{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:57:37Z","timestamp":1730318257300,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1145\/2950290.2950312","type":"proceedings-article","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T13:46:03Z","timestamp":1478007963000},"page":"474-486","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Call graph construction for Java libraries"],"prefix":"10.1145","author":[{"given":"Michael","family":"Reif","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Michael","family":"Eichberg","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Ben","family":"Hermann","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Johannes","family":"Lerch","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Mira","family":"Mezini","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31057-7_30"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39038-8_16"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771284.2771287"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236371"},{"issue":"69","key":"e_1_3_2_1_6_1","first-page":"80","article-title":"Static analysis for stack inspection","volume":"54","author":"Bartoletti M.","year":"2001","unstructured":"M. Bartoletti , P. Degano , and G. Ferrari . Static analysis for stack inspection . Electronic Notes in Theoretical Computer Science , 54 : 69 \u2013 80 , 2001 . M. Bartoletti, P. Degano, and G. Ferrari. Static analysis for stack inspection. Electronic Notes in Theoretical Computer Science, 54:69 \u2013 80, 2001.","journal-title":"Electronic Notes in Theoretical Computer Science"},{"volume-title":"International Workshop on Concurrency and Coordination (Workshop associated to the 13th Lipari School)","key":"e_1_3_2_1_7_1","unstructured":"ConCoord : International Workshop on Concurrency and Coordination (Workshop associated to the 13th Lipari School) . ConCoord: International Workshop on Concurrency and Coordination (Workshop associated to the 13th Lipari School)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009380.1009691"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140543.1140550"},{"key":"e_1_3_2_1_10_1","volume-title":"9th European Conference, \u02da Aarhus, Denmark, August 7\u201311, 1995","volume":"952","author":"Dean J.","year":"1995","unstructured":"J. Dean , D. Grove , and C. Chambers . Optimization of object-oriented programs using static class hierarchy analysis. In M. Tokoro and R. Pareschi, editors, ECOOP\u201995 \u2014 Object-Oriented Programming , 9th European Conference, \u02da Aarhus, Denmark, August 7\u201311, 1995 , volume 952 of Lecture Notes in Computer Science, pages 77\u2013101. Springer Berlin Heidelberg , 1995 . J. Dean, D. Grove, and C. Chambers. Optimization of object-oriented programs using static class hierarchy analysis. In M. Tokoro and R. Pareschi, editors, ECOOP\u201995 \u2014 Object-Oriented Programming, 9th European Conference, \u02da Aarhus, Denmark, August 7\u201311, 1995, volume 952 of Lecture Notes in Computer Science, pages 77\u2013101. Springer Berlin Heidelberg, 1995."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814307"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786865"},{"key":"e_1_3_2_1_13_1","volume-title":"The Java Language Specification","author":"Gosling J.","year":"2000","unstructured":"J. Gosling , B. Joy , G. Steele , and G. Bracha . The Java Language Specification , 2000 . Sun Microsystems , 2009. J. Gosling, B. Joy, G. Steele, and G. Bracha. The Java Language Specification, 2000. Sun Microsystems, 2009."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/506315.506316"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786829"},{"key":"e_1_3_2_1_16_1","unstructured":"S. Koivu. Java trusted method chaining (cve-2010-0840\/zdi-10-056). http:\/\/slightlyrandombrokenthoughts.blogspot.de\/ 2010\/04\/java-trusted-method-chaining-cve-2010.html apr 2010. S. Koivu. Java trusted method chaining (cve-2010-0840\/zdi-10-056). http:\/\/slightlyrandombrokenthoughts.blogspot.de\/ 2010\/04\/java-trusted-method-chaining-cve-2010.html apr 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582452"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/99583.99599"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/143095.143137"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635878"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349310"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.20"},{"key":"e_1_3_2_1_24_1","first-page":"36","volume-title":"Proceedings of the 10th International Conference on Compiler Construction","volume":"2027","author":"Rountev A.","unstructured":"A. Rountev and B. G. Ryder . Points-to and side-effect analyses for programs built with precompiled libraries . In Proceedings of the 10th International Conference on Compiler Construction , volume 2027 of CC \u201901, pages 20\u2013 36 . Springer Berlin Heidelberg, 2001. A. Rountev and B. G. Ryder. Points-to and side-effect analyses for programs built with precompiled libraries. In Proceedings of the 10th International Conference on Compiler Construction, volume 2027 of CC \u201901, pages 20\u201336. Springer Berlin Heidelberg, 2001."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(96)00072-2"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/53990.54007"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367022"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134027"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094817"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237727"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353189"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353190"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390658"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_6"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660213"}],"event":{"name":"FSE'16: 24nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Seattle WA USA","acronym":"FSE'16"},"container-title":["Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2950290.2950312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T06:05:56Z","timestamp":1673244356000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950290.2950312"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":35,"alternative-id":["10.1145\/2950290.2950312","10.1145\/2950290"],"URL":"https:\/\/doi.org\/10.1145\/2950290.2950312","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]},"assertion":[{"value":"2016-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}