{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:12Z","timestamp":1772164032326,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,17]],"date-time":"2010-03-17T00:00:00Z","timestamp":1268784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,17]]},"DOI":"10.1145\/1735997.1736014","type":"proceedings-article","created":{"date-parts":[[2010,3,19]],"date-time":"2010-03-19T15:22:47Z","timestamp":1269012167000},"page":"109-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Efficient runtime tracking of allocation sites in Java"],"prefix":"10.1145","author":[{"given":"Rei","family":"Odaira","sequence":"first","affiliation":[{"name":"IBM Research - Tokyo, Yamato-shi, Japan"}]},{"given":"Kazunori","family":"Ogata","sequence":"additional","affiliation":[{"name":"IBM Research - Tokyo, Yamato-shi, Japan"}]},{"given":"Kiyokuni","family":"Kawachiya","sequence":"additional","affiliation":[{"name":"IBM Research - Tokyo, Yamato-shi, Japan"}]},{"given":"Tamiya","family":"Onodera","sequence":"additional","affiliation":[{"name":"IBM Research - Tokyo, Yamato-shi, Japan"}]},{"given":"Toshio","family":"Nakatani","sequence":"additional","affiliation":[{"name":"IBM Research - Tokyo, Yamato-shi, Japan"}]}],"member":"320","published-online":{"date-parts":[[2010,3,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/362422.362473"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646159.680023"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/277650.277734"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/155090.155108"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180475.1180477"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504307"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168866"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029873.1029889"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/277650.277718"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134011"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378840"},{"key":"e_1_3_2_1_12_1","unstructured":"DaCapo Benchmarks. http:\/\/dacapobench.org\/  DaCapo Benchmarks. http:\/\/dacapobench.org\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Eclipse.org. http:\/\/www.eclipse.org\/ .  Eclipse.org. http:\/\/www.eclipse.org\/ ."},{"key":"e_1_3_2_1_14_1","first-page":"151","volume-title":"Proceedings of the 3rd Virtual Machine Research and Technology Symposium","author":"Grcevski N.","year":"2004","unstructured":"Grcevski , N. , Kilstra , A. , Stoodley , K. , Stoodley , M. , and Sundaresan , V . Java just-in-time compiler and virtual machine improvements for server and middleware applications . In Proceedings of the 3rd Virtual Machine Research and Technology Symposium , pp. 151 -- 162 , 2004 . Grcevski, N., Kilstra, A., Stoodley, K., Stoodley, M., and Sundaresan, V. Java just-in-time compiler and virtual machine improvements for server and middleware applications. In Proceedings of the 3rd Virtual Machine Research and Technology Symposium, pp. 151--162, 2004."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/362422.362476"},{"key":"e_1_3_2_1_16_1","first-page":"125","volume-title":"Proceedings of the Winter USENIX Conference","author":"Hastings R.","year":"1992","unstructured":"Hastings , R. and Joyce , B . Purify: Fast detection of memory leaks and access errors . In Proceedings of the Winter USENIX Conference , pp. 125 -- 136 , 1992 . Hastings, R. and Joyce, B. Purify: Fast detection of memory leaks and access errors. In Proceedings of the Winter USENIX Conference, pp. 125--136, 1992."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024412"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1153925.1154597"},{"key":"e_1_3_2_1_19_1","unstructured":"IBM Java Diagnosis Guide 6. http:\/\/www.ibm.com\/developerworks\/java\/jdk\/diagnosis\/ .  IBM Java Diagnosis Guide 6. http:\/\/www.ibm.com\/developerworks\/java\/jdk\/diagnosis\/ ."},{"key":"e_1_3_2_1_20_1","unstructured":"Intel IA-32 Architecture Software Developer's Manual.  Intel IA-32 Architecture Software Developer's Manual."},{"key":"e_1_3_2_1_21_1","unstructured":"Java SE 6 API Specification. http:\/\/java.sun.com\/javase\/6\/docs\/api\/ .  Java SE 6 API Specification. http:\/\/java.sun.com\/javase\/6\/docs\/api\/ ."},{"key":"e_1_3_2_1_22_1","unstructured":"Java VM Specification. http:\/\/java.sun.com\/docs\/books\/jvms\/  Java VM Specification. http:\/\/java.sun.com\/docs\/books\/jvms\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029873.1029892"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542521"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250736"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291012"},{"key":"e_1_3_2_1_29_1","first-page":"17","volume-title":"Proceedings of the 2005 Annual Conference on USENIX Annual Technical Conference","author":"Seward J.","year":"2005","unstructured":"Seward , J. and Nethercote , N . Using valgrind to detect undefined value errors with bit-precision . In Proceedings of the 2005 Annual Conference on USENIX Annual Technical Conference , pp. 17 -- 30 , 2005 . Seward, J. and Nethercote, N. Using valgrind to detect undefined value errors with bit-precision. In Proceedings of the 2005 Annual Conference on USENIX Annual Technical Conference, pp. 17--30, 2005."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378820"},{"key":"e_1_3_2_1_31_1","unstructured":"Standard Performance Evaluation Corporation. SPECjbb2005. http:\/\/www.spec.org\/jbb2005\/ .  Standard Performance Evaluation Corporation. SPECjbb2005. http:\/\/www.spec.org\/jbb2005\/ ."},{"key":"e_1_3_2_1_32_1","unstructured":"Standard Performance Evaluation Corporation. SPECjvm2008. http:\/\/www.spec.org\/jvm2008\/ .  Standard Performance Evaluation Corporation. SPECjvm2008. http:\/\/www.spec.org\/jvm2008\/ ."},{"key":"e_1_3_2_1_33_1","unstructured":"Sun Microsystems. HotSpot VM. http:\/\/java.sun.com\/javase\/tech-nologies\/hotspot\/index.jsp  Sun Microsystems. HotSpot VM. http:\/\/java.sun.com\/javase\/tech-nologies\/hotspot\/index.jsp"}],"event":{"name":"VEE '10: ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments","location":"Pittsburgh Pennsylvania USA","acronym":"VEE '10","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 6th ACM SIGPLAN\/SIGOPS international conference on Virtual execution environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1735997.1736014","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1735997.1736014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:41:21Z","timestamp":1750236081000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1735997.1736014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,17]]},"references-count":32,"alternative-id":["10.1145\/1735997.1736014","10.1145\/1735997"],"URL":"https:\/\/doi.org\/10.1145\/1735997.1736014","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1837854.1736014","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2010,3,17]]},"assertion":[{"value":"2010-03-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}