We applied our [pointer alias analysis] to the most popular … [Java] … can be analyzed in under 20 minutes. … [p. 143] This paper shows that, by using binary … [BDDs] … We clone all the methods in a call … to get context-sensitive results. By numbering similar contexts … We showed that this approach can be applied …
Google-1
Google-2
Copyright clearance needed for quotation.