default search action
Uday P. Khedker
Person information
- affiliation: Indian Institute of Technology, Bombay, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i20]Vini Kanvar, Uday P. Khedker:
Which Part of the Heap is Useful? Improving Heap Liveness Analysis. CoRR abs/2408.12947 (2024) - 2023
- [j12]Komal Pathade, Uday P. Khedker:
Computing maximum fixed point solutions over feasible paths in data flow analyses. Sci. Comput. Program. 228: 102944 (2023) - [i19]Barnali Basak, Uday P. Khedker, Supratim Biswas:
SpComp: A Sparsity Structure-Specific Compilation of Matrix Operations. CoRR abs/2307.06109 (2023) - 2022
- [j11]Swati Jaiswal, Uday P. Khedker, Alan Mycroft:
A Unified Model for Context-Sensitive Program Analyses: : The Blind Men and the Elephant. ACM Comput. Surv. 54(6): 114:1-114:37 (2022) - [i18]Komal Pathade, Uday P. Khedker:
Computing Maximum Fixed Point Solutions over Feasible Paths in Data Flow Analyses. CoRR abs/2208.12561 (2022) - 2020
- [j10]Swati Jaiswal, Uday P. Khedker, Supratik Chakraborty:
Bidirectionality in flow-sensitive demand-driven analysis. Sci. Comput. Program. 190: 102391 (2020) - [j9]Pritam M. Gharat, Uday P. Khedker, Alan Mycroft:
Generalized Points-to Graphs: A Precise and Scalable Abstraction for Points-to Analysis. ACM Trans. Program. Lang. Syst. 42(2): 8:1-8:78 (2020)
2010 – 2019
- 2019
- [c19]Komal Pathade, Uday P. Khedker:
Path sensitive MFP solutions in presence of intersecting infeasible control flow path segments. CC 2019: 159-169 - 2018
- [c18]Komal Pathade, Uday P. Khedker:
Computing partially path-sensitive MFP solutions in data flow analyses. CC 2018: 37-47 - [i17]Pritam M. Gharat, Uday P. Khedker, Alan Mycroft:
Generalized Points-to Graphs: A New Abstraction of Memory in the Presence of Pointers. CoRR abs/1801.09189 (2018) - [i16]Swati Jaiswal, Uday P. Khedker, Supratik Chakraborty:
Demand-driven Alias Analysis : Formalizing Bidirectional Analyses for Soundness and Precision. CoRR abs/1802.00932 (2018) - 2017
- [c17]Vini Kanvar, Uday P. Khedker:
"What's in a name?" going beyond allocation site names in heap analysis. ISMM 2017: 92-103 - 2016
- [j8]Vini Kanvar, Uday P. Khedker:
Heap Abstractions for Static Analysis. ACM Comput. Surv. 49(2): 29:1-29:47 (2016) - [c16]Tukaram Muske, Uday P. Khedker:
Cause Points Analysis for Effective Handling of Alarms. ISSRE 2016: 173-184 - [c15]Anushri Jana, Uday P. Khedker, Advaita Datar, R. Venkatesh, Niyas C:
Scaling Bounded Model Checking by Transforming Programs with Arrays. LOPSTR 2016: 275-292 - [c14]Pritam M. Gharat, Uday P. Khedker, Alan Mycroft:
Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs. SAS 2016: 212-236 - [i15]Pritam M. Gharat, Uday P. Khedker:
Flow and Context Sensitive Points-to Analysis using Higher Order Reachability. CoRR abs/1603.09597 (2016) - [i14]Anushri Jana, Uday P. Khedker, Advaita Datar, R. Venkatesh, Niyas C:
Scaling Bounded Model Checking By Transforming Programs With Arrays. CoRR abs/1606.06974 (2016) - [i13]Anushri Jana, Uday P. Khedker, Advaita Datar, R. Venkatesh, Niyas C:
Scaling Bounded Model Checking By Transforming Programs With Arrays. CoRR abs/1608.05368 (2016) - 2015
- [j7]Benjamin Livshits, Manu Sridharan, Yannis Smaragdakis, Ondrej Lhoták, José Nelson Amaral, Bor-Yuh Evan Chang, Samuel Z. Guyer, Uday P. Khedker, Anders Møller, Dimitrios Vardoulakis:
In defense of soundiness: a manifesto. Commun. ACM 58(2): 44-46 (2015) - [c13]Tukaram Muske, Uday P. Khedker:
Efficient elimination of false positives using static analysis. ISSRE 2015: 270-280 - [c12]Shrawan Kumar, Amitabha Sanyal, Uday P. Khedker:
Value Slice: A New Slicing Concept for Scalable Property Checking. TACAS 2015: 101-115 - 2014
- [i12]Vini Kanvar, Uday P. Khedker:
Heap Abstractions for Static Analysis. CoRR abs/1403.4910 (2014) - [i11]Shrawan Kumar, Amitabha Sanyal, Uday P. Khedker:
Sliced Slices: Separating Data and Control Influences. CoRR abs/1407.4917 (2014) - [i10]Uday P. Khedker, Vini Kanvar:
Generalizing the Liveness Based Points-to Analysis. CoRR abs/1411.5289 (2014) - [i9]Uday P. Khedker:
