1997
DOI: 10.1002/(sici)1096-9128(199711)9:11<1031::aid-cpe354>3.0.co;2-o
|View full text |Cite
|
Sign up to set email alerts
|

A Java bytecode optimizer using side-effect analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2000
2000
2017
2017

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(36 citation statements)
references
References 2 publications
0
36
0
Order By: Relevance
“…If Sj is a non-variable type, then from the induction hypothesis, we also have (9). Using, (7), (8), and (9), we proved (4) for this j.…”
Section: Subtypingmentioning
confidence: 66%
See 1 more Smart Citation
“…If Sj is a non-variable type, then from the induction hypothesis, we also have (9). Using, (7), (8), and (9), we proved (4) for this j.…”
Section: Subtypingmentioning
confidence: 66%
“…Immutability information is useful in many software engineering tasks, such as modeling [7], verification [30], compile-and runtime optimizations [9,25,28], refactoring [17], test input generation [1], regression oracle creation [24,32], invariant detection [15], specification mining [10], and program comprehension [13]. Three varieties of immutability guarantee are: Class immutability No instance of an immutable class may be changed; examples in Java include String and most subclasses of Number such as Integer and BigDecimal.…”
Section: Introductionmentioning
confidence: 99%
“…The advantage of this, as discussed in §1, is that it lends itself more easily to modular checking. Clausen developed a Java bytecode optimiser using SCHA which exploits knowledge of side-effects [9]. In particular, it determines whether a method's receiver and parameters are pure, read-only, write-only or read-write.…”
Section: Related Workmentioning
confidence: 99%
“…Knowing which methods are pure in a program has a variety of applications, such as: specification languages [19,1,3,10], model checking [31], compiler optimisations [9,18,36], atomicity [13], query systems [21,34] and memoisation of function calls [15].…”
Section: Introductionmentioning
confidence: 99%
“…Knowing which method parameters are accessed in a read-only way, and which ones may be modified, is useful in many software engineering tasks, such as modeling [4], verification [24], compiler optimizations [6,21], program transformations [12], test input generation [1], regression oracle creation [14,27], invariant detection [11], specification mining [7], and program comprehension [10].…”
Section: Introductionmentioning
confidence: 99%