{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:22:59Z","timestamp":1742383379905},"reference-count":24,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/scam.2001.972681","type":"proceedings-article","created":{"date-parts":[[2002,11,13]],"date-time":"2002-11-13T22:16:03Z","timestamp":1037225763000},"page":"194-203","source":"Crossref","is-referenced-by-count":3,"title":["Type infeasible call chains"],"prefix":"10.1109","author":[{"given":"A.L.","family":"Souter","sequence":"first","affiliation":[]},{"given":"L.L.","family":"Pollock","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/267959.269970"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1145\/207110.207121","article-title":"Simple and Effective Link-Time Optimizations of Modula-3 Programs","author":"fern\u00e1ndez","year":"1995","journal-title":"Proc Program Lang Design Implement"},{"key":"ref12","article-title":"The Impact of Interprocedural Class Analysis on Optimization","author":"grove","year":"1995","journal-title":"Proc CASCON"},{"journal-title":"Effective Interprocedural Optimization of Object-Oriented Languages","year":"1998","author":"grove","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1981.234509"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/117954.117965"},{"key":"ref16","article-title":"Static Type Determination for C++","author":"pande","year":"1994","journal-title":"Proceedings of the Sixth USENIX C Technical Conference"},{"journal-title":"Optimization of Object-Oriented and Concurrent Programs","year":"1994","author":"plevyak","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/191080.191130"},{"key":"ref19","article-title":"Precise Interprocedural Data Flow Analysis via Graph Reachability","author":"reps","year":"1995","journal-title":"Proc Conf Principles of Programming Languages"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-63531-9_25","article-title":"Refining data flow information using infeasible paths","author":"bodik","year":"1997","journal-title":"Proc Sixth European Software Eng Conf (ESEC\/FSE 97)"},{"journal-title":"Fast and effective optimization of statically typed object-oriented languages","year":"1997","author":"bacon","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49538-X_5"},{"key":"ref5","article-title":"Iterative Type Analysis and Extended Message Splitting: Optimizing Dynamically-Typed Object-Oriented Programs","author":"chambers","year":"1990","journal-title":"Proc Program Lang Design Implement"},{"key":"ref8","article-title":"Call Graph Construction in Object-Oriented Languages","author":"defouw","year":"1997","journal-title":"Proc of the Object-Oriented Programming Systems Languages and Applications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268965"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236371"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49538-X_2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236367"},{"key":"ref20","article-title":"Points-to Analysis for Java Based using Annotated Constraints","author":"rountev","year":"2001","journal-title":"Proc ACM Conf Object-Oriented Program Syst Lang and Applications"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353189"},{"journal-title":"Control-Flow Analysis of Higher-Order Languages","year":"1991","author":"shivers","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-55984-1_22","article-title":"Compile-time analysis of object-oriented programs","author":"vitek","year":"1992","journal-title":"In Proceedings of the 4th Int Conf on Compiler Construction CC'92"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353190"}],"event":{"name":"First IEEE International Workshop on Source Code Analysis and Manipulation","acronym":"SCAM-01","location":"Florence, Italy"},"container-title":["Proceedings First IEEE International Workshop on Source Code Analysis and Manipulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7667\/20963\/00972681.pdf?arnumber=972681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,7]],"date-time":"2024-01-07T23:14:00Z","timestamp":1704669240000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/972681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/scam.2001.972681","relation":{},"subject":[]}}