{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T13:48:44Z","timestamp":1778766524442,"version":"3.51.4"},"reference-count":9,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":8186,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1984,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A garbage collection algorithm that permits a reference count storage reclamation scheme to collect circularly linked inaccessible structures is presented. The algorithm requires no additional information beyond that required by a reference count scheme. In particular, it does not require the garbage collector to be able to find pointers <jats:italic>outside<\/jats:italic> the heap. The algorithm is most useful for augmenting reference count storage reclamation systems and for implementing storage management systems on top of languages that do not provide their own. It is, however, considerably less efficient in space and time than conventional garbage collection systems.<\/jats:p>","DOI":"10.1002\/spe.4380140602","type":"journal-article","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T04:01:30Z","timestamp":1163822490000},"page":"503-507","source":"Crossref","is-referenced-by-count":44,"title":["Reference count garbage collection"],"prefix":"10.1002","volume":"14","author":[{"given":"Thomas W.","family":"Christopher","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/367487.367501"},{"key":"e_1_2_1_3_2","volume-title":"The Art of Computer Programming, Volume 1: Fundamental Algorithms","author":"Knuth D. E.","year":"1969"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/363534.363554"},{"key":"e_1_2_1_5_2","volume-title":"Fundamentals of Computer Algorithms","author":"Horowitz E.","year":"1978"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/367593.367617"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359470"},{"key":"e_1_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/362790.362798"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/363269.363280"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/356850.356854"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380140602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380140602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T20:38:39Z","timestamp":1697747919000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380140602"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1984,6]]},"references-count":9,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1984,6]]}},"alternative-id":["10.1002\/spe.4380140602"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380140602","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1984,6]]}}}