{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:49Z","timestamp":1772164009601,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T00:00:00Z","timestamp":1307145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,4]]},"DOI":"10.1145\/1993498.1993541","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T07:53:52Z","timestamp":1307346832000},"page":"367-377","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Cruiser"],"prefix":"10.1145","author":[{"given":"Qiang","family":"Zeng","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Dinghao","family":"Wu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","first-page":"51","volume-title":"Usenix Security '09","author":"Akritidis P.","unstructured":"P. Akritidis , M. Costa , M. Castro , and S. Hand . Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors . In Usenix Security '09 , pages 51 -- 66 . P. Akritidis, M. Costa, M. Castro, and S. Hand. Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors. In Usenix Security '09, pages 51--66."},{"key":"e_1_3_2_1_3_1","volume-title":"Smashing the stack for fun and profit. Phrack, 7 (49)","year":"1996","unstructured":"AlephOne. Smashing the stack for fun and profit. Phrack, 7 (49) , 1996 . AlephOne. Smashing the stack for fun and profit. Phrack, 7 (49), 1996."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178446"},{"key":"e_1_3_2_1_5_1","first-page":"4","volume-title":"Usenix Security '04","author":"Avijit K.","unstructured":"K. Avijit and P. Gupta . Tied, libsafeplus, tools for runtime buffer overflow protection . In Usenix Security '04 , pages 4 -- 4 . K. Avijit and P. Gupta. Tied, libsafeplus, tools for runtime buffer overflow protection. In Usenix Security '04, pages 4--4."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_7_1","first-page":"105","volume-title":"Usenix Security '03","author":"Bhatkar E.","unstructured":"E. Bhatkar , D. C. Duvarney , and R. Sekar . Address obfuscation: an efficient approach to combat a broad range of memory error exploits . In Usenix Security '03 , pages 105 -- 120 . E. Bhatkar, D. C. Duvarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In Usenix Security '03, pages 105--120."},{"key":"e_1_3_2_1_8_1","volume-title":"May","author":"Bulba","year":"2000","unstructured":"Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack, 10 (56) , May 2000 . Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack, 10 (56), May 2000."},{"key":"e_1_3_2_1_9_1","first-page":"147","volume-title":"OSDI '06","author":"Castro M.","unstructured":"M. Castro , M. Costa , and T. Harris . Securing software by enforcing data-flow integrity . In OSDI '06 , pages 147 -- 160 . M. Castro, M. Costa, and T. Harris. Securing software by enforcing data-flow integrity. In OSDI '06, pages 147--160."},{"key":"e_1_3_2_1_10_1","unstructured":"CERT Advisory CA-2001-19 CodeRed worm.  CERT Advisory CA-2001-19 CodeRed worm."},{"key":"e_1_3_2_1_11_1","unstructured":"CERT Advisory CA-2002-33 Heap Overflow Vulnerability in Microsoft Data Access Components.  CERT Advisory CA-2002-33 Heap Overflow Vulnerability in Microsoft Data Access Components."},{"key":"e_1_3_2_1_12_1","unstructured":"CERT Advisory CA-2003-20 SQLSlammer worm.  CERT Advisory CA-2003-20 SQLSlammer worm."},{"key":"e_1_3_2_1_13_1","first-page":"177","volume-title":"Usenix Security '05","author":"Chen S.","year":"2005","unstructured":"S. Chen , J. Xu , E. C. Sezer , P. Gauriar , and R. K. Iyer . Non-control-data attacks are realistic threats . In Usenix Security '05 , pages 177 -- 192 , 2005 . S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In Usenix Security '05, pages 177--192, 2005."},{"key":"e_1_3_2_1_14_1","first-page":"409","volume-title":"ICDCS '01","author":"Chiueh T.","unstructured":"T. Chiueh and F. Hsu . RAD: A compile-time solution to buffer overflow attacks . In ICDCS '01 , pages 409 -- 417 . T. Chiueh and F. Hsu. RAD: A compile-time solution to buffer overflow attacks. In ICDCS '01, pages 409--417."},{"key":"e_1_3_2_1_15_1","volume-title":"w00w00 on heap overflows","author":"Conover M.","year":"1999","unstructured":"M. Conover . w00w00 on heap overflows , 1999 . www.w00w00.org\/ files\/articles\/heaptut.txt. M. Conover. w00w00 on heap overflows, 1999. www.w00w00.org\/ files\/articles\/heaptut.txt."