Buffer Overflow Analysis for C. CoRR abs/1412.5400 (2014) - 2013
- [c11]Rohan Padhye, Uday P. Khedker:
Interprocedural data flow analysis in Soot using value contexts. SOAP@PLDI 2013: 31-36 - [i8]Rohan Padhye, Uday P. Khedker:
Interprocedural Data Flow Analysis in Soot using Value Contexts. CoRR abs/1304.6274 (2013) - 2012
- [c10]Uday P. Khedker, Alan Mycroft, Prashant Singh Rawat:
Liveness-Based Pointer Analysis. SAS 2012: 265-282 - [i7]Aditya Kanade, Amitabha Sanyal, Uday P. Khedker:
A Logic for Correlating Temporal Properties across Program Transformations. CoRR abs/1209.5152 (2012) - 2011
- [i6]Uday P. Khedker, Alan Mycroft, Prashant Singh Rawat:
Lazy Pointer Analysis. CoRR abs/1112.5000 (2011)
2000 – 2009
- 2009
- [b1]Uday P. Khedker, Amitabha Sanyal, Bageshri Sathe:
Data Flow Analysis - Theory and Practice. CRC Press 2009, ISBN 978-0-8493-2880-0, pp. I-XIII, 1-386 - [j6]Aditya Kanade, Amitabha Sanyal, Uday P. Khedker:
Validation of GCC optimizers through trace generation. Softw. Pract. Exp. 39(6): 611-639 (2009) - [c9]Rupesh Nasre, Kaushik Rajan, Ramaswamy Govindarajan, Uday P. Khedker:
Scalable Context-Sensitive Points-to Analysis Using Multi-dimensional Bloom Filters. APLAS 2009: 47-62 - 2008
- [c8]Uday P. Khedker, Bageshri Karkare:
Efficiency, Precision, Simplicity, and Generality in Interprocedural Data Flow Analysis: Resurrecting the Classical Call Strings Method. CC 2008: 213-228 - 2007
- [j5]Bageshri Karkare, Uday P. Khedker:
An improved bound for call strings based interprocedural analysis of bit vector frameworks. ACM Trans. Program. Lang. Syst. 29(6): 38 (2007) - [j4]Uday P. Khedker, Amitabha Sanyal, Amey Karkare:
Heap reference analysis using access graphs. ACM Trans. Program. Lang. Syst. 30(1): 1 (2007) - [p2]Amitabha Sanyal, Uday P. Khedker:
Garbage Collection Techniques. The Compiler Design Handbook, 2nd ed. 2007: 6 - [i5]Amey Karkare, Amitabha Sanyal, Uday P. Khedker:
Heap Reference Analysis for Functional Programs. CoRR abs/0710.1482 (2007) - [i4]Amey Karkare, Uday P. Khedker, Amitabha Sanyal:
Liveness of Heap Data for Functional Programs. CoRR abs/cs/0703155 (2007) - 2006
- [c7]Bageshri Sathe, Uday P. Khedker:
Static Program Partitioning for Embedded Processors. ESA 2006: 31-37 - [c6]Aditya Kanade, Amitabha Sanyal, Uday P. Khedker:
A PVS Based Framework for Validating Compiler Optimizations. SEFM 2006: 108-117 - [c5]Uday P. Khedker:
Static Analysis of Programs: A Heap Centric View. SEFM 2006: 261 - [c4]Bageshri Sathe, Uday P. Khedker:
Complexity of Data Flow Analysis for Non-Separable Frameworks. Software Engineering Research and Practice 2006: 828-836 - [c3]Aditya Kanade, Amitabha Sanyal, Uday P. Khedker:
Structuring Optimizing Transformations and Proving Them Sound. COCV@ETAPS 2006: 79-95 - [i3]Uday P. Khedker, Amitabha Sanyal, Amey Karkare:
Heap Reference Analysis Using Access Graphs. CoRR abs/cs/0608104 (2006) - [i2]Bageshri Karkare, Uday P. Khedker:
Complexity of Data Flow Analysis for Non-Separable Frameworks. CoRR abs/cs/0610164 (2006) - [i1]Amey Karkare, Amitabha Sanyal, Uday P. Khedker:
Effectiveness of Garbage Collection in MIT/GNU Scheme. CoRR abs/cs/0611093 (2006) - 2005
- [c2]Aditya Kanade, Uday P. Khedker, Amitabha Sanyal:
Heterogeneous Fixed Points with Application to Points-To Analysis. APLAS 2005: 298-314 - 2003
- [j3]Uday P. Khedker, Dhananjay M. Dhamdhere, Alan Mycroft:
Bidirectional data flow analysis for type inferencing. Comput. Lang. Syst. Struct. 29(1-2): 15-44 (2003) - 2002
- [p1]Uday P. Khedker:
Data Flow Analysis. The Compiler Design Handbook 2002: 1-59
1990 – 1999
- 1999
- [j2]Uday P. Khedker, Dhananjay M. Dhamdhere:
Bidirectional Data Flow Analysis: Myth and Reality. ACM SIGPLAN Notices 34(6): 47-57 (1999) - 1994
- [j1]Uday P. Khedker, Dhananjay M. Dhamdhere:
A Generalized Theory of Bit Vector Data Flow Analysis. ACM Trans. Program. Lang. Syst. 16(5): 1472-1511 (1994) - 1993
- [c1]Dhananjay M. Dhamdhere, Uday P. Khedker:
Complexity of Bidirectional Data Flow Analysis. POPL 1993: 397-408
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint