{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:13:18Z","timestamp":1775873598350,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T00:00:00Z","timestamp":1456704000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,2,29]]},"DOI":"10.1145\/2854038.2854043","type":"proceedings-article","created":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T15:33:04Z","timestamp":1456846384000},"page":"160-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Sparse flow-sensitive pointer analysis for multithreaded programs"],"prefix":"10.1145","author":[{"given":"Yulei","family":"Sui","sequence":"first","affiliation":[{"name":"UNSW, Australia"}]},{"given":"Peng","family":"Di","sequence":"additional","affiliation":[{"name":"UNSW, Australia"}]},{"given":"Jingling","family":"Xue","sequence":"additional","affiliation":[{"name":"UNSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,2,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229428.1229471"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69330-7_11"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/99583.99594"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.265631"},{"key":"e_1_3_2_1_6_1","first-page":"267","volume-title":"CC \u201996","author":"Chow F.","unstructured":"F. Chow , S. Chan , S. Liu , R. Lo , and M. Streich . Effective representation of aliases and indirect memory operations in SSA form . In CC \u201996 , pages 253\u2013 267 . F. Chow, S. Chan, S. Liu, R. Lo, and M. Streich. Effective representation of aliases and indirect memory operations in SSA form. In CC \u201996, pages 253\u2013267."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2015.98"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348250.1348255"},{"key":"e_1_3_2_1_9_1","first-page":"298","volume-title":"CGO \u201911","author":"Hardekopf B.","unstructured":"B. Hardekopf and C. Lin . Flow-Sensitive Pointer Analysis for Millions of Lines of Code . In CGO \u201911 , pages 289\u2013 298 . B. Hardekopf and C. Lin. Flow-Sensitive Pointer Analysis for Millions of Lines of Code. In CGO \u201911, pages 289\u2013298."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1480881.1480911"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/325478.325519"},{"key":"e_1_3_2_1_12_1","first-page":"81","volume-title":"SAS \u201998","author":"Hind M.","unstructured":"M. Hind and A. Pioli . Assessing the effects of flow-sensitivity on pointer alias analyses . In SAS \u201998 , pages 57\u2013 81 . M. Hind and A. Pioli. Assessing the effects of flow-sensitivity on pointer alias analyses. In SAS \u201998, pages 57\u201381."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/143095.143137"},{"key":"e_1_3_2_1_14_1","first-page":"86","volume-title":"CGO \u2019\u201904","author":"Lattner C.","unstructured":"C. Lattner and V. Adve . LLVM: A compilation framework for lifelong program analysis & transformation . In CGO \u2019\u201904 , pages 75\u2013 86 . C. Lattner and V. Adve. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO \u2019\u201904, pages 75\u201386."},{"key":"e_1_3_2_1_15_1","first-page":"16","volume-title":"POPL \u201911","author":"Lhot\u00e1k O.","unstructured":"O. Lhot\u00e1k and K.-C. A. Chung . Points-to analysis with efficient strong updates . In POPL \u201911 , pages 3\u2013 16 . O. Lhot\u00e1k and K.-C. A. Chung. Points-to analysis with efficient strong updates. In POPL \u201911, pages 3\u201316."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025160"},{"key":"e_1_3_2_1_17_1","first-page":"53","volume-title":"ECOOP","author":"Li Y.","unstructured":"Y. Li , T. Tan , Y. Sui , and J. Xue . Self-inferencing reflection resolution for Java . In ECOOP \u2019 14, pages 27\u2013 53 . Y. Li, T. Tan, Y. Sui, and J. Xue. Self-inferencing reflection resolution for Java. In ECOOP\u2019 14, pages 27\u201353."},{"key":"e_1_3_2_1_18_1","first-page":"208","volume-title":"SNAPL \u201915","author":"Nagarakatte S.","unstructured":"S. Nagarakatte , M. M. K. Martin , and S. Zdancewic . Everything You Want to Know About Pointer-Based Checking . In SNAPL \u201915 , pages 190\u2013 208 . S. Nagarakatte, M. M. K. Martin, and S. Zdancewic. Everything You Want to Know About Pointer-Based Checking. In SNAPL \u201915, pages 190\u2013208."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254092"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290520.1290524"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2009.9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134019"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301645"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/568014.379553"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926390"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336784"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25318-8_14"},{"key":"e_1_3_2_1_28_1","first-page":"294","volume-title":"OSDI","author":"Wang Y.","unstructured":"Y. Wang , T. Kelly , M. Kudlur , S. Lafortune , and S. A. Mahlke . Gadara: Dynamic deadlock avoidance for multithreaded programs . In OSDI \u2019 08, pages 281\u2013 294 . Y. Wang, T. Kelly, M. Kudlur, S. Lafortune, and S. A. Mahlke. Gadara: Dynamic deadlock avoidance for multithreaded programs. In OSDI\u2019 08, pages 281\u2013294."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996859"},{"key":"e_1_3_2_1_30_1","first-page":"336","volume-title":"SAS \u201914","author":"Ye S.","unstructured":"S. Ye , Y. Sui , and J. Xue . Region-based selective flowsensitive pointer analysis . In SAS \u201914 , pages 319\u2013 336 . S. Ye, Y. Sui, and J. Xue. Region-based selective flowsensitive pointer analysis. In SAS \u201914, pages 319\u2013336."}],"event":{"name":"CGO '16: 14th Annual IEEE\/ACM International Symposium on Code Generation and Optimization","location":"Barcelona Spain","acronym":"CGO '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 2016 International Symposium on Code Generation and Optimization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2854038.2854043","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2854038.2854043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:30Z","timestamp":1750273470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2854038.2854043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,29]]},"references-count":29,"alternative-id":["10.1145\/2854038.2854043","10.1145\/2854038"],"URL":"https:\/\/doi.org\/10.1145\/2854038.2854043","relation":{},"subject":[],"published":{"date-parts":[[2016,2,29]]},"assertion":[{"value":"2016-02-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}