1_3_2_2_12_1","volume-title":"Workshop on Scheme and Functional Programming","author":"Earl Christopher","year":"2010","unstructured":"Christopher Earl , Matthew Might , and David Van Horn . Pushdown control-flow analysis of higher-order programs . In Workshop on Scheme and Functional Programming , 2010 . Christopher Earl, Matthew Might, and David Van Horn. Pushdown control-flow analysis of higher-order programs. In Workshop on Scheme and Functional Programming, 2010."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364527.2364576"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1795772"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/174675.178047"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/581478.581484"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.129.15"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500365.2500604"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796814000100"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(77)90022-9"},{"key":"e_1_3_2_2_21_1","volume-title":"JSAI: Designing a sound, configurable, and efficient static analyzer for JavaScript. CoRR, abs\/1403.3996","author":"Kashyap Vineeth","year":"2014","unstructured":"Vineeth Kashyap , Kyle Dewey , Ethan A. Kuefner , John Wagner , Kevin Gibbons , John Sarracino , Ben Wiedermann , and Ben Hard- ekopf. JSAI: Designing a sound, configurable, and efficient static analyzer for JavaScript. CoRR, abs\/1403.3996 , 2014 . Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, and Ben Hard- ekopf. JSAI: Designing a sound, configurable, and efficient static analyzer for JavaScript. CoRR, abs\/1403.3996, 2014."},{"key":"e_1_3_2_2_22_1","volume-title":"An argument against call\/cc","author":"Kiselyov Oleg","year":"2012","unstructured":"Oleg Kiselyov . An argument against call\/cc , 2012 . http:\/\/okmij.org\/ftp\/continuations\/against-callcc.html. Oleg Kiselyov. An argument against call\/cc, 2012. http:\/\/okmij.org\/ftp\/continuations\/against-callcc.html."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770806.1770828"},{"key":"e_1_3_2_2_24_1","volume-title":"16th European Symposium on Programming, ESOP 2007","volume":"4421","author":"Kuan George","year":"2007","unstructured":"George Kuan , David MacQueen , and Robert B. Findler . A rewriting semantics for type inference. In Programming Languages and Systems , 16th European Symposium on Programming, ESOP 2007 , volume 4421 , 2007 . George Kuan, David MacQueen, and Robert B. Findler. A rewriting semantics for type inference. In Programming Languages and Systems, 16th European Symposium on Programming, ESOP 2007, volume 4421, 2007."},{"key":"e_1_3_2_2_25_1","unstructured":"Jay McCarthy. Concerning PLT webserver commit 72ec6342ea. private communication.  Jay McCarthy. Concerning PLT webserver commit 72ec6342ea. private communication."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159803.1159807"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1763048.1763054"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/578282"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254092"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10990-004-4866-z"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512961"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2027223.2027239"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_12"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034783"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863553"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796812000238"},{"key":"e_1_3_2_2_40_1","volume-title":"CFA2: a Context-Free approach to Control-Flow analysis. Logical Methods in Computer Science, 7(2)","author":"Vardoulakis Dimitrios","year":"2011","unstructured":"Dimitrios Vardoulakis and Olin Shivers . CFA2: a Context-Free approach to Control-Flow analysis. Logical Methods in Computer Science, 7(2) , 2011 . Dimitrios Vardoulakis and Olin Shivers. CFA2: a Context-Free approach to Control-Flow analysis. Logical Methods in Computer Science, 7(2), 2011."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034785"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/103135.103136"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.11.004"}],"event":{"name":"SPLASH '14: Conference on Systems, Programming, and Applications: Software for Humanity","location":"Portland Oregon USA","acronym":"SPLASH '14","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGAda ACM Special Interest Group on Ada Programming Language"]},"container-title":["Proceedings of the 10th ACM Symposium on Dynamic languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2661088.2661098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2661088.2661098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:19:46Z","timestamp":1750216786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2661088.2661098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,14]]},"references-count":41,"alternative-id":["10.1145\/2661088.2661098","10.1145\/2661088"],"URL":"https:\/\/doi.org\/10.1145\/2661088.2661098","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2775052.2661098","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2014,10,14]]},"assertion":[{"value":"2014-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}