{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T05:50:33Z","timestamp":1750830633795},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642417061"},{"type":"electronic","value":"9783642417078"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41707-8_17","type":"book-chapter","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T06:56:38Z","timestamp":1383116198000},"page":"255-270","source":"Crossref","is-referenced-by-count":4,"title":["A Dynamic Approach to Locating Memory Leaks"],"prefix":"10.1007","author":[{"given":"Kostyantyn","family":"Vorobyov","sequence":"first","affiliation":[]},{"given":"Padmanabhan","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Stocks","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Hastings, R., Joyce, B.: Purify: Fast detection of memory leaks and access errors. In: Proceedings of the Winter USENIX Conference, pp. 125\u2013136 (January 1992)"},{"key":"17_CR2","unstructured":"Seward, J., Nethercote, N.: Using valgrind to detect undefined value errors with bit-precision. In: Proceedings of the USENIX Annual Technical Conference, USENIX, pp. 17\u201330 (2005)"},{"key":"17_CR3","unstructured":"Parasoft (Insure++), \n                    \n                      http:\/\/www.parasoft.com\/jsp\/products\/insure.jsp"},{"key":"17_CR4","unstructured":"Intel: (Parallel inspector), \n                    \n                      http:\/\/software.intel.com\/en-us\/intel-parallel-inspector"},{"key":"17_CR5","unstructured":"Nielson, H.R., Nielson, F.: Semantics with applications - a formal introduction. Wiley Professional Computing. Wiley (1992)"},{"key":"17_CR6","unstructured":"clang: a C language family frontend for LLVM (March 2012), \n                    \n                      http:\/\/clang.llvm.org"},{"key":"17_CR7","unstructured":"Lattner, C., Adve, V.: LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In: Proceedings of the International Symposium on Code Generation and Optimization, CGO 2004. IEEE Computer Society, Washington, DC (2004)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: Valgrind: A framework for heavyweight dynamic binary instrumentation. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007, vol.\u00a042, pp. 89\u2013100. ACM, New York (2007)","DOI":"10.1145\/1273442.1250746"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Bruening, D., Zhao, Q.: Practical memory checking with Dr. Memory. In: Proceedings of the Annual IEEE\/ACM International Symposium on Code Generation and Optimization, CGO 2011, pp. 213\u2013223. IEEE Computer Society, Washington, DC (2011)","DOI":"10.1109\/CGO.2011.5764689"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Maebe, J., Ronsse, M., Bosschere, K.D.: Precise detection of memory leaks. In: Proceedings of the International Workshop on Dynamic Analysis, pp. 25\u201331 (May 2004)","DOI":"10.1049\/ic:20040295"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Clause, J.A., Orso, A.: LEAKPOINT: Pinpointing the causes of memory leaks. In: Proceedings of the ACM\/IEEE International Conference on Software Engineering, ICSE 2010, vol.\u00a01, pp. 515\u2013524. ACM (May 2010)","DOI":"10.1145\/1806799.1806874"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Boehm, H.: Dynamic memory allocation and garbage collection. Computers in Physics\u00a09, 297\u2013303 (1995)","DOI":"10.1063\/1.4823407"}],"container-title":["Lecture Notes in Computer Science","Testing Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41707-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T22:02:23Z","timestamp":1558648943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41707-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642417061","9783642417078"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41707-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}