{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T17:12:22Z","timestamp":1726333942017},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s11390-016-1670-2","type":"journal-article","created":{"date-parts":[[2016,9,5]],"date-time":"2016-09-05T06:14:38Z","timestamp":1473056078000},"page":"869-882","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Prioritizing Test Cases for Memory Leaks in Android Applications"],"prefix":"10.1007","volume":"31","author":[{"given":"Ju","family":"Qian","sequence":"first","affiliation":[]},{"given":"Di","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,9]]},"reference":[{"key":"1670_CR1","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.jss.2014.06.005","volume":"96","author":"V \u0160or","year":"2014","unstructured":"\u0160or V, Srirama S N. Memory leak detection in Java: Taxonomy and classification of approaches. Journal of Systems and Software, 2014, 96: 139-151.","journal-title":"Journal of Systems and Software"},{"key":"1670_CR2","doi-asserted-by":"crossref","unstructured":"Pienaar J A, Hundt R. JSWhiz: Static analysis for JavaScript memory leaks. In Proc. the IEEE\/ACM International Symposium on Code Generation and Optimization (CGO), February 2013, pp.11:1-11:11.","DOI":"10.1109\/CGO.2013.6495007"},{"key":"1670_CR3","doi-asserted-by":"crossref","unstructured":"Yan D, Xu G, Yang S, Rountev A. LeakChecker: Practical static memory leak detection for managed languages. In Proc. the IEEE\/ACM International Symposium on Code Generation and Optimization (CGO), February 2014, pp.87-97.","DOI":"10.1145\/2581122.2544151"},{"issue":"1","key":"1670_CR4","first-page":"1","volume":"40","author":"M Jump","year":"2010","unstructured":"Jump M, McKinley K S. Detecting memory leaks in managed languages with Cork. Software: Practice and Experience, 2010, 40(1): 1-22.","journal-title":"Software: Practice and Experience"},{"key":"1670_CR5","doi-asserted-by":"crossref","unstructured":"De Pauw W, Sevitsky G. Visualizing reference patterns for solving memory leaks in Java. In Proc. the 13th European Conference on Object-Oriented Programming (ECOOP), June 1999, pp.116-134.","DOI":"10.1007\/3-540-48743-3_6"},{"key":"1670_CR6","doi-asserted-by":"crossref","unstructured":"Xu G, Bond M D, Qin F, Rountev A. LeakChaser: Helping programmers narrow down causes of memory leaks. In Proc. the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI ), June 2011, pp.270-282.","DOI":"10.1145\/1993498.1993530"},{"key":"1670_CR7","doi-asserted-by":"crossref","unstructured":"Rayside D, Mendel L. Object ownership profiling: A technique for finding and fixing memory leaks. In Proc. the 22nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), November 2007, pp.194-203.","DOI":"10.1145\/1321631.1321661"},{"key":"1670_CR8","doi-asserted-by":"crossref","unstructured":"Mitchell N, Sevitsky G. LeakBot: An automated and lightweight tool for diagnosing memory leaks in large Java applications. In Proc. the 17th European Conference on Object-Oriented Computing (ECOOP), July 2003, pp.351-377.","DOI":"10.1007\/978-3-540-45070-2_16"},{"key":"1670_CR9","doi-asserted-by":"crossref","unstructured":"Maxwell E K, Back G, Ramakrishnan N. Diagnosing memory leaks using graph mining on heap dumps. In Proc. the 16th International Conference on Knowledge Discovery and Data Mining (KDD), July 2010, pp.115-124.","DOI":"10.1145\/1835804.1835822"},{"key":"1670_CR10","doi-asserted-by":"crossref","unstructured":"Bond M D, McKinley K S. Bell: Bit-encoding online memory leak detection. In Proc. the 12th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), October 2006, pp.61-72.","DOI":"10.1145\/1168857.1168866"},{"key":"1670_CR11","doi-asserted-by":"crossref","unstructured":"Xu G, Rountev A. Precise memory leak detection for Java software using container profiling. ACM Transactions on Software Engineering and Methodology (TOSEM), 2013, 22(3): Article No. 17.","DOI":"10.1145\/2491509.2491511"},{"key":"1670_CR12","doi-asserted-by":"crossref","unstructured":"Guo C, Zhang J, Yan J, Zhang Z, Zhang Y. Characterizing and detecting resource leaks in Android applications. In Proc. the 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE), November 2013, pp.389-398.","DOI":"10.1109\/ASE.2013.6693097"},{"key":"1670_CR13","doi-asserted-by":"crossref","unstructured":"Yan D, Yang S, Rountev A. Systematic testing for resource leaks in Android applications. In Proc. the 24th IEEE International Symposium on Software Reliability Engineering (ISSRE), November 2013, pp.411-420.","DOI":"10.1109\/ISSRE.2013.6698894"},{"key":"1670_CR14","doi-asserted-by":"crossref","unstructured":"Zhang H, Wu H, Rountev A. Automated test generation for detection of leaks in Android applications. In Proc. the 11th IEEE\/ACM International Workshop on Automation of Software Test (AST), May 2016, pp.64-70.","DOI":"10.1145\/2896921.2896932"},{"key":"1670_CR15","doi-asserted-by":"crossref","unstructured":"Shahriar H, North S, Mawangi E. Testing of memory leak in Android applications. In Proc. the 15th IEEE International Symposium on High-Assurance Systems Engineering (HASE), January 2014, pp.176-183.","DOI":"10.1109\/HASE.2014.32"},{"issue":"2","key":"1670_CR16","first-page":"35","volume":"5","author":"J Park","year":"2012","unstructured":"Park J, Choi B. Automated memory leakage detection in Android based systems. International Journal of Control and Automation, 2012, 5(2): 35-42","journal-title":"International Journal of Control and Automation"},{"key":"1670_CR17","unstructured":"Vall\u00e9e-Rai R, Co P, Gaghon E et al. Soot \u2013 A Java optimization framework. In Proc. the IBM Centre for Advanced Studies Conference (CASCON), November 1999, Article No. 13."},{"key":"1670_CR18","doi-asserted-by":"crossref","unstructured":"Joachims T. Optimizing search engines using ClickThrough data. In Proc. the ACM Conference on Knowledge Discovery and Data Mining (KDD), July 2002, pp.133-142.","DOI":"10.1145\/775047.775067"},{"key":"1670_CR19","doi-asserted-by":"crossref","unstructured":"Yang W, Prasad M, Xie T. A grey-box approach for automated GUI-model generation of mobile applications. In Proc. the International Conference on Fundamental Approaches to Software Engineering (FASE), March 2013, pp.250-265.","DOI":"10.1007\/978-3-642-37057-1_19"},{"key":"1670_CR20","doi-asserted-by":"crossref","unstructured":"Zhang P, Elbaum S. Amplifying tests to validate exception handling code. In Proc. the 34th International Conference on Software Engineering (ICSE), June 2012, pp.595-605.","DOI":"10.1109\/ICSE.2012.6227157"},{"key":"1670_CR21","doi-asserted-by":"crossref","unstructured":"Xie Y, Aiken A. Context- and path-sensitive memory leak detection. In Proc. the 10th European Software Engineering Conference Held Jointly with the 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, September 2005, pp.115-125.","DOI":"10.1145\/1095430.1081728"},{"key":"1670_CR22","doi-asserted-by":"crossref","unstructured":"Dor N, Rodeh M, Sagiv S. Checking cleanness in linked lists. In Proc. the International Static Analysis Symposium (SAS), June 29-July 1, 2000, pp.115-134","DOI":"10.1007\/978-3-540-45099-3_7"},{"key":"1670_CR23","doi-asserted-by":"crossref","unstructured":"Heine D L, Lam M S. A practical flow-sensitive and contextsensitive C and C++ memory leak detector. In Proc. the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI ), June 2003, pp.168-181.","DOI":"10.1145\/781147.781150"},{"key":"1670_CR24","doi-asserted-by":"crossref","unstructured":"Sui Y, Ye D, Xue J. Static memory leak detection using fullsparse value-flow analysis. In Proc. the International Symposium on Software Testing and Analysis (ISSTA), July 2012, pp.254-264.","DOI":"10.1145\/2338965.2336784"},{"key":"1670_CR25","unstructured":"Hastings R, Joyce B. Purify: Fast detection of memory leaks and access errors. In Proc. the Winter USENIX Conference, January 1992, pp.125-138"},{"key":"1670_CR26","doi-asserted-by":"crossref","unstructured":"Jung C, Lee S, Raman E et al. Automated memory leak detection for production use. In Proc. the 36th International Conference on Software Engineering (ICSE), May 31-June 7, 2014, pp.825-836.","DOI":"10.1145\/2568225.2568311"},{"key":"1670_CR27","doi-asserted-by":"crossref","unstructured":"Lee S, Jung C, Pande S. Detecting memory leaks through introspective dynamic behavior modelling using machine learning. In Proc. the 36th International Conference on Software Engineering, May 31-June 7, 2014, pp.814-824.","DOI":"10.1145\/2568225.2568307"},{"key":"1670_CR28","doi-asserted-by":"crossref","unstructured":"Li M, Chen Y,Wang L, Xu G. Dynamically validating static memory leak warnings. In Proc. the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), July 2013, pp.112-122.","DOI":"10.1145\/2483760.2483778"},{"key":"1670_CR29","doi-asserted-by":"crossref","unstructured":"Gao Q, Xiong Y, Mi Y, Zhang L, Yang W, Zhou Z, Xie B, Mei H. Safe memory-leak fixing for C programs. In Proc. the 37th International Conference on Software Engineering (ICSE), May 2015, pp.459-470.","DOI":"10.1109\/ICSE.2015.64"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-016-1670-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-016-1670-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-016-1670-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T06:03:33Z","timestamp":1568354613000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-016-1670-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["1670"],"URL":"https:\/\/doi.org\/10.1007\/s11390-016-1670-2","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9]]}}}