{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:45Z","timestamp":1772164065550,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,23]],"date-time":"2016-10-23T00:00:00Z","timestamp":1477180800000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CCF- 1055066"],"award-info":[{"award-number":["CCF- 1055066"]}]},{"name":"DARPA","award":["FA8750-14-2-0039"],"award-info":[{"award-number":["FA8750-14-2-0039"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,23]]},"DOI":"10.1145\/2814270.2814293","type":"proceedings-article","created":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T16:04:33Z","timestamp":1446480273000},"page":"163-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Selective control-flow abstraction via jumping"],"prefix":"10.1145","author":[{"given":"Sam","family":"Blackshear","sequence":"first","affiliation":[{"name":"University of Colorado at Boulder, USA"}]},{"given":"Bor-Yuh Evan","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Colorado at Boulder, USA"}]},{"given":"Manu","family":"Sridharan","sequence":"additional","affiliation":[{"name":"Samsung Research, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,23]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"https:\/\/github.com\/cuplv\/hopper","year":"2015","unstructured":"Hopper. https:\/\/github.com\/cuplv\/hopper, 2015."},{"key":"e_1_3_2_2_2_1","unstructured":"Nit: Nullability inference tool. http:\/\/nit.gforge.inria. fr\/ 2015."},{"key":"e_1_3_2_2_3_1","volume-title":"http:\/\/wala. sf.net","author":"Watson T.J.","year":"2015","unstructured":"T.J. Watson Libraries for Analysis (WALA). http:\/\/wala. sf.net, 2015."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_5"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","unstructured":"Stephen M. Blackburn Robin Garner Chris Hoffmann Asjad M. Khan Kathryn S. McKinley Rotem Bentzur Amer Diwan Daniel Feinberg Daniel Frampton Samuel Z. Guyer Martin Hirzel Antony L. Hosking Maria Jump Han Bok Lee J. Eliot B. Moss Aashish Phansalkar Darko Stefanovic Thomas VanDrunen Daniel von Dincklage and Ben Wiedermann. The DaCapo benchmarks: Java benchmarking development and analysis. In Object-Oriented Programming Systems Languages and Applications (OOPSLA) 2006. 10.1145\/1167473.1167488","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_2_6_1","unstructured":"Sam Blackshear. Flexible Goal-Directed Abstraction. PhD thesis University of Colorado Boulder 2015."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462186"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771284.2771288"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/155090.155095"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736040"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17524-9_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535855"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35873-9_10"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375615"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926407"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429086"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190266"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377656.2377662"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516769"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390657"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048144"},{"key":"e_1_3_2_2_24_1","first-page":"98","author":"Margoor Amogh","year":"2015","unstructured":"Amogh Margoor and Raghavan Komondoor. Two techniques to improve the precision of a demand-driven null-dereference verification approach. Sci. Comput. Program., 98, 2015.","journal-title":"Sci. Comput. Program."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070515"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594318"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/645683.664578"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_21"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594320"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134027"},{"issue":"3","key":"e_1_3_2_2_31_1","volume":"3","author":"Tip Frank","year":"1995","unstructured":"Frank Tip. A survey of program slicing techniques. J. Prog. Lang., 3(3), 1995.","journal-title":"J. Prog. Lang."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818768"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594327"}],"event":{"name":"SPLASH '15: Conference on Systems, Programming, Languages, and Applications: Software for Humanity","location":"Pittsburgh PA USA","acronym":"SPLASH '15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 2015 ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814270.2814293","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2814270.2814293","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2814270.2814293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:43:16Z","timestamp":1763458996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814270.2814293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,23]]},"references-count":33,"alternative-id":["10.1145\/2814270.2814293","10.1145\/2814270"],"URL":"https:\/\/doi.org\/10.1145\/2814270.2814293","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2858965.2814293","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,10,23]]},"assertion":[{"value":"2015-10-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}