(7.34) Invoker Analysis