{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:44Z","timestamp":1772163944467,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,21]],"date-time":"2007-10-21T00:00:00Z","timestamp":1192924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,21]]},"DOI":"10.1145\/1297027.1297057","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T09:30:20Z","timestamp":1195119020000},"page":"405-422","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Tracking bad apples"],"prefix":"10.1145","author":[{"given":"Michael D.","family":"Bond","sequence":"first","affiliation":[{"name":"University of Texas at Austin, Austin, TX"}]},{"given":"Nicholas","family":"Nethercote","sequence":"additional","affiliation":[{"name":"National ICT Australia, Melbourne, Australia"}]},{"given":"Stephen W.","family":"Kent","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX"}]},{"given":"Samuel Z.","family":"Guyer","sequence":"additional","affiliation":[{"name":"Tufts University, Boston, MA"}]},{"given":"Kathryn S.","family":"McKinley","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX"}]}],"member":"320","published-online":{"date-parts":[[2007,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"e_1_3_2_1_2_1","unstructured":"E. Allen. Diagnosing Java Code: The Dangling Composite bug pattern. http:\/\/www--128.ibm.com\/developerworks\/-java\/library\/j-diag2\/ 2001.  E. Allen. Diagnosing Java Code: The Dangling Composite bug pattern. http:\/\/www--128.ibm.com\/developerworks\/-java\/library\/j-diag2\/ 2001."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.391.0211"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/258915.258924"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353175"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065035"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_10_1","unstructured":"Eclipse.org Home. http:\/\/www.eclipse.org\/.  Eclipse.org Home. http:\/\/www.eclipse.org\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512558"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581377"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028664.1028717"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108798"},{"key":"e_1_3_2_1_16_1","unstructured":"Jikes RVM. http:\/\/www.jikesrvm.org.  Jikes RVM. http:\/\/www.jikesrvm.org."},{"key":"e_1_3_2_1_17_1","unstructured":"Jikes RVM Research Archive. http:\/\/www.jikesrvm.org\/-Research+Archive.  Jikes RVM Research Archive. http:\/\/www.jikesrvm.org\/-Research+Archive."},{"key":"e_1_3_2_1_18_1","unstructured":"Jikes RVM Research Archive. http:\/\/www.jikesrvm.org\/-Research+Archive.  Jikes RVM Research Archive. http:\/\/www.jikesrvm.org\/-Research+Archive."},{"key":"e_1_3_2_1_19_1","unstructured":"Jython-dev Mailing List. http:\/\/sourceforge.net\/mailarchive\/-forum.php?forum id=5587.  Jython-dev Mailing List. http:\/\/sourceforge.net\/mailarchive\/-forum.php?forum id=5587."},{"key":"e_1_3_2_1_20_1","first-page":"161","volume-title":"Saber-C: An Interpreter-Based Programming Environment for the C Language. In Summer USENIX Conference","author":"Kaufer S.","year":"1988","unstructured":"S. Kaufer , R. Lopez , and S. Pratap . Saber-C: An Interpreter-Based Programming Environment for the C Language. In Summer USENIX Conference , pages 161 -- 171 , 1988 . S. Kaufer, R. Lopez, and S. Pratap. Saber-C: An Interpreter-Based Programming Environment for the C Language. In Summer USENIX Conference, pages 161--71, 1988."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"e_1_3_2_1_22_1","volume-title":"The Java Virtual Machine Specification","author":"Lindholm T.","year":"1999","unstructured":"T. Lindholm and F. Yellin . The Java Virtual Machine Specification ( 2 nd Edition). Prentice Hall PTR , 1999 . T. Lindholm and F. Yellin. The Java Virtual Machine Specification (2nd Edition). Prentice Hall PTR, 1999.","edition":"2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168864"},{"key":"e_1_3_2_1_24_1","unstructured":"Mckoi SQL Database. http:\/\/www.mckoi.com\/database\/.  Mckoi SQL Database. http:\/\/www.mckoi.com\/database\/."