{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:59Z","timestamp":1772163959769,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,19]],"date-time":"2008-10-19T00:00:00Z","timestamp":1224374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,19]]},"DOI":"10.1145\/1449764.1449774","type":"proceedings-article","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T08:25:44Z","timestamp":1224663944000},"page":"109-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Tolerating memory leaks"],"prefix":"10.1145","author":[{"given":"Michael D.","family":"Bond","sequence":"first","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kathryn S.","family":"McKinley","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2008,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.391.0211"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353175"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/245882.245905"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604155"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_6_1","first-page":"137","volume-title":"High Performance Garbage Collection in Java with MMTk. In ACM International Conference on Software Engineering","author":"Blackburn S. M.","year":"2004","unstructured":"S. M. Blackburn , P. Cheng , and K. S. McKinley . Oil and Water ? High Performance Garbage Collection in Java with MMTk. In ACM International Conference on Software Engineering , pages 137 -- 146 , 2004 . S. M. Blackburn, P. Cheng, and K. S. McKinley. Oil and Water? High Performance Garbage Collection in Java with MMTk. In ACM International Conference on Software Engineering, pages 137--146, 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029873.1029891"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168866"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374781"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949330"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134021"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250789"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024412"},{"key":"e_1_3_2_1_16_1","unstructured":"DaCapo Benchmark Regression Tests. http:\/\/jikesrvm.anu.-edu.au\/?dacapo\/.  DaCapo Benchmark Regression Tests. http:\/\/jikesrvm.anu.-edu.au\/?dacapo\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/359642.359655"},{"key":"e_1_3_2_1_18_1","unstructured":"Eclipse.org Home. http:\/\/www.eclipse.org\/.  Eclipse.org Home. http:\/\/www.eclipse.org\/."},{"key":"e_1_3_2_1_19_1","unstructured":"B. Goetz. Plugging memory leaks with weak references 2005. http:\/\/www-128.ibm.com\/developerworks\/java\/-library\/j-jtp11225\/.  B. Goetz. Plugging memory leaks with weak references 2005. http:\/\/www-128.ibm.com\/developerworks\/java\/-library\/j-jtp11225\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Plugging memory leaks with soft references","author":"Goetz B.","year":"2006","unstructured":"B. Goetz . Plugging memory leaks with soft references , 2006 . http:\/\/www-128.ibm.com\/developerworks\/java\/-library\/j-jtp01246.html. B. Goetz. Plugging memory leaks with soft references, 2006. http:\/\/www-128.ibm.com\/developerworks\/java\/-library\/j-jtp01246.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1295074.1295076"},{"key":"e_1_3_2_1_22_1","first-page":"414","volume-title":"Languages and Programming","author":"Guibas L. J.","year":"1990","unstructured":"L. J. Guibas , D. E. Knuth , and M. Sharir . Randomized Incremental Construction of Delaunay and Voronoi Diagrams. In Colloquium on Automata , Languages and Programming , pages 414 -- 431 , 1990 . L. J. Guibas, D. E. Knuth, and M. Sharir. Randomized Incremental Construction of Delaunay and Voronoi Diagrams. In Colloquium on Automata, Languages and Programming, pages 414--431, 1990."},{"key":"e_1_3_2_1_23_1","volume-title":"Java memory leaks -- Catch me if you can","author":"Gupta S. C.","year":"2005","unstructured":"S. C. Gupta and R. Palanki . Java memory leaks -- Catch me if you can , 2005 . http:\/\/www.ibm.com\/developerworks\/-rational\/library\/05\/0816 GuptaPalanki\/ index.html. S. C. Gupta and R. Palanki. Java memory leaks -- Catch me if you can, 2005. http:\/\/www.ibm.com\/developerworks\/-rational\/library\/05\/0816 GuptaPalanki\/index.html."},{"key":"e_1_3_2_1_24_1","first-page":"125","volume-title":"Purify: Fast Detection of Memory Leaks and Access Errors. In Winter USENIX Conference","author":"Hastings R.","year":"1992","unstructured":"R. Hastings and B. Joyce . Purify: Fast Detection of Memory Leaks and Access Errors. In Winter USENIX Conference , pages 125 -- 136 , 1992 . R. Hastings and B. Joyce. Purify: Fast Detection of Memory Leaks and Access Errors. In Winter USENIX Conference, pages 125--136, 1992."