{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T10:33:07Z","timestamp":1700649187007},"reference-count":24,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":2797,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2005,12]]},"DOI":"10.1016\/j.entcs.2005.02.034","type":"journal-article","created":{"date-parts":[[2005,11,29]],"date-time":"2005-11-29T08:50:14Z","timestamp":1133254214000},"page":"109-128","source":"Crossref","is-referenced-by-count":2,"title":["Subroutine Inlining and Bytecode Abstraction to Simplify Static and Dynamic Analysis"],"prefix":"10.1016","volume":"141","author":[{"given":"Cyrille","family":"Artho","sequence":"first","affiliation":[]},{"given":"Armin","family":"Biere","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.entcs.2005.02.034_bib001","unstructured":"1st, 2nd, 3rd and 4th Workshops on Runtime Verification (RV'01 \u2013 RV'04), volume 55(2), 70(4), 89(2), 24(2) of ENTCS. Elsevier Science, 2001 \u2013 2004"},{"key":"10.1016\/j.entcs.2005.02.034_bib002","article-title":"Combined static and dynamic analysis","author":"Artho","year":"2005","journal-title":"ENTCS"},{"key":"10.1016\/j.entcs.2005.02.034_bib003","series-title":"Proc. ATVA '04","article-title":"Using block-local atomicity to detect stale-value concurrency errors","author":"Artho","year":"2004"},{"issue":"4","key":"10.1016\/j.entcs.2005.02.034_bib004","article-title":"High-level data races","volume":"13","author":"Artho","year":"2003","journal-title":"Journal on Software Testing, Verification & Reliability (STVR)"},{"key":"10.1016\/j.entcs.2005.02.034_bib005","series-title":"Proc. CAV '04","article-title":"JNuke: Efficient Dynamic Analysis for Java","author":"Artho","year":"2004"},{"key":"10.1016\/j.entcs.2005.02.034_bib006","unstructured":"P. Bothner. Kawa \u2014 compiling dynamic languages to the Java VM. In Proc. USENIX 1998 Technical Conference, FREENIX Track, New Orleans, USA, june 1998. USENIX Association"},{"key":"10.1016\/j.entcs.2005.02.034_bib007","unstructured":"E. Briot. JGNAT: The GNAT Ada 95 environment for the JVM. In Ada France, France, September 1999"},{"key":"10.1016\/j.entcs.2005.02.034_bib008","series-title":"Proc. Symp. Principles of Programming Languages","article-title":"Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints","author":"Cousot","year":"1977"},{"key":"10.1016\/j.entcs.2005.02.034_bib009","author":"Dahm"},{"key":"10.1016\/j.entcs.2005.02.034_bib010","series-title":"Proc. PLDI 2002","first-page":"234","article-title":"Extended static checking for Java","author":"Flanagan","year":"2002"},{"key":"10.1016\/j.entcs.2005.02.034_bib011","unstructured":"S. Freund. The costs and benefits of Java bytecode subroutines. In Formal Underpinnings of Java Workshop at OOPSLA, Vancouver, Canada, 1998"},{"key":"10.1016\/j.entcs.2005.02.034_bib012","series-title":"The Java Language Specification","author":"Gosling","year":"2000"},{"key":"10.1016\/j.entcs.2005.02.034_bib013","series-title":"Design and Validation of Computer Protocols","author":"Holzmann","year":"1991"},{"issue":"3","key":"10.1016\/j.entcs.2005.02.034_bib014","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/S0304-3975(02)00869-1","article-title":"Verified bytecode verifiers","volume":"298","author":"Klein","year":"2003","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/j.entcs.2005.02.034_bib015","series-title":"Proc. ACM 2000 conference on Java Grande","first-page":"1","article-title":"Efficient Java exception handling in just-in-time compilation","author":"Lee","year":"2000"},{"key":"10.1016\/j.entcs.2005.02.034_bib016","series-title":"The Java Virtual Machine Specification","author":"Lindholm","year":"1999"},{"key":"10.1016\/j.entcs.2005.02.034_bib017","unstructured":"R. Marlet. Syntax of the jcvm language to be studied in the secsafe project. Technical Report SECSAFE-TL-005-1.7, Trusted Logic SA, Versailles, France, 2001"},{"key":"10.1016\/j.entcs.2005.02.034_bib018","series-title":"Java Virtual Machine","author":"Meyer","year":"1997"},{"key":"10.1016\/j.entcs.2005.02.034_bib019","series-title":"Proc. 11th CC","first-page":"111","article-title":"Decompiling Java bytecode: Problems, traps and pitfalls","author":"Miecznikowski","year":"2002"},{"key":"10.1016\/j.entcs.2005.02.034_bib020","series-title":"Proc. 11th CC","first-page":"46","article-title":"A graph-free approach to data-flow analysis","author":"Mohnen","year":"2002"},{"key":"10.1016\/j.entcs.2005.02.034_bib021","series-title":"Java and the Java Virtual Machine","author":"St\u00e4rk","year":"2001"},{"key":"10.1016\/j.entcs.2005.02.034_bib022","unstructured":"R. Vall\u00e9e-Rai. Soot: A Java bytecode optimization framework. Master's thesis, McGill University, Montreal, 2000"},{"key":"10.1016\/j.entcs.2005.02.034_bib023","unstructured":"R. Vall\u00e9e-Rai, L. Hendren, V. Sundaresan, P. Lam, E. Gagnon, and P. Co. Soot \u2013 a Java optimization framework. In Proc. CASCON 1999, pages 125\u2013135, 1999"},{"key":"10.1016\/j.entcs.2005.02.034_bib024","unstructured":"M. Wildmoser. Subroutines and Java bytecode verification. Master's thesis, Technical University of Munich, 2002"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105051467?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105051467?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,1,20]],"date-time":"2019-01-20T12:53:26Z","timestamp":1547988806000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066105051467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,12]]}},"alternative-id":["S1571066105051467"],"URL":"https:\/\/doi.org\/10.1016\/j.entcs.2005.02.034","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2005,12]]}}}