{"id":"https://openalex.org/W2116705122","doi":"https://doi.org/10.1109/scam.2009.13","title":"Improving Side-Effect Analysis with Lazy Access Path Resolving","display_name":"Improving Side-Effect Analysis with Lazy Access Path Resolving","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2116705122","doi":"https://doi.org/10.1109/scam.2009.13","mag":"2116705122"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/scam.2009.13","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018865533","display_name":"Ju Qian","orcid":"https://orcid.org/0000-0001-8028-7213"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ju Qian","raw_affiliation_strings":["[Coll. of Inf. Sci. & Technol., Nanjing Univ. of Aeronaut. & Astronaut., Nanjing, China]"],"affiliations":[{"raw_affiliation_string":"[Coll. of Inf. Sci. & Technol., Nanjing Univ. of Aeronaut. & Astronaut., Nanjing, China]","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031391841","display_name":"Yuming Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuming Zhou","raw_affiliation_strings":["State Key Lab. for Novel Software Tech., Nanjing Univ., Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab. for Novel Software Tech., Nanjing Univ., Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100331400","display_name":"Baowen Xu","orcid":"https://orcid.org/0000-0001-7743-1296"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baowen Xu","raw_affiliation_strings":["State Key Lab. for Novel Software Tech., Nanjing Univ., Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab. for Novel Software Tech., Nanjing Univ., Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.246,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":5,"citation_normalized_percentile":{"value":0.611204,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":79,"max":80},"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"44"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9963,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9963,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9952,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pointer-analysis","display_name":"Pointer analysis","score":0.53652656}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8187746},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.7319269},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.56120825},{"id":"https://openalex.org/C7263679","wikidata":"https://www.wikidata.org/wiki/Q5978076","display_name":"Pointer analysis","level":3,"score":0.53652656},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.48274463},{"id":"https://openalex.org/C82793941","wikidata":"https://www.wikidata.org/wiki/Q1046024","display_name":"Path analysis (statistics)","level":2,"score":0.4525409},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.41907066},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33621484},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.27044374},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18323654},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15980285},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.13454461},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0846225},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/scam.2009.13","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W1500987966","https://openalex.org/W1536098516","https://openalex.org/W1812582761","https://openalex.org/W1851113295","https://openalex.org/W1886675772","https://openalex.org/W1912722244","https://openalex.org/W1972427803","https://openalex.org/W2010540686","https://openalex.org/W2017351599","https://openalex.org/W2018399175","https://openalex.org/W2046699259","https://openalex.org/W2114067856","https://openalex.org/W2117619612","https://openalex.org/W2119228825","https://openalex.org/W2131135493","https://openalex.org/W2149237601","https://openalex.org/W2162544703","https://openalex.org/W2166091242","https://openalex.org/W338991206","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3147482974","https://openalex.org/W2999115679","https://openalex.org/W2891057055","https://openalex.org/W2553375745","https://openalex.org/W2370320024","https://openalex.org/W2363386825","https://openalex.org/W2362627649","https://openalex.org/W2260512874","https://openalex.org/W2188526093","https://openalex.org/W1996094959"],"abstract_inverted_index":{"For":[0],"scalability,":[1],"many":[2],"side-effect":[3,30,51,90,167],"analysis":[4,11,19,52,165,168],"methods":[5],"choose":[6],"inclusion-based":[7,116],"context-insensitive":[8],"(IBCI)":[9],"pointer":[10,18,55,164],"as":[12,100,102],"their":[13],"basis.":[14],"However,":[15],"such":[16,136],"a":[17,37],"is":[20,156],"known":[21],"to":[22,46,83,107,127,142],"be":[23,81,98,105,128],"imprecise,":[24],"which":[25],"often":[26],"results":[27,147],"in":[28,64,111,115,123,133,158],"over-conservative":[29],"sets.":[31],"In":[32],"this":[33],"paper,":[34],"we":[35],"present":[36],"lightweight":[38],"approach":[39,58,155],"that":[40,149],"exploits":[41],"lazy":[42,137,151],"access":[43,66,77,94,109,152],"path":[44,67,95,110,153],"resolving":[45,138,154],"improve":[47],"the":[48,65,70,84,89,112,124,131,134,150,160],"precision":[49,161],"of":[50,72,121,162],"under":[53],"IBCI":[54,163],"analysis.":[56],"The":[57,145],"partly":[59],"represents":[60],"and":[61],"propagates":[62],"side-effects":[63],"form":[68],"with":[69],"help":[71],"interstatement":[73],"must":[74],"aliases.":[75],"All":[76],"paths":[78],"can":[79,140],"finally":[80],"resolved":[82,99],"accessed":[85],"locations,":[86],"but":[87],"during":[88],"propagation":[91],"phase,":[92],"an":[93],"will":[96],"never":[97],"long":[101],"it":[103],"could":[104],"mapped":[106],"another":[108],"caller.":[113],"Since":[114],"points-to":[117,119],"analysis,":[118],"sets":[120],"variables":[122],"callers":[125],"tend":[126],"smaller":[129],"than":[130],"ones":[132],"callees,":[135],"mechanism":[139],"lead":[141],"more":[143],"precision.":[144],"experimental":[146],"show":[148],"effective":[157],"improving":[159],"based":[166],"methods.":[169]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2116705122","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-01-04T00:00:37.663459","created_date":"2016-06-24"}