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781150"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065028"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/586088.586089"},{"key":"e_1_3_2_1_28_1","first-page":"587","volume-title":"Performance. In International Conference on Very Large Data Bases","author":"Hosking A. L.","year":"1999","unstructured":"A. L. Hosking and J. Chen . PM3: An Orthogonal Persistent Systems Programming Language -- Design, Implementation , Performance. In International Conference on Very Large Data Bases , pages 587 -- 598 , 1999 . A. L. Hosking and J. Chen. PM3: An Orthogonal Persistent Systems Programming Language -- Design, Implementation, Performance. In International Conference on Very Large Data Bases, pages 587--598, 1999."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/165854.165907"},{"key":"e_1_3_2_1_30_1","first-page":"149","volume-title":"Optimizing the Read and Write Barriers for Orthogonal Persistence. In International Workshop on Persistent Object Systems","author":"Hosking A. L.","year":"1999","unstructured":"A. L. Hosking , N. Nystrom , Q. I. Cutts , and K. Brahnmath . Optimizing the Read and Write Barriers for Orthogonal Persistence. In International Workshop on Persistent Object Systems , pages 149 -- 159 , 1999 . A. L. Hosking, N. Nystrom, Q. I. Cutts, and K. Brahnmath. Optimizing the Read and Write Barriers for Orthogonal Persistence. In International Workshop on Persistent Object Systems, pages 149--159, 1999."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1028983"},{"key":"e_1_3_2_1_32_1","unstructured":"Jikes RVM. http:\/\/www.jikesrvm.org.  Jikes RVM. http:\/\/www.jikesrvm.org."},{"key":"e_1_3_2_1_33_1","unstructured":"Jikes RVM Research Archive. http:\/\/www.jikesrvm.org\/-Research+Archive.  Jikes RVM Research Archive. http:\/\/www.jikesrvm.org\/-Research+Archive."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190224"},{"key":"e_1_3_2_1_35_1","first-page":"25","volume-title":"Precise Detection of Memory Leaks. In International Workshop on Dynamic Analysis","author":"Maebe J.","year":"2004","unstructured":"J. Maebe , M. Ronsse , and K. D. Bosschere . Precise Detection of Memory Leaks. In International Workshop on Dynamic Analysis , pages 25 -- 31 , 2004 . J.Maebe, M. Ronsse, and K. D. Bosschere. Precise Detection of Memory Leaks. In International Workshop on Dynamic Analysis, pages 25--31, 2004."},{"key":"e_1_3_2_1_36_1","first-page":"247","volume-title":"Implementing Orthogonally Persistent Java. In International Workshop on Persistent Object Systems","author":"Marquez A.","year":"2000","unstructured":"A. Marquez , S. M. Blackburn , G. Mercer , and J. Zigman . Implementing Orthogonally Persistent Java. In International Workshop on Persistent Object Systems , pages 247 -- 261 , 2000 . A. Marquez, S. M. Blackburn, G. Mercer, and J. Zigman. Implementing Orthogonally Persistent Java. In International Workshop on Persistent Object Systems, pages 247--261, 2000."},{"key":"e_1_3_2_1_37_1","volume-title":"memory\/thread leak with Mckoi 0.93 in embedded mode","author":"Mckoi SQL","year":"2002","unstructured":"Mckoi SQL Database message board : memory\/thread leak with Mckoi 0.93 in embedded mode , 2002 . http:\/\/www.-mckoi.com\/database\/mail\/subject.jsp?id=2172. Mckoi SQL Database message board: memory\/thread leak with Mckoi 0.93 in embedded mode, 2002. http:\/\/www.-mckoi.com\/database\/mail\/subject.jsp?id=2172."},{"key":"e_1_3_2_1_38_1","first-page":"351","volume-title":"LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications. In European Conference on Object-Oriented Programming","author":"Mitchell N.","year":"2003","unstructured":"N. Mitchell and G. Sevitsky . LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications. In European Conference on Object-Oriented Programming , pages 351 -- 377 , 2003 . N. Mitchell and G. Sevitsky. LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications. In European Conference on Object-Oriented Programming, pages 351--377, 2003."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.153378"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296907.1296912"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167493"},{"key":"e_1_3_2_1_44_1","unstructured":"Oracle. JRockit Mission Control. http:\/\/www.oracle.com\/-technology\/products\/jrockit\/missioncontrol\/.  Oracle. JRockit Mission Control. http:\/\/www.oracle.com\/-technology\/products\/jrockit\/missioncontrol\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296907.1296927"},{"key":"e_1_3_2_1_46_1","volume-title":"Pierre-et-Marie-Curie","author":"Plainfoss\u00e9 D.","year":"1994","unstructured":"D. Plainfoss\u00e9 . Distributed Garbage Collection and Reference Management in the Soul Object Support System. PhD thesis, Universit\u00e9 Paris-6 , Pierre-et-Marie-Curie , 1994 . D. Plainfoss\u00e9. Distributed Garbage Collection and Reference Management in the Soul Object Support System. PhD thesis, Universit\u00e9 Paris-6, Pierre-et-Marie-Curie, 1994."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_49_1","unstructured":"Quest. JProbe Memory Debugger. http:\/\/www.quest.com\/-jprobe\/debugger.asp.  Quest. JProbe Memory Debugger. http:\/\/www.quest.com\/-jprobe\/debugger.asp."