{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:50:05Z","timestamp":1725511805961},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540696087"},{"type":"electronic","value":"9783540696117"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/978-3-540-69611-7_7","type":"book-chapter","created":{"date-parts":[[2007,4,26]],"date-time":"2007-04-26T09:40:18Z","timestamp":1177580418000},"page":"109-123","source":"Crossref","is-referenced-by-count":22,"title":["Automatic Incrementalization of Prolog Based Static Analyses"],"prefix":"10.1007","author":[{"given":"Michael","family":"Eichberg","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Kahl","sequence":"additional","affiliation":[]},{"given":"Diptikalyan","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Mira","family":"Mezini","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Ostermann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","volume-title":"Proceedings of the Symposium on Security and Privacy","author":"K. Ashcraft","year":"2002","unstructured":"Ashcraft, K., Engler, D.: Using programmer-written compiler extensions to catch security holes. In: Proceedings of the Symposium on Security and Privacy. IEEE, Los Alamitos (2002)"},{"key":"7_CR2","volume-title":"Proceedings of IFM","author":"T. Ball","year":"2004","unstructured":"Ball, T., Cook, B., Levin, V., Rajamani, S.K.: Slam and static driver verifier: Technology transfer of formal methods inside Microsoft. In: Proceedings of IFM. Springer, Heidelberg (2004)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44898-5_2","volume-title":"Static Analysis","author":"F. Besson","year":"2003","unstructured":"Besson, F., Jensen, T.P.: Modular class analysis with datalog. In: Cousot, R. (ed.) SAS 2003. LNCS, vol.\u00a02694. Springer, Heidelberg (2003)"},{"key":"7_CR4","volume-title":"Proceedings of ASE","author":"A. Blewitt","year":"2001","unstructured":"Blewitt, A., Bundy, A., Stark, I.: Automatic verification of java design patterns. In: Proceedings of ASE. IEEE, Los Alamitos (2001)"},{"key":"7_CR5","volume-title":"Proceedings of ILPS","author":"R. Bol","year":"1993","unstructured":"Bol, R., Degerstadt, L.: Tabulated resolution for well-founded semantics. In: Proceedings of ILPS. MIT Press, Cambridge (1993)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Burke, M.: An interval-based approach to exhaustive and incremental interprocedural data-flow analysis. TOPLAS\u00a012(3) (1990)","DOI":"10.1145\/78969.78963"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Burke, M.G., Ryder, B.G.: A critical analysis of incremental iterative data flow analysis algorithms. IEEE Transactions on Software Engineering\u00a016(7) (1990)","DOI":"10.1109\/32.56098"},{"key":"7_CR8","volume-title":"Proceedings of POPL","author":"M.D. Carroll","year":"1988","unstructured":"Carroll, M.D., Ryder, B.G.: Incremental data flow analysis via dominator and attribute update. In: Proceedings of POPL. ACM, New York (1988)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Chen, W., Warren, D.S.: Tabled evaluation with delaying for general logic programs. Journal of the ACM\u00a043(1) (1996)","DOI":"10.1145\/227595.227597"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/11513988_45","volume-title":"Computer Aided Verification","author":"C.L. Conway","year":"2005","unstructured":"Conway, C.L., Namjoshi, K.S., Dams, D.R., Edwards, S.A.: Incremental algorithms for inter-procedural analysis of safety properties. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 449\u2013461. Springer, Heidelberg (2005)"},{"key":"7_CR11","unstructured":"Crew, R.F.: Astlog: A language for examining abstract syntax trees. In: Proceedings of DSL. USENIX (1997)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Cytron, R., Ferrante, J., Rosen, B.K., Wegman, M.N., Zadeck, F.K.: Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems\u00a013(4) (1991)","DOI":"10.1145\/115372.115320"},{"key":"7_CR13","volume-title":"Proceedings of PLDI","author":"S. Dawson","year":"1996","unstructured":"Dawson, S., Ramakrishnan, C.R., Warren, D.S.: Practical program analysis using general purpose logic programming systems \u2014 a case study. In: Proceedings of PLDI. ACM, New York (1996)"},{"key":"7_CR14","volume-title":"Proceedings of WCRE","author":"M. Eichberg","year":"2004","unstructured":"Eichberg, M., Mezini, M., Ostermann, K., Sch\u00e4fer, T.: Xirc: A kernel for cross-artifact information engineering in software development environments. In: Proceedings of WCRE. IEEE, Los Alamitos (2004)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-540-31984-9_18","volume-title":"Fundamental Approaches to Software Engineering","author":"M. Eichberg","year":"2005","unstructured":"Eichberg, M., Sch\u00e4fer, T., Mezini, M.: Using annotations to check structural properties of classes. In: Cerioli, M. (ed.) FASE 2005. LNCS, vol.\u00a03442, pp. 237\u2013252. Springer, Heidelberg (2005)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Eichberg, M., Kahl, M., Saha, D., Mezini, M., Ostermann, K.: Automatic incrementalization of static analyses. Technical report (2006), http:\/\/www.st.informatik.tu-darmstadt.de\/Magellan","DOI":"10.1007\/978-3-540-69611-7_7"},{"key":"7_CR17","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley, Reading (1995)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_2","volume-title":"ECOOP 2006 \u2013 Object-Oriented Programming","author":"E. Hajiyev","year":"2006","unstructured":"Hajiyev, E., Verbaere, M., de Moor, O.: Codequest: Scalable source code queries with datalog. In: Thomas, D. (ed.) ECOOP 2006. LNCS, vol.