},{"key":"e_1_3_2_1_16_1","first-page":"91","volume-title":"Usenix Security '03","author":"Cowan C.","unstructured":"C. Cowan and S. Beattie . PointGuard: protecting pointers from buffer overflow vulnerabilities . In Usenix Security '03 , pages 91 -- 104 . C. Cowan and S. Beattie. PointGuard: protecting pointers from buffer overflow vulnerabilities. In Usenix Security '03, pages 91--104."},{"key":"e_1_3_2_1_17_1","first-page":"63","volume-title":"Usenix Security '98","author":"Cowan C.","year":"1998","unstructured":"C. Cowan and C. Pu . StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks . In Usenix Security '98 , pages 63 -- 78 , January 1998 . C. Cowan and C. Pu. StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. In Usenix Security '98, pages 63--78, January 1998."},{"key":"e_1_3_2_1_18_1","first-page":"105","volume-title":"Usenix Security '06","author":"Cox B.","unstructured":"B. Cox , D. Evans , A. Filipi , J. Rowanhill , W. Hu , J. Davidson , J. Knight , A. Nguyen-Tuong , and J. Hiser . N-variant systems: a secretless framework for security through diversity . In Usenix Security '06 , pages 105 -- 120 . B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant systems: a secretless framework for security through diversity. In Usenix Security '06, pages 105--120."},{"key":"e_1_3_2_1_19_1","volume-title":"HeapShield: Library-based heap overflow protection for free. Tech. report","author":"Berger E. D.","year":"2006","unstructured":"E. D. Berger . HeapShield: Library-based heap overflow protection for free. Tech. report , Univ. of Massachusetts Amherst , 2006 . E. D.Berger. HeapShield: Library-based heap overflow protection for free. Tech. report, Univ. of Massachusetts Amherst, 2006."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781149"},{"key":"e_1_3_2_1_21_1","volume-title":"Phrack","author":"Durden T.","year":"2002","unstructured":"T. Durden . Bypassing PaX ASLR protection . Phrack , 2002 . T. Durden. Bypassing PaX ASLR protection. Phrack, 2002."},{"key":"e_1_3_2_1_22_1","unstructured":"E. Fence. Malloc debugger. http:\/\/directory.fsf.org\/project\/ElectricFence\/.  E. Fence. Malloc debugger. http:\/\/directory.fsf.org\/project\/ElectricFence\/."},{"key":"e_1_3_2_1_23_1","first-page":"55","volume-title":"Usenix Security '01","author":"Frantzen M.","unstructured":"M. Frantzen and M. Shuey . Stackghost: Hardware facilitated stack protection . In Usenix Security '01 , pages 55 -- 66 . M. Frantzen and M. Shuey. Stackghost: Hardware facilitated stack protection. In Usenix Security '01, pages 55--66."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345206.1345215"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_26_1","first-page":"300","volume-title":"DISC '01","author":"Harris T. L.","unstructured":"T. L. Harris . A pragmatic implementation of non-blocking linked lists . In DISC '01 , pages 300 -- 314 . T. L. Harris. A pragmatic implementation of non-blocking linked lists. In DISC '01, pages 300--314."},{"key":"e_1_3_2_1_27_1","volume-title":"the","author":"Hastings R.","year":"1992","unstructured":"R. Hastings and B. Joyce . Purify: Fast detection of memory leaks and access errors . In the Winter 1992 Usenix Conference, pages 125--136. R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In the Winter 1992 Usenix Conference, pages 125--136."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/99163.99185"},{"key":"e_1_3_2_1_29_1","unstructured":"IBM. ProPolice detector. www.trl.ibm.com\/projects\/security\/ssp\/.  IBM. ProPolice detector. www.trl.ibm.com\/projects\/security\/ssp\/."},{"key":"e_1_3_2_1_30_1","volume-title":"Principles of Operations. IBM Publication No. SA22-7085","author":"Extended Architecture IBM","year":"1983","unstructured":"IBM System\/370 Extended Architecture , Principles of Operations. IBM Publication No. SA22-7085 , 1983 . IBM System\/370 Extended Architecture, Principles of Operations. IBM Publication No. SA22-7085, 1983."},{"key":"e_1_3_2_1_31_1","first-page":"275","volume-title":"Usenix ATC '02","author":"Jim T.","year":"2002","unstructured":"T. Jim , J. G. Morrisett , D. Grossman , M. W. Hicks , J. Cheney , and Y. Wang . Cyclone: A safe dialect of C . In Usenix ATC '02 , pages 275 -- 288 , June 2002 . T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In Usenix ATC '02, pages 275--288, June 2002."