},{"key":"e_1_3_2_1_50_1","first-page":"303","volume-title":"USENIX Symposium on Operating Systems Design and Implementation","author":"Rinard M.","year":"2004","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. Roy , T. Leu , and W. Beebee . Enhancing Server Availability and Security through Failure-Oblivious Computing . In USENIX Symposium on Operating Systems Design and Implementation , pages 303 -- 316 , 2004 . M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. Beebee. Enhancing Server Availability and Security through Failure-Oblivious Computing. In USENIX Symposium on Operating Systems Design and Implementation, pages 303--316, 2004."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1028984"},{"key":"e_1_3_2_1_52_1","unstructured":"SciTech Software. .NET Memory Profiler. http:\/\/www.-scitech.se\/memprofiler\/.  SciTech Software. .NET Memory Profiler. http:\/\/www.-scitech.se\/memprofiler\/."},{"key":"e_1_3_2_1_53_1","volume-title":"release 1.03 edition","author":"Standard Performance Evaluation Corporation","year":"1999","unstructured":"Standard Performance Evaluation Corporation . SPECjvm98 Documentation , release 1.03 edition , 1999 . Standard Performance Evaluation Corporation. SPECjvm98 Documentation, release 1.03 edition, 1999."},{"key":"e_1_3_2_1_54_1","volume-title":"release 1.01 edition","author":"Standard Performance Evaluation Corporation","year":"2001","unstructured":"Standard Performance Evaluation Corporation . SPECjbb2000 Documentation , release 1.01 edition , 2001 . Standard Performance Evaluation Corporation. SPECjbb2000 Documentation, release 1.01 edition, 2001."},{"key":"e_1_3_2_1_55_1","volume-title":"Java Programming {Archive} - garbage collection dilema (sic)","author":"Network Forum Sun Developer","year":"2003","unstructured":"Sun Developer Network Forum . Java Programming {Archive} - garbage collection dilema (sic) , 2003 . http:\/\/forum.java.-sun.com\/thread.jspa?threadID=446934. Sun Developer Network Forum. Java Programming {Archive} - garbage collection dilema (sic), 2003. http:\/\/forum.java.-sun.com\/thread.jspa?threadID=446934."},{"key":"e_1_3_2_1_56_1","unstructured":"Sun Developer Network Forum. Reflections &amp; Reference Objects - Java memory leak example 2003. http:\/\/forum.-java.sun.com\/thread.jspa?threadID=456545.  Sun Developer Network Forum. Reflections &amp; Reference Objects - Java memory leak example 2003. http:\/\/forum.-java.sun.com\/thread.jspa?threadID=456545."},{"key":"e_1_3_2_1_57_1","first-page":"307","volume-title":"LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages. In USENIX Annual Technical Conference","author":"Tang Y.","year":"2008","unstructured":"Y. Tang , Q. Gao , and F. Qin . LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages. In USENIX Annual Technical Conference , pages 307 -- 320 , 2008 . Y. Tang, Q. Gao, and F. Qin. LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages. In USENIX Annual Technical Conference, pages 307--320, 2008."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/122576.122577"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297034"},{"key":"e_1_3_2_1_60_1","first-page":"103","volume-title":"Moss. CRAMM: Virtual Memory Support for Garbage-Collected Applications. In USENIX Symposium on Operating Systems Design and Implementation","author":"Yang T.","year":"2006","unstructured":"T. Yang , E. D. Berger , S. F. Kaplan , and J. E. B. Moss. CRAMM: Virtual Memory Support for Garbage-Collected Applications. In USENIX Symposium on Operating Systems Design and Implementation , pages 103 -- 116 , 2006 . T. Yang, E. D. Berger, S. F. Kaplan, and J. E. B. Moss. CRAMM: Virtual Memory Support for Garbage-Collected Applications. In USENIX Symposium on Operating Systems Design and Implementation, pages 103--116, 2006."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029873.1029881"},{"key":"e_1_3_2_1_62_1","first-page":"138","volume-title":"Moss. TMOS: A Transactional Garbage Collector. In International Workshop on Persistent Object Systems","author":"Zigman J. N.","year":"2001","unstructured":"J. N. Zigman , S. Blackburn , and J. E. B. Moss. TMOS: A Transactional Garbage Collector. In International Workshop on Persistent Object Systems , pages 138 -- 156 , 2001 . J. N. Zigman, S. Blackburn, and J. E. B. Moss. TMOS: A Transactional Garbage Collector. In International Workshop on Persistent Object Systems, pages 138--156, 2001."}],"event":{"name":"OOPSLA08: ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications","location":"Nashville TN USA","acronym":"OOPSLA08","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1449764.1449774","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1449764.1449774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:22:40Z","timestamp":1750263760000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1449764.1449774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,19]]},"references-count":60,"alternative-id":["10.1145\/1449764.1449774","10.1145\/1449764"],"URL":"https:\/\/doi.org\/10.1145\/1449764.1449774","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1449955.1449774","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,10,19]]},"assertion":[{"value":"2008-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}