{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T16:10:40Z","timestamp":1744906240726,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/scam.2015.7335414","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:49:26Z","timestamp":1448300966000},"page":"181-190","source":"Crossref","is-referenced-by-count":3,"title":["LeakTracer: Tracing leaks along the way"],"prefix":"10.1109","author":[{"given":"Hengyang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xiaohua","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694345"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2560047"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806618"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542503"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1133651.1133654"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368110"},{"article-title":"Perfblower: Quickly detecting memory-related performance problems via amplification","year":"2015","author":"lu fang","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2491894.2466484"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2093157.2093178"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150993"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321661"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542521"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568307"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993530"},{"article-title":"Tracking down managed memory leaks (how to find a gc leak)","year":"2004","author":"mariani","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949333"},{"year":"2011","key":"ref22","article-title":"Drlvm"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1375634.1375651"},{"year":"2005","key":"ref24","article-title":"SPECjbb2005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568311"},{"year":"2008","key":"ref25","article-title":"SPECjbb2008"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509510"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806874"},{"key":"ref11","first-page":"125","article-title":"Purify: Fast detection of memory leaks and access errors","author":"hastings","year":"1992","journal-title":"Winter 1992 USENIX Conference"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509522"},{"year":"2015","key":"ref12","article-title":"jProfiler"},{"year":"2015","key":"ref13","article-title":"YourKit"},{"year":"2008","key":"ref14","article-title":"jProbe"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54833-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1852761.1852767"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1180475.1180477"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384690"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509512"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168866"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508277"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544151"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190224"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449774"},{"key":"ref7","first-page":"307","article-title":"Leaksurvivor: Towards safely tolerating memory leaks for garbage-collected languages","author":"tang","year":"2008","journal-title":"USENIX 2008 Annual Technical Conference"},{"year":"2006","key":"ref49","article-title":"Memory leak"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/978-3-540-45070-2_16","article-title":"Leakbot: An automated and lightweight tool for diagnosing memory leaks in large java applications","volume":"2743","author":"mitchell","year":"2003","journal-title":"ECOOP 2003 - Object-Oriented Programming"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1029873.1029891"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1993478.1993491"},{"journal-title":"The Java&#x2122; Virtual Machine Specification","year":"2013","author":"tim","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806616"},{"key":"ref42","first-page":"1","article-title":"Coco: Sound and adaptive replacement of java collections","author":"xu","year":"2013","journal-title":"Proceedings of European Conference of Object-Oriented Programming"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2491894.2466485"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2775049.2602991"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297046"}],"event":{"name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2015,9,27]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,9,28]]}},"container-title":["2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321933\/7335391\/07335414.pdf?arnumber=7335414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:14:41Z","timestamp":1498248881000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/scam.2015.7335414","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}