},{"key":"e_1_3_2_1_32_1","volume-title":"the International Workshop on Automatic Debugging","author":"Jones R. W. M.","year":"1997","unstructured":"R. W. M. Jones and P. H. J. Kelly . Backwards-compatible bounds checking for arrays and pointers in C programs . In the International Workshop on Automatic Debugging , 1997 . R. W. M. Jones and P. H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In the International Workshop on Automatic Debugging, 1997."},{"key":"e_1_3_2_1_33_1","volume-title":"Vudo malloc tricks. Phrack, 11 (57)","author":"Kaempf M.","year":"2001","unstructured":"M. Kaempf . Vudo malloc tricks. Phrack, 11 (57) , 2001 . M. Kaempf. Vudo malloc tricks. Phrack, 11 (57), 2001."},{"key":"e_1_3_2_1_34_1","first-page":"191","volume-title":"Usenix Security '02","author":"Kiriansky V.","unstructured":"V. Kiriansky , D. Bruening , and S. P. Amarasinghe . Secure execution via program shepherding . In Usenix Security '02 , pages 191 -- 206 . V. Kiriansky, D. Bruening, and S. P. Amarasinghe. Secure execution via program shepherding. In Usenix Security '02, pages 191--206."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"e_1_3_2_1_36_1","unstructured":"D. Lea. dlmalloc. http:\/\/g.oswego.edu\/.  D. Lea. dlmalloc. http:\/\/g.oswego.edu\/."},{"key":"e_1_3_2_1_37_1","first-page":"1","volume-title":"IPDPS '10","author":"Lee P.","unstructured":"P. Lee , T. Bu , and G. Chandranmenon . A lock-free, cache-efficient multi-core synchronization mechanism for line-rate network traffic monitoring . In IPDPS '10 , pages 1 -- 12 . P. Lee, T. Bu, and G. Chandranmenon. A lock-free, cache-efficient multi-core synchronization mechanism for line-rate network traffic monitoring. In IPDPS '10, pages 1--12."},{"key":"e_1_3_2_1_38_1","unstructured":"R. Lemos. Counting the cost of Slammer 2003. http:\/\/news.cnet.com\/ Counting-the-cost-of-Slammer\/2100-1002_3-982955.html.  R. Lemos. Counting the cost of Slammer 2003. http:\/\/news.cnet.com\/ Counting-the-cost-of-Slammer\/2100-1002_3-982955.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.8"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/564870.564881"},{"key":"e_1_3_2_1_41_1","unstructured":"MSDN. Structured exception handling. http:\/\/msdn.microsoft.com\/en-us\/library\/ms680657(VS.85).aspx.  MSDN. Structured exception handling. http:\/\/msdn.microsoft.com\/en-us\/library\/ms680657(VS.85).aspx."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"e_1_3_2_1_43_1","unstructured":"NIST. National Vulnerability Database. http:\/\/nvd.nist.gov\/.  NIST. National Vulnerability Database. http:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_44_1","unstructured":"NIST. SAMATE Reference Dataset. http:\/\/samate.nist.gov\/SRD.  NIST. SAMATE Reference Dataset. http:\/\/samate.nist.gov\/SRD."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866371"},{"key":"e_1_3_2_1_46_1","unstructured":"Open Source project. Amino concurrent building blocks. http:\/\/amino-cbbs.sourceforge.net\/.  Open Source project. Amino concurrent building blocks. http:\/\/amino-cbbs.sourceforge.net\/."},{"key":"e_1_3_2_1_47_1","unstructured":"Open Source Project. libsigsegv. http:\/\/libsigsegv.sourceforge.net\/.  Open Source Project. libsigsegv. http:\/\/libsigsegv.sourceforge.net\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.280802"},{"key":"e_1_3_2_1_49_1","first-page":"211","volume-title":"Usenix ATC '03","author":"Prasad M.","unstructured":"M. Prasad and T. Chiueh . A binary rewriting defense against stack based buffer overflow attacks . In Usenix ATC '03 , pages 211 -- 224 . M. Prasad and T. Chiueh. A binary rewriting defense against stack based buffer overflow attacks. In Usenix ATC '03, pages 211--224."},{"key":"e_1_3_2_1_50_1","volume-title":"Core Security Tech.","author":"Richarte G.","year":"2002","unstructured":"G. Richarte . Four different tricks to bypass StackShield and StackGuard protection. Tech. report , Core Security Tech. , 2002 . G. Richarte. Four different tricks to bypass StackShield and StackGuard protection. Tech. report, Core Security Tech., 2002."