Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2022
A Case for Precise, Fine-Grained Pointer Synthesis in High-Level Synthesis
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 27, Issue 4Article No.: 30, Pages 1–26https://doi.org/10.1145/3491430This article combines two practical approaches to improve pointer synthesis within HLS tools. Both approaches focus on inefficiencies in how HLS tools treat the points-to graph—a mapping that connects each instruction to the memory locations that it might ...
Return of CFA: call-site sensitivity can be superior to object sensitivity even for object-oriented programs
Proceedings of the ACM on Programming Languages (PACMPL), Volume 6, Issue POPLArticle No.: 58, Pages 1–29https://doi.org/10.1145/3498720In this paper, we challenge the commonly-accepted wisdom in static analysis that object sensitivity is superior to call-site sensitivity for object-oriented programs. In static analysis of object-oriented programs, object sensitivity has been established ...
- research-articleDecember 2021
Revisiting the privacy calculus: Why are consumers (really) willing to disclose personal data online?
Highlights- The willingness to disclose personal data online is explained through new lenses.
With the digital age, businesses are increasingly collecting consumers’ data, which is raising privacy issues. Existing research has been dominated by the rational-based privacy calculus theory, which overlooks the role of ...
- ArticleOctober 2021
Selective Context-Sensitivity for k-CFA with CFL-Reachability
Abstractk-CFA provides the most well-known context abstraction for program analysis, especially pointer analysis, for a wide range of programming languages. However, its inherent context explosion problem has hindered its applicability. To mitigate this ...
- ArticleNovember 2020
A Set-Based Context Model for Program Analysis
AbstractIn program analysis, the design of context models is an understudied topic. This paper presents a study of context models for higher-order program analyses and develops new approaches. We develop a context model which equates control flows with ...
Learning graph-based heuristics for pointer analysis without handcrafting application-specific features
Proceedings of the ACM on Programming Languages (PACMPL), Volume 4, Issue OOPSLAArticle No.: 179, Pages 1–30https://doi.org/10.1145/3428247We present Graphick, a new technique for automatically learning graph-based heuristics for pointer analysis. Striking a balance between precision and scalability of pointer analysis requires designing good analysis heuristics. For example, because ...
- articleMarch 2019
Characterization of privacy based on context sensitivity and user preference for multimedia context-aware on IoT
Multimedia Tools and Applications (MTAA), Volume 78, Issue 5Pages 5355–5366https://doi.org/10.1007/s11042-018-6103-5In an IoT environment, building a Context-Aware system is mandatory and can provide a suitable and timely (just-in-time) service suited to the context of the user. In addition, the IoT environment is made on the assumption that maximum collection of the ...
- research-articleFebruary 2019
Compare less, defer more: scaling value-contexts based whole-program heap analyses
CC 2019: Proceedings of the 28th International Conference on Compiler ConstructionPages 135–146https://doi.org/10.1145/3302516.3307359The precision of heap analyses determines the precision of several associated optimizations, and has been a prominent area in compiler research. It has been shown that context-sensitive heap analyses are more precise than the insensitive ones, but their ...
- research-articleSeptember 2016
Allocation characterizes polyvariance: a unified methodology for polyvariant control-flow analysis
ICFP 2016: Proceedings of the 21st ACM SIGPLAN International Conference on Functional ProgrammingPages 407–420https://doi.org/10.1145/2951913.2951936The polyvariance of a static analysis is the degree to which it structurally differentiates approximations of program values. Polyvariant techniques come in a number of different flavors that represent alternative heuristics for managing the trade-off ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 9 - research-articleJanuary 2016
Do context and personality matter? Trust and privacy concerns in disclosing private information online
Research and business practice have already established the central role of trust in business, particularly in online interactions. Many online business exchanges require the disclosure of sensitive personal information on a regular basis. ...
- ArticleAugust 2015
Countability: Individuation and Context
Proceedings of the 20th and 21st International Conferences on Formal Grammar - Volume 9804Pages 290–305https://doi.org/10.1007/978-3-662-53042-9_17Much of the recent countability research agrees on the idea that a satisfactory account of individuation in terms of what counts as "one" unit for counting is highly relevant for characterizing a semantics of the mass/count distinction. What counts as "...
- articleJanuary 2013
An evaluation tool for research of user behavior in a realistic mobile environment
Personal and Ubiquitous Computing (PUC), Volume 17, Issue 1Pages 3–14https://doi.org/10.1007/s00779-011-0475-0User behavior is significantly influenced by the surrounding environment. Especially complex and dynamically changing environments (like mobile environment) are represented by a wide variety of extraneous variables, which influence the user behavior in ...