\u00a04067. Springer, Heidelberg (2006)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Hovemeyer, D., Pugh, W.: Finding bugs is easy. SIGPLAN Not.\u00a039(12) (2004)","DOI":"10.1145\/1052883.1052895"},{"key":"7_CR20","volume-title":"Proceedings of PLDI","author":"W. Landi","year":"1992","unstructured":"Landi, W., Ryder, B.G.: A safe approximate algorithm for interprocedural pointer aliasing. In: Proceedings of PLDI. ACM, New York (1992)"},{"key":"7_CR21","volume-title":"Proceedings of PLDI","author":"Y.A. Liu","year":"2004","unstructured":"Liu, Y.A., Rothamel, T., Yu, F., Stoller, S.D., Hu, N.: Parametric regular path queries. In: Proceedings of PLDI. ACM, New York (2004)"},{"key":"7_CR22","volume-title":"Proceedings of POPL","author":"T.J. Marlowe","year":"1990","unstructured":"Marlowe, T.J., Ryder, B.G.: An efficient hybrid algorithm for incremental data flow analysis. In: Proceedings of POPL. ACM, New York (1990)"},{"key":"7_CR23","volume-title":"Proceedings of OOPSLA","author":"M. Martin","year":"2005","unstructured":"Martin, M., Livshits, B., Lam, M.S.: Finding application errors and security flaws using PQL: a program query language. In: Proceedings of OOPSLA. ACM, New York (2005)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Pollock, L.L., Soffa, M.L.: An incremental version of iterative data flow analysis. IEEE Transactions on Software Engineering\u00a015(12) (1989)","DOI":"10.1109\/32.58766"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Ryder, B.G., Paull, M.C.: Incremental data-flow analysis algorithms. ACM Transactions on Programming Languages and Systems\u00a010(1) (1988)","DOI":"10.1145\/42192.42193"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-540-24599-5_27","volume-title":"Logic Programming","author":"D. Saha","year":"2003","unstructured":"Saha, D., Ramakrishnan, C.R.: Incremental evaluation of tabled logic programs. In: Palamidessi, C. (ed.) ICLP 2003. LNCS, vol.\u00a02916, pp. 392\u2013406. Springer, Heidelberg (2003)"},{"key":"7_CR27","volume-title":"Proceedings of PPDP","author":"D. Saha","year":"2005","unstructured":"Saha, D., Ramakrishnan, C.R.: Incremental and demand-driven points-to analysis using logic programming. In: Proceedings of PPDP. ACM, New York (2005)"},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/11562931_19","volume-title":"Logic Programming","author":"D. Saha","year":"2005","unstructured":"Saha, D., Ramakrishnan, C.R.: Symbolic support graph: A space-efficient data structure for incremental tabled evaluation. In: Gabbrielli, M., Gupta, G. (eds.) ICLP 2005. LNCS, vol.\u00a03668, pp. 235\u2013249. Springer, Heidelberg (2005)"},{"key":"7_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/11603023_15","volume-title":"Practical Aspects of Declarative Languages","author":"D. Saha","year":"2005","unstructured":"Saha, D., Ramakrishnan, C.R.: Incremental evaluation of tabled prolog: Beyond pure logic programs. In: Van Hentenryck, P. (ed.) PADL 2006. LNCS, vol.\u00a03819, pp. 215\u2013229. Springer, Heidelberg (2005)"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/11799573_7","volume-title":"Logic Programming","author":"D. Saha","year":"2006","unstructured":"Saha, D., Ramakrishnan, C.R.: A local algorithm for incremental evaluation of logic programs. In: Etalle, S., Truszczy\u0144ski, M. (eds.) ICLP 2006. LNCS, vol.\u00a04079, pp. 56\u201371. Springer, Heidelberg (2006)"},{"key":"7_CR31","series-title":"Lecture Notes in Computer Science","volume-title":"Third International Conference on Logic Programming","author":"H. Tamaki","year":"1986","unstructured":"Tamaki, H., Sato, T.: OLDT resolution with tabulation. In: Shapiro, E. (ed.) ICLP 1986. LNCS, vol.\u00a0225. Springer, Heidelberg (1986)"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Vitek, J., Bokowski, B.: Confined types in java. Software Practice and Experience\u00a031(6) (2001)","DOI":"10.1002\/spe.369"},{"key":"7_CR33","volume-title":"Proceedings of PLDI","author":"F. Vivien","year":"2001","unstructured":"Vivien, F., Rinard, M.C.: Incrementalized pointer and escape analysis. In: Proceedings of PLDI. ACM, New York (2001)"},{"key":"7_CR34","volume-title":"Proceedings of PLDI","author":"J. Whaley","year":"2004","unstructured":"Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: Proceedings of PLDI. ACM, New York (2004)"},{"key":"7_CR35","volume-title":"Proceedings of TOOLS-USA","author":"R. Wuyts","year":"1998","unstructured":"Wuyts, R.: Declarative reasoning about the structure of object-oriented systems. In: Proceedings of TOOLS-USA. IEEE, Los Alamitos (1998)"},{"key":"7_CR36","volume-title":"Proceedings of ICSE","author":"J. Yur","year":"1997","unstructured":"Yur, J., Ryder, B.G., Landi, W., Stocks, P.: Incremental analysis of side effects for C software system. In: Proceedings of ICSE. ACM, New York (1997)"},{"key":"7_CR37","volume-title":"Proceedings of ICSE","author":"J. Yur","year":"1999","unstructured":"Yur, J., Ryder, B.G., Landi, W.A.: An incremental flow- and context-sensitive pointer aliasing analysis. In: Proceedings of ICSE. IEEE, Los Alamitos (1999)"}],"container-title":["Lecture Notes in Computer Science","Practical Aspects of Declarative Languages"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69611-7_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:01:47Z","timestamp":1605762107000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69611-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540696087","9783540696117"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69611-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}