Team for Research in
Ubiquitous Secure Technology

Context-Sensitive Program Analysis as Database Queries
Monica Lam, John Whaley, Benjamin Livshits, Michael Martin, Dzintars Avots, Michael Carbin, Christopher Unkel

Citation
Monica Lam, John Whaley, Benjamin Livshits, Michael Martin, Dzintars Avots, Michael Carbin, Christopher Unkel. "Context-Sensitive Program Analysis as Database Queries". 24th SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, June, 2005.

Abstract
(No abstract.)

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Monica Lam, John Whaley, Benjamin Livshits, Michael Martin,
    Dzintars Avots, Michael Carbin, Christopher Unkel. <a
    href="http://www.truststc.org/pubs/399.html"
    >Context-Sensitive Program Analysis as Database
    Queries</a>, 24th SIGMOD-SIGACT-SIGART Symposium on
    Principles of Database Systems, June, 2005.
  • Plain text
    Monica Lam, John Whaley, Benjamin Livshits, Michael Martin,
    Dzintars Avots, Michael Carbin, Christopher Unkel.
    "Context-Sensitive Program Analysis as Database
    Queries". 24th SIGMOD-SIGACT-SIGART Symposium on
    Principles of Database Systems, June, 2005.
  • BibTeX
    @inproceedings{LamWhaleyLivshitsMartinAvotsCarbinUnkel05_ContextSensitiveProgramAnalysisAsDatabaseQueries,
        author = {Monica Lam and John Whaley and Benjamin Livshits
                  and Michael Martin and Dzintars Avots and Michael
                  Carbin and Christopher Unkel},
        title = {Context-Sensitive Program Analysis as Database
                  Queries},
        booktitle = {24th SIGMOD-SIGACT-SIGART Symposium on Principles
                  of Database Systems},
        month = {June},
        year = {2005},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/399.html}
    }
    

Posted by Jessica Gamble on 7 May 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.