Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL '98 1998
DOI: 10.1145/268946.268957
|View full text |Cite
|
Sign up to set email alerts
|

Putting pointer analysis to work

Abstract: This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer.The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
78
0

Year Published

1999
1999
2008
2008

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 97 publications
(78 citation statements)
references
References 41 publications
0
78
0
Order By: Relevance
“…In order to prove safety of the transformations, pointer analysis techniques must be used. The work of Ghiya [10] shows an extensive overview of pointer analysis techniques in the context of recursive data structures.…”
Section: Identification Of Linked List Traversalsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to prove safety of the transformations, pointer analysis techniques must be used. The work of Ghiya [10] shows an extensive overview of pointer analysis techniques in the context of recursive data structures.…”
Section: Identification Of Linked List Traversalsmentioning
confidence: 99%
“…For instance, if throughout the execution of the loop the variable idx_ex pr defines the sequence (5, 50, 10), then only the elements A [5], A [50] and A [10] need to be defined.…”
Section: Iteration Space Expansionmentioning
confidence: 99%
“…Interprocedural context-sensitive pointer analyses [204,107,57] typically compute points-to relationships by caching generated contexts and using fixpoint computation inside strongly connected components of the call graph. Because our analysis tracks more detailed information about the heap, we have chosen to make it compositional at the level of procedures.…”
Section: Interprocedural Analysesmentioning
confidence: 99%
“…Jackal's compiler performs two optimizations: object-graph aggregation and automatic computation migration, whose aims are similar to those of our object pushing and synchronized method migration. Objectgraph aggregation uses a heap approximation algorithm [15] to identify those related objects. However, the heap approximation algorithm cannot distinguish between different objects that are created at the same allocation site.…”
Section: Related Workmentioning
confidence: 99%