How is aliasing used in systems software?
暂无分享,去创建一个
[1] Neil D. Jones,et al. Flow analysis and optimization of LISP-like structures , 1979, POPL.
[2] John Hogg,et al. Islands: aliasing protection in object-oriented languages , 1991, OOPSLA '91.
[3] Barbara G. Ryder,et al. A safe approximate algorithm for interprocedural aliasing , 1992, PLDI '92.
[4] Jong-Deok Choi,et al. Efficient flow-sensitive interprocedural computation of pointer-induced aliases and side effects , 1993, POPL '93.
[5] Laurie J. Hendren,et al. Context-sensitive interprocedural points-to analysis in the presence of function pointers , 1994, PLDI '94.
[6] Erik Ruf,et al. Context-insensitive alias analysis reconsidered , 1995, PLDI '95.
[7] Monica S. Lam,et al. Efficient context-sensitive pointer analysis for C programs , 1995, PLDI '95.
[8] Laurie J. Hendren,et al. Is it a tree, a DAG, or a cyclic graph? A shape analysis for heap-directed pointers in C , 1996, POPL '96.
[9] Naftaly H. Minsky. Towards Alias-Free Pointers , 1996, ECOOP.
[10] James Noble,et al. Ownership types for flexible alias protection , 1998, OOPSLA '98.
[11] Barbara G. Ryder,et al. Comparing flow and context sensitivity on the modification-side-effects problem , 1998, ISSTA '98.
[12] Martin C. Rinard,et al. Compositional pointer and escape analysis for Java programs , 1999, OOPSLA '99.
[13] Barbara G. Ryder,et al. Relevant context inference , 1999, POPL '99.
[14] Manuvir Das,et al. Unification-based pointer analysis with directional assignments , 2000, PLDI '00.
[15] Michael Hind,et al. Which pointer analysis should I use? , 2000, ISSTA '00.
[16] Alexander Aiken,et al. Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C , 2000, SAS.
[17] John Tang Boyland,et al. Alias burying: Unique variables without destructive reads , 2001, Softw. Pract. Exp..
[18] Markus Mock,et al. Dynamic points-to sets: a comparison with static analyses and potential applications in program understanding and optimization , 2001, PASTE '01.
[19] Donglin Liang,et al. Efficient Computation of Parameterized Pointer Information for Interprocedural Analyses , 2001, SAS.
[20] Craig Chambers,et al. Alias annotations for program understanding , 2002, OOPSLA '02.
[21] Barbara G. Ryder,et al. Parameterized object sensitivity for points-to and side-effect analyses for Java , 2002, ISSTA '02.
[22] Donglin Liang,et al. Evaluating the precision of static reference analysis using profiling , 2002, ISSTA '02.
[23] Robert DeLine,et al. Adoption and focus: practical linear types for imperative programming , 2002, PLDI '02.
[24] Benjamin Livshits,et al. Tracking pointers with path and context sensitivity for bug detection in C programs , 2003, ESEC/FSE-11.
[25] Ondrej Lhoták,et al. Points-to analysis using BDDs , 2003, PLDI '03.
[26] Alexander Aiken,et al. Checking and inferring local non-aliasing , 2003, PLDI '03.
[27] Monica S. Lam,et al. Cloning-based context-sensitive pointer alias analysis using binary decision diagrams , 2004, PLDI '04.
[28] Mark N. Wegman,et al. Analysis of pointers and structures , 1990, SIGP.
[29] Ondrej Lhoták,et al. Jedd: a BDD-based relational extension of Java , 2004, PLDI '04.
[30] Alexander Aiken,et al. Scalable error detection using boolean satisfiability , 2005, POPL '05.
[31] Jonathan Aldrich,et al. Permission-based ownership: encapsulating state in higher-order typed languages , 2005, PLDI '05.
[32] Alexander Aiken,et al. Effective static race detection for Java , 2006, PLDI '06.