Efficient bottom-up heap analysis for symbolic path-based data access summaries
暂无分享,去创建一个
[1] Amey Karkare,et al. Heap reference analysis using access graphs , 2006, ACM Trans. Program. Lang. Syst..
[2] Jong-Deok Choi,et al. Escape analysis for Java , 1999, OOPSLA '99.
[3] Sophia Drossopoulou,et al. Lock Inference Proven Correct , 2008 .
[4] Viktor Kuncak,et al. On Verifying Complex Properties using Symbolic Shape Analysis , 2006, ArXiv.
[5] Michael Hind,et al. Pointer analysis: haven't we solved this problem yet? , 2001, PASTE '01.
[6] Martin C. Rinard,et al. Symbolic bounds analysis of pointers, array indices, and accessed memory regions , 2005, TOPL.
[7] Dave Cunningham,et al. Keep Off the Grass: Locking the Right Path for Atomicity , 2008, CC.
[8] Wen-mei W. Hwu,et al. Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation , 2000, PLDI '00.
[9] Néstor Cataño,et al. CHASE: A Static Checker for JML's Assignable Clause , 2002, VMCAI.
[10] Eran Yahav,et al. Interprocedural Shape Analysis for Cutpoint-Free Programs , 2005, SAS.
[11] Vikram S. Adve,et al. Making context-sensitive points-to analysis with heap cloning practical for the real world , 2007, PLDI '07.
[12] Peter W. O'Hearn,et al. Compositional Shape Analysis by Means of Bi-Abduction , 2011, JACM.
[13] Roman Manevich,et al. Heap Decomposition for Concurrent Shape Analysis , 2008, SAS.
[14] Thomas W. Reps,et al. Shape Analysis and Applications , 2007, The Compiler Design Handbook, 2nd ed..
[15] Rafael Asenjo,et al. A framework to capture dynamic data structures in pointer-based codes , 2004, IEEE Transactions on Parallel and Distributed Systems.
[16] Isil Dillig,et al. Precise and compact modular procedure summaries for heap manipulating programs , 2011, PLDI '11.
[17] Joel H. Saltz,et al. Identifying DEF/USE Information of Statements that Construct and Traverse Dynamic Recursive Data Structures , 1997, LCPC.
[18] Reinhard Wilhelm,et al. Parametric shape analysis via 3-valued logic , 1999, POPL '99.
[19] Andreas Podelski,et al. Counterexample-guided focus , 2010, POPL '10.
[20] Laurie J. Hendren,et al. Is it a tree, a DAG, or a cyclic graph? A shape analysis for heap-directed pointers in C , 1996, POPL '96.
[21] Steven S. Muchnick,et al. Advanced Compiler Design and Implementation , 1997 .
[22] Hongtao Yu,et al. Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code , 2010, CGO '10.
[23] Bor-Yuh Evan Chang,et al. Relational inductive shape analysis , 2008, POPL '08.
[24] Supratik Chakraborty,et al. Bottom-Up Shape Analysis , 2009, SAS.
[25] Peter W. O'Hearn,et al. Shape Analysis for Composite Data Structures , 2007, CAV.
[26] Deepak Kapur,et al. Efficient Context-Sensitive Shape Analysis with Graph Based Heap Models , 2008, CC.
[27] Tarek S. Abdelrahman,et al. Run-Time Support for the Automatic Parallelization of Java Programs , 2004, The Journal of Supercomputing.
[28] Taisook Han,et al. A bottom-up pointer analysis using the update history , 2009, Inf. Softw. Technol..
[29] Jeffrey Overbey,et al. A type and effect system for deterministic parallel Java , 2009, OOPSLA 2009.
[30] Jong-Deok Choi,et al. Efficient and precise modeling of exceptions for the analysis of Java programs , 1999, PASTE '99.
[31] Kathryn S. McKinley,et al. Data flow analysis for software prefetching linked data structures in Java , 2001, Proceedings 2001 International Conference on Parallel Architectures and Compilation Techniques.
[32] Alain Deutsch,et al. Interprocedural may-alias analysis for pointers: beyond k-limiting , 1994, PLDI '94.