{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T17:49:01Z","timestamp":1771868941287,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/scam.2015.7335415","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:49:26Z","timestamp":1448318966000},"page":"191-200","source":"Crossref","is-referenced-by-count":12,"title":["Automated memory leak diagnosis by regression testing"],"prefix":"10.1109","author":[{"given":"Mohammadreza","family":"Ghanavati","sequence":"first","affiliation":[]},{"given":"Artur","family":"Andrzejak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"253","article-title":"Yesterday, My Program Worked. Today, It Does Not. Why?","author":"zeller","year":"1999","journal-title":"Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE)"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2544137.2544151","author":"yan","year":"2014","journal-title":"International Symposium on Code Generation and Optimization (CGO)"},{"key":"ref33","article-title":"Statistical approach for memory leak detection in Java applications","author":"\u0161or","year":"2014"},{"key":"ref32","article-title":"Snappy-java","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2211616.2211622"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593885"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2491509.2491511"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882448"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993530"},{"key":"ref34","first-page":"544","article-title":"Improving Statistical Approach for Memory Leak Detection Using Machine Learning","author":"sor","year":"2013","journal-title":"IEEE International Conference on Software Maintenance (ICSM)"},{"key":"ref10","first-page":"1","author":"dillig","year":"2008","journal-title":"International Symposium on Memory Management (ISMM)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568251"},{"key":"ref11","article-title":"The Eclipse Memory Analyzer (MAT). Version 1.2","author":"foundation","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2013.6688895"},{"key":"ref13","first-page":"125","article-title":"Purify: Fast detection of memory leaks and access errors","author":"hastings","year":"1991","journal-title":"USENIX"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1145\/1024393.1024412","author":"hauswirth","year":"2004","journal-title":"Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)"},{"key":"ref15","first-page":"252","author":"heine","year":"2006","journal-title":"International Conference on Software Engineering (ICSE)"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1190216.1190224","author":"jump","year":"2007","journal-title":"Proceedings of the 20th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL)"},{"key":"ref17","first-page":"825","author":"jung","year":"2014","journal-title":"International Conference on Software Engineering (ICSE)"},{"key":"ref18","first-page":"896","article-title":"Detecting software aging in a cloud computing framework by comparing development versions","author":"langner","year":"2013","journal-title":"IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2013.53"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542521"},{"key":"ref4","article-title":"Apache solr","year":"0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694345"},{"key":"ref3","article-title":"Apache nutch","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508277"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/11823230_26","article-title":"Memory Leak Analysis by Contradiction","author":"orlovich","year":"2006","journal-title":"International Static Analysis Symposium (SAS)"},{"key":"ref5","article-title":"Apache thrift","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250789"},{"key":"ref7","first-page":"23","author":"chen","year":"2007","journal-title":"IEEE International Conference on Computers Software & Applications (COMPSAC)"},{"key":"ref2","article-title":"Apache hadoop","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806874"},{"key":"ref1","article-title":"Amazon AWS. Summary of the","year":"2012","journal-title":"AWS Service Event in the US-East Region"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.24"},{"key":"ref22","article-title":"java-allocation-instrumenter: A Java agent that rewrites bytecode to instrument allocation sites","author":"manson","year":"2012"},{"key":"ref21","first-page":"287","author":"machida","year":"2012","journal-title":"IEEE International Workshop on Software Aging and Rejuvenation (WOSAR) at ISSRE"},{"key":"ref24","article-title":"Omega - An Instant Leak Detection Tool for Valgrind","author":"meredith","year":"2008"},{"key":"ref23","article-title":"A systematic approach for low-latency and robust detection of software aging","author":"matias","year":"2014","journal-title":"IEEE Symposium on Reliable Distributed Systems (SRDS)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"ref25","first-page":"351","article-title":"LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications","author":"mitchell","year":"2003","journal-title":"European Conference on Object-Oriented Programming (ECOOP)"}],"event":{"name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","location":"Bremen, Germany","start":{"date-parts":[[2015,9,27]]},"end":{"date-parts":[[2015,9,28]]}},"container-title":["2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321933\/7335391\/07335415.pdf?arnumber=7335415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T22:47:36Z","timestamp":1653605256000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/scam.2015.7335415","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}