{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:49Z","timestamp":1772164009241,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,19]],"date-time":"2008-10-19T00:00:00Z","timestamp":1224374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,19]]},"DOI":"10.1145\/1449764.1449776","type":"proceedings-article","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T08:25:44Z","timestamp":1224663944000},"page":"143-162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["QVM"],"prefix":"10.1145","author":[{"given":"Matthew","family":"Arnold","sequence":"first","affiliation":[{"name":"IBM TJ Watson Research Center, Hawthorne, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"Vechev","sequence":"additional","affiliation":[{"name":"IBM TJ Watson Research Center, Hawthorne, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eran","family":"Yahav","sequence":"additional","affiliation":[{"name":"IBM TJ Watson Research Center, Hawthorne, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2008,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"GOIM\n  : Gamers own instant messenger. available at http:\/\/goim.us\/wiki\/show\/GOIM.  GOIM: Gamers own instant messenger. available at http:\/\/goim.us\/wiki\/show\/GOIM."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353522.1353533"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094839"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378832"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646159.680033"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the International Conference on Embedded Software","author":"Auerbach J.","year":"2008","unstructured":"Auerbach , J. , Bacon , D. , Cheng , P. , Grove , D. , Biron , B. , Gracie , C. , McCloskey , B. , Micic , A. , and Sciampacone , R . Toshio suganuma and toshiaki yasue and motohiro kawahito and hideaki komatsu and toshio nakatani . In Proceedings of the International Conference on Embedded Software ( New York, NY, USA , 2008 ), ACM. Auerbach, J., Bacon, D., Cheng, P., Grove, D., Biron, B., Gracie, C., McCloskey, B., Micic, A., and Sciampacone, R. Toshio suganuma and toshiaki yasue and motohiro kawahito and hideaki komatsu and toshio nakatani. In Proceedings of the International Conference on Embedded Software (New York, NY, USA, 2008), ACM."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297070"},{"key":"e_1_3_2_1_8_1","unstructured":"Azureus - Java BitTorrent client. http:\/\/azureus.sourceforge.net\/.  Azureus - Java BitTorrent client. http:\/\/azureus.sourceforge.net\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785141.1785146"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2394758.2394793"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168918.1168866"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297069"},{"key":"e_1_3_2_1_13_1","first-page":"219","volume-title":"ACM","author":"Chilimbi T. M.","unstructured":"Chilimbi , T. M. , and Ganapathy , V . Heapmd: identifying heap-based bugs using anomaly detection. vol. 34 , ACM , pp. 219 -- 228 . Chilimbi, T. M., and Ganapathy, V. Heapmd: identifying heap-based bugs using anomaly detection. vol. 34, ACM, pp. 219--228."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512554"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378811"},{"key":"e_1_3_2_1_16_1","first-page":"13","volume-title":"Adoption and focus: Practical linear types for imperative programming","author":"DeLine R.","unstructured":"DeLine , R. , and F\u00e4hndrich , M . Adoption and focus: Practical linear types for imperative programming . pp. 13 -- 24 . DeLine, R., and F\u00e4hndrich, M. Adoption and focus: Practical linear types for imperative programming. pp. 13--24."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375634.1375636"},{"key":"e_1_3_2_1_18_1","unstructured":"Eclipse. Standard widget toolkit (swt). http:\/\/www.eclipse.org\/swt\/.  Eclipse. Standard widget toolkit (swt). http:\/\/www.eclipse.org\/swt\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146254"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/776261.776288"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"Flow-sensitive type qualifiers","author":"Foster J. S.","unstructured":"Foster , J. S. , Terauchi , T. , and Aiken , A . Flow-sensitive type qualifiers . pp. 1 -- 12 . Foster, J. S., Terauchi, T., and Aiken, A. Flow-sensitive type qualifiers. pp. 1--12."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1037187.1024412"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781150"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190215.1190224"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133255.1134010"},{"key":"e_1_3_2_1_26_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/978-3-540-45099-3_15","volume-title":"Saskatchewan","author":"Lev-Ami T.","year":"2000","unstructured":"Lev-Ami , T. , and Sagiv , M . TVLA: A framework for Kleene based static analysis . In Saskatchewan ( 2000 ), vol. 1824 of Lecture Notes in Computer Science , Springer-Verlag , pp. 280 -- 301 . Lev-Ami, T., and Sagiv, M. TVLA: A framework for Kleene based static analysis. In Saskatchewan (2000), vol. 1824 of Lecture Notes in Computer Science, Springer-Verlag, pp. 280--301."},{"key":"e_1_3_2_1_28_1","volume-title":"Eclipsecon '05 Research Exchange","author":"Livshits V. B.","year":"2005","unstructured":"Livshits , V. B. Turning Eclipse against itself: Finding bugs in Eclipse code using lightweight static analysis . Eclipsecon '05 Research Exchange , Mar. 2005 . Livshits, V. B. Turning Eclipse against itself: Finding bugs in Eclipse code using lightweight static analysis. Eclipsecon '05 Research Exchange, Mar. 2005."},{"key":"e_1_3_2_1_29_1","unstructured":"Microsystems S. Jvmtm tool interface version 1.0. In http:\/\/java.sun.com\/j2se\/1.5.0\/docs\/guide\/jvmti\/jvmti.html.  Microsystems S. Jvmtm tool interface version 1.0. In http:\/\/java.sun.com\/j2se\/1.5.0\/docs\/guide\/jvmti\/jvmti.html."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297046"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297061"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/512429.512446"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512540"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760267.1760304"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504296"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996846"}],"event":{"name":"OOPSLA08: ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications","location":"Nashville TN USA","acronym":"OOPSLA08","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1449764.1449776","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1449764.1449776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:22:40Z","timestamp":1750263760000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1449764.1449776"}},"subtitle":["an efficient runtime for detecting defects in deployed systems"],"short-title":[],"issued":{"date-parts":[[2008,10,19]]},"references-count":37,"alternative-id":["10.1145\/1449764.1449776","10.1145\/1449764"],"URL":"https:\/\/doi.org\/10.1145\/1449764.1449776","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1449955.1449776","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,10,19]]},"assertion":[{"value":"2008-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}