{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:29:26Z","timestamp":1750750166936,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T00:00:00Z","timestamp":1497744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,18]]},"DOI":"10.1145\/3088515.3088517","type":"proceedings-article","created":{"date-parts":[[2017,6,9]],"date-time":"2017-06-09T17:40:22Z","timestamp":1497030022000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Datalog model of must-alias analysis"],"prefix":"10.1145","author":[{"given":"George","family":"Balatsouras","sequence":"first","affiliation":[{"name":"University of Athens, Greece"}]},{"given":"Kostas","family":"Ferles","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, USA"}]},{"given":"George","family":"Kastrinis","sequence":"additional","affiliation":[{"name":"University of Athens, Greece"}]},{"given":"Yannis","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"University of Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2017,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11823230_15"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31057-7_29"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178264"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146254"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/325478.325519"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268973"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462191"},{"key":"e_1_3_2_1_9_1","first-page":"261","volume-title":"Proc. of the 3rd International Symp. On Leveraging Applications of Formal Methods, Verification and Validation","volume":"17","author":"Ma X.","unstructured":"X. Ma , J. Wang , and W. Dong . Computing must and may alias to detect null pointer dereference . In Proc. of the 3rd International Symp. On Leveraging Applications of Formal Methods, Verification and Validation , volume 17 of ISoLA \u201908, pages 252\u2013 261 . Springer, 2008. X. Ma, J. Wang, and W. Dong. Computing must and may alias to detect null pointer dereference. In Proc. of the 3rd International Symp. On Leveraging Applications of Formal Methods, Verification and Validation, volume 17 of ISoLA \u201908, pages 252\u2013261. Springer, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566174"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1044834.1044835"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32943-2_6"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/514188.514190"},{"key":"e_1_3_2_1_14_1","volume-title":"Inc.","author":"Sharir M.","year":"1981","unstructured":"M. Sharir and A. Pnueli . Two approaches to interprocedural data flow analysis. In S. S. Muchnick and N. D. Jones, editors, Program flow analysis: theory and applications, chapter 7, pages 189\u2013233. Prentice-Hall , Inc. , Englewood Cliffs, NJ , 1981 . M. Sharir and A. Pnueli. Two approaches to interprocedural data flow analysis. In S. S. Muchnick and N. D. Jones, editors, Program flow analysis: theory and applications, chapter 7, pages 189\u2013233. Prentice-Hall, Inc., Englewood Cliffs, NJ, 1981."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1561\/2500000014"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926390"},{"key":"e_1_3_2_1_18_1","first-page":"135","volume-title":"Proc. of the 1999 Conf. of the Centre for Advanced Studies on Collaborative research, CASCON \u201999","author":"Vall\u00e9e-Rai R.","unstructured":"R. Vall\u00e9e-Rai , P. Co , E. Gagnon , L. J. Hendren , P. Lam , and V. Sundaresan . Soot - a Java bytecode optimization framework . In Proc. of the 1999 Conf. of the Centre for Advanced Studies on Collaborative research, CASCON \u201999 , pages 125\u2013 135 . IBM Press, 1999. R. Vall\u00e9e-Rai, P. Co, E. Gagnon, L. J. Hendren, P. Lam, and V. Sundaresan. Soot - a Java bytecode optimization framework. In Proc. of the 1999 Conf. of the Centre for Advanced Studies on Collaborative research, CASCON \u201999, pages 125\u2013135. IBM Press, 1999."},{"key":"e_1_3_2_1_19_1","unstructured":"Introduction Must-Alias Analysis Model Intermediate Language \/ Analysis Schema Analysis Model Discussion Related Work  Introduction Must-Alias Analysis Model Intermediate Language \/ Analysis Schema Analysis Model Discussion Related Work"}],"event":{"name":"PLDI '17: ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Barcelona Spain","acronym":"PLDI '17"},"container-title":["Proceedings of the 6th ACM SIGPLAN International Workshop on State Of the Art in Program Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3088515.3088517","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3088515.3088517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:07Z","timestamp":1750217407000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3088515.3088517"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,18]]},"references-count":18,"alternative-id":["10.1145\/3088515.3088517","10.1145\/3088515"],"URL":"https:\/\/doi.org\/10.1145\/3088515.3088517","relation":{},"subject":[],"published":{"date-parts":[[2017,6,18]]},"assertion":[{"value":"2017-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}