Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,393,622 papers from all fields of science
Search
Sign In
Create Free Account
Alias analysis
Alias analysis is a technique in compiler theory, used to determine if a storage location may be accessed in more than one way. Two pointers are said…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Aliasing (computing)
Automatic parallelization
Automatic vectorization
Call graph
Expand
Broader (1)
Static program analysis
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
Alias Analysis for Object-Oriented Programs
Manu Sridharan
,
S. Chandra
,
Julian T Dolby
,
Stephen J. Fink
,
Eran Yahav
Aliasing in Object-Oriented Programming
2013
Corpus ID: 15627546
We present a high-level survey of state-of-the-art alias analyses for object-oriented programs, based on a years-long effort…
Expand
Highly Cited
2010
Highly Cited
2010
Ad Hoc Synchronization Considered Harmful
Weiwei Xiong
,
Soyeon Park
,
Jiaqi Zhang
,
Yuanyuan Zhou
,
Zhiqiang Ma
USENIX Symposium on Operating Systems Design and…
2010
Corpus ID: 1965118
Many synchronizations in existing multi-threaded programs are implemented in an ad hoc way. The first part of this paper does a…
Expand
2010
2010
Shape Analysis in the Absence of Pointers and Structure
M. Might
International Conference on Verification, Model…
2010
Corpus ID: 18221836
Shape analyses (Chase et al. 1990, Sagiv et al. 2002) discover properties of dynamic and/or mutable structures. We ask, “Is there…
Expand
Review
2006
Review
2006
Precise alias analysis for static detection of web application vulnerabilities
N. Jovanović
,
Christopher Krügel
,
E. Kirda
ACM Workshop on Programming Languages and…
2006
Corpus ID: 1494370
The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and…
Expand
Highly Cited
2004
Highly Cited
2004
Zing: Exploiting Program Structure for Model Checking Concurrent Software
Tony Andrews
,
S. Qadeer
,
S. Rajamani
,
Yichen Xie
International Conference on Concurrency Theory
2004
Corpus ID: 856671
Model checking is a technique for finding bugs in systems by systematically exploring their state spaces. We wish to extract…
Expand
2004
2004
A Methodology to Create Legal Ontologies in a Logic Programming Based Web Information Retrieval System
José Saias
,
P. Quaresma
Artificial Intelligence and Law
2004
Corpus ID: 24013228
Web legal information retrieval systems need the capability to reason with the knowledge modeled by legal ontologies. Using this…
Expand
Highly Cited
1999
Highly Cited
1999
Interprocedural pointer alias analysis
M. Hind
,
M. Burke
,
P. Carini
,
Jong-Deok Choi
TOPL
1999
Corpus ID: 15197780
We present practical approximation methods for computing and representing interprocedural aliases for a program written in a…
Expand
Highly Cited
1995
Highly Cited
1995
Interprocedural symbolic analysis
P. Havlak
,
K. Kennedy
1995
Corpus ID: 59697358
Compiling for efficient execution on advanced computer architectures requires extensive program analysis and transformation. Most…
Expand
Highly Cited
1994
Highly Cited
1994
Interprocedural may-alias analysis for pointers: beyond k-limiting
A. Deutsch
ACM-SIGPLAN Symposium on Programming Language…
1994
Corpus ID: 10569415
Existing methods for alias analysis of recursive pointer data structures are based on two approximation techniques: k-limiting…
Expand
Highly Cited
1994
Highly Cited
1994
Flow-Insensitive Interprocedural Alias Analysis in the Presence of Pointers
M. Burke
,
P. Carini
,
Jong-Deok Choi
,
M. Hind
International Workshop on Languages and Compilers…
1994
Corpus ID: 6682662
Data-flow analysis algorithms can be classified into two categories: flow-sensitive and flow-insensitive. To improve efficiency…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE