{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:59:30Z","timestamp":1729637970197,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/ipdps.2008.4536433","type":"proceedings-article","created":{"date-parts":[[2008,6,6]],"date-time":"2008-06-06T12:44:52Z","timestamp":1212756292000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Software monitoring with bounded overhead"],"prefix":"10.1109","author":[{"given":"Sean","family":"Callanan","sequence":"first","affiliation":[]},{"given":"Daniel J.","family":"Dean","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Gorbovitski","sequence":"additional","affiliation":[]},{"given":"Radu","family":"Grosu","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Seyster","sequence":"additional","affiliation":[]},{"given":"Scott A.","family":"Smolka","sequence":"additional","affiliation":[]},{"given":"Scott D.","family":"Stoller","sequence":"additional","affiliation":[]},{"given":"Erez","family":"Zadok","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1991.261658"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1137\/0325013"},{"key":"18","first-page":"329","article-title":"supervisory control of timed discrete-event systems","volume":"38","author":"ramadge","year":"1994","journal-title":"IEEE Transactions on Automatic Control"},{"journal-title":"efence(3)","year":"1993","author":"perens","key":"15"},{"key":"16","article-title":"safemem: exploiting eccmemory for detecting memory leaks and memory corruption during production runs","author":"qin","year":"2005","journal-title":"11th International Symposium on High-Performance Computer Architecture (HPCA)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781150"},{"journal-title":"Lighttpd","year":"2003","author":"kneschke","key":"14"},{"key":"11","first-page":"125","article-title":"purify: fast detection of memory leaks and access errors","author":"hastings","year":"1992","journal-title":"Proceedings of the Winter 1992 USENIX Conference"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1037947.1024412"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)90010-8"},{"key":"1","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/3-540-60045-0_57","article-title":"supervisory control of finite state machines","volume":"939","author":"aziz","year":"1995","journal-title":"7th International Conference On Computer Aided Verification"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"key":"7","first-page":"57","article-title":"mudflap: pointer use checking for c\/c++","author":"eigler","year":"2003","journal-title":"Proceedings of the First Annual GCC Developers' Summit"},{"key":"6","first-page":"63","article-title":"stackguard: automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"Proceedings of the Seventh USENIX Security Symposium"},{"key":"5","article-title":"extending gcc with modular gimple optimizations","author":"callanan","year":"2007","journal-title":"Proceedings of the 2007 GCC Developers' Summit"},{"year":"0","key":"4"},{"journal-title":"Digital Control of Dynamic Systems","year":"1998","author":"franklin","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1133992"}],"event":{"name":"Distributed Processing Symposium (IPDPS)","start":{"date-parts":[[2008,4,14]]},"location":"Miami, FL, USA","end":{"date-parts":[[2008,4,18]]}},"container-title":["2008 IEEE International Symposium on Parallel and Distributed Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4519061\/4536075\/04536433.pdf?arnumber=4536433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T20:42:31Z","timestamp":1557607351000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4536433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2008.4536433","relation":{},"ISSN":["1530-2075"],"issn-type":[{"type":"print","value":"1530-2075"}],"subject":[],"published":{"date-parts":[[2008,4]]}}}