},{"key":"e_1_3_2_1_25_1","volume-title":"Redux: A Dynamic Dataflow Tracer. Electronic Notes in Theoretical Computer Science, 89(2)","author":"Nethercote N.","year":"2003","unstructured":"N. Nethercote and A. Mycroft . Redux: A Dynamic Dataflow Tracer. Electronic Notes in Theoretical Computer Science, 89(2) , 2003 . N. Nethercote and A. Mycroft. Redux: A Dynamic Dataflow Tracer. Electronic Notes in Theoretical Computer Science, 89(2), 2003."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_27_1","volume-title":"Network and Distributed System Security Symposium.","author":"Newsome J.","unstructured":"J. Newsome and D. Song . Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Network and Distributed System Security Symposium. J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_28_1","unstructured":"PMD. http:\/\/pmd.sourceforge.net.  PMD. http:\/\/pmd.sourceforge.net."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_30_1","first-page":"303","volume-title":"USENIX Symposium on Operating Systems Design and Implementation","author":"Rinard M.","year":"2004","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. Roy , T. Leu , and J. Beebee . Enhancing Server Availability and Security through Failure-Oblivious Computing . In USENIX Symposium on Operating Systems Design and Implementation , pages 303 -- 316 , 2004 . M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and J. Beebee. Enhancing Server Availability and Security through Failure-Oblivious Computing. In USENIX Symposium on Operating Systems Design and Implementation, pages 303--316, 2004."},{"key":"e_1_3_2_1_31_1","first-page":"17","volume-title":"USENIX Annual Technical Conference","author":"Seward J.","year":"2005","unstructured":"J. Seward and N. Nethercote . Using Valgrind to Detect Undefined Value Errors with Bit-Precision . In USENIX Annual Technical Conference , pages 17 -- 30 , 2005 . J. Seward and N. Nethercote. Using Valgrind to Detect Undefined Value Errors with Bit-Precision. In USENIX Annual Technical Conference, pages 17--30, 2005."},{"key":"e_1_3_2_1_32_1","unstructured":"SourceForge.net. http:\/\/www.sourceforge.net\/.  SourceForge.net. http:\/\/www.sourceforge.net\/."},{"key":"e_1_3_2_1_33_1","volume-title":"release 1.03 edition","author":"Standard Performance Evaluation Corporation","year":"1999","unstructured":"Standard Performance Evaluation Corporation . SPECjvm98 Documentation , release 1.03 edition , 1999 . Standard Performance Evaluation Corporation. SPECjvm98 Documentation, release 1.03 edition, 1999."},{"key":"e_1_3_2_1_34_1","volume-title":"release 1.01 edition","author":"Standard Performance Evaluation Corporation","year":"2001","unstructured":"Standard Performance Evaluation Corporation . SPECjbb200 0 Documentation , release 1.01 edition , 2001 . Standard Performance Evaluation Corporation. SPECjbb2000 Documentation, release 1.01 edition, 2001."},{"key":"e_1_3_2_1_35_1","unstructured":"B. Wiedermann. Personal communication November 2006.  B. Wiedermann. Personal communication November 2006."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250782"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.3"}],"event":{"name":"OOPSLA07: ACM SIGPLAN Object Oriented Programming Systems and Applications Conference","location":"Montreal Quebec Canada","acronym":"OOPSLA07","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 22nd annual ACM SIGPLAN conference on Object-oriented programming systems, languages and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1297027.1297057","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1297027.1297057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:58:27Z","timestamp":1750244307000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1297027.1297057"}},"subtitle":["reporting the origin of null and undefined value errors"],"short-title":[],"issued":{"date-parts":[[2007,10,21]]},"references-count":36,"alternative-id":["10.1145\/1297027.1297057","10.1145\/1297027"],"URL":"https:\/\/doi.org\/10.1145\/1297027.1297057","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1297105.1297057","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,10,21]]},"assertion":[{"value":"2007-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}