Proceedings of the 2008 ACM Symposium on Applied Computing 2008
DOI: 10.1145/1363686.1363779
|View full text |Cite
|
Sign up to set email alerts
|

Removing useless variables in cost analysis of Java bytecode

Abstract: Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in order to decide whether to reject mobile code which has too large cost requirements in terms of computing resources (in time and/or space) or billable events (SMSs sent, bandwidth required). Existing cost analyses for a variety of languages describe the resource consumption of programs by means of Cost Equation Systems (CESs), which ar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 27 publications
0
19
0
Order By: Relevance
“…In particular, the enhancement must ensure that the variables involved in the creation of new arrays (and those on which they depend) are added to the abstraction. This information can be statically approximated [2,15,16].…”
Section: On Soundness and Completeness Of Oraclesmentioning
confidence: 99%
“…In particular, the enhancement must ensure that the variables involved in the creation of new arrays (and those on which they depend) are added to the abstraction. This information can be statically approximated [2,15,16].…”
Section: On Soundness and Completeness Of Oraclesmentioning
confidence: 99%
“…Applying this program to count how often the number 4 occurs in the list [1,4,7] yields the rewrite steps…”
Section: Definition and Simplification Of Int-trssmentioning
confidence: 99%
“…We consider S * and not S since accesses in S * \ S might indirectly affect the values of fields in S. Note that any subset chosen leads to a safe transformed program since the lack of some fields only implies computing less precise information. For instance, for the sake of efficiency, one can select only the fields that might affect the termination behaviour of the program (see, e.g., the approximation of [7]). …”
Section: Inference Of Local Termination Preconditionsmentioning
confidence: 99%
“…In what follows, variables are named using this convention: i, j represent integer variables; a an array of integers; x, y, z reference variables; and, xs an array of H COSTA AProVE Julia Tp Tm Tc Tp Tm Tc Tp Tm Tc (1) x.fi yes yes yes yes yes yes -yes unk (2) x.fy.fi yes yes yes yes yes yes -yes unk (3) x.fy.fz.fi yes yes yes yes yes yes -unk unk (4) a[i] yes yes yes unk yes yes -unk unk (5) fa[i] yes yes yes unk yes yes -unk unk (6) a[x.fi] yes yes yes unk yes yes -unk unk (7) x.fa[x.fi] yes yes yes unk yes yes -unk unk (8) xs [i].fi yes yes yes unk yes yes -unk unk…”
Section: Comparison With Other Termination Toolsmentioning
confidence: 99%