},{"key":"e_1_3_2_1_51_1","first-page":"51","volume-title":"LISA '03","author":"Robertson W.","unstructured":"W. Robertson , C. Kruegel , D. Mutz , and F. Valeur . Run-time detection of heap-based overflows . In LISA '03 , pages 51 -- 60 . W. Robertson, C. Kruegel, D. Mutz, and F. Valeur. Run-time detection of heap-based overflows. In LISA '03, pages 51--60."},{"key":"e_1_3_2_1_52_1","first-page":"159","volume-title":"NDSS '04","author":"Ruwase O.","unstructured":"O. Ruwase and M. S. Lam . A practical dynamic buffer overflow detector . In NDSS '04 , pages 159 -- 169 . O. Ruwase and M. S. Lam. A practical dynamic buffer overflow detector. In NDSS '04, pages 159--169."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"e_1_3_2_1_54_1","unstructured":"SecuriTeam. http:\/\/www.securiteam.com\/.  SecuriTeam. http:\/\/www.securiteam.com\/."},{"key":"e_1_3_2_1_55_1","volume-title":"CVS directory request double free heap corruption","year":"2003","unstructured":"SecurityFocus. CVS directory request double free heap corruption , 2003 . SecurityFocus. CVS directory request double free heap corruption, 2003."},{"key":"e_1_3_2_1_56_1","volume-title":"Mozilla Firefox and Seamonkey regular expression parsing heap buffer overflow","year":"2009","unstructured":"SecurityFocus. Mozilla Firefox and Seamonkey regular expression parsing heap buffer overflow , 2009 . SecurityFocus. Mozilla Firefox and Seamonkey regular expression parsing heap buffer overflow, 2009."},{"key":"e_1_3_2_1_57_1","volume-title":"Wu-ftpd file globbing heap corruption","year":"2001","unstructured":"SecurityFocus. Wu-ftpd file globbing heap corruption , 2001 . SecurityFocus. Wu-ftpd file globbing heap corruption, 2001."},{"key":"e_1_3_2_1_58_1","volume-title":"libHX 'HX_split()' remote heap-based buffer overflow","year":"2010","unstructured":"SecurityFocus. libHX 'HX_split()' remote heap-based buffer overflow , 2010 . SecurityFocus. libHX 'HX_split()' remote heap-based buffer overflow, 2010."},{"key":"e_1_3_2_1_59_1","volume-title":"Lynx browser 'convert_to_idna()' function remote heap based buffer overflow","year":"2010","unstructured":"SecurityFocus. Lynx browser 'convert_to_idna()' function remote heap based buffer overflow , 2010 . SecurityFocus. Lynx browser 'convert_to_idna()' function remote heap based buffer overflow, 2010."},{"key":"e_1_3_2_1_60_1","unstructured":"SecurityFocus. http:\/\/www.securityfocus.com\/.  SecurityFocus. http:\/\/www.securityfocus.com\/."},{"key":"e_1_3_2_1_61_1","volume-title":"Sudo password prompt heap overflow","year":"2002","unstructured":"SecurityFocus. Sudo password prompt heap overflow , 2002 . SecurityFocus. Sudo password prompt heap overflow, 2002."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1147954.1147958"},{"key":"e_1_3_2_1_63_1","volume-title":"Non-executable user stack","author":"Designer Solar","year":"1997","unstructured":"Solar Designer . Non-executable user stack , 1997 . http:\/\/www.open wall.com\/linux\/. Solar Designer. Non-executable user stack, 1997. http:\/\/www.open wall.com\/linux\/."},{"key":"e_1_3_2_1_64_1","volume-title":"January","year":"2000","unstructured":"StackShield. http:\/\/www.angelfire.com\/sk\/stackshield\/ , January 2000 . StackShield. http:\/\/www.angelfire.com\/sk\/stackshield\/, January 2000."},{"key":"e_1_3_2_1_65_1","unstructured":"The PaX project. http:\/\/pax.grsecurity.net\/.  The PaX project. http:\/\/pax.grsecurity.net\/."},{"key":"e_1_3_2_1_66_1","first-page":"541","volume-title":"DSN '02","author":"Tsai T. K.","unstructured":"T. K. Tsai and N. Singh . Libsafe: Transparent system-wide protection against buffer overflow attacks . In DSN '02 , pages 541 -- 541 . T. K. Tsai and N. Singh. Libsafe: Transparent system-wide protection against buffer overflow attacks. In DSN '02, pages 541--541."},{"key":"e_1_3_2_1_67_1","unstructured":"US-CERT. Vulnerability notes database. www.kb.cert.org\/vuls.  US-CERT. Vulnerability notes database. www.kb.cert.org\/vuls."},{"key":"e_1_3_2_1_68_1","unstructured":"Valgrind. http:\/\/valgrind.org\/.  Valgrind. http:\/\/valgrind.org\/."},{"key":"e_1_3_2_1_69_1","first-page":"3","volume-title":"NDSS'00","author":"Wagner D.","unstructured":"D. Wagner , J. S. Foster , E. A. Brewer , and A. Aiken . A first step towards automated detection of buffer overrun vulnerabilities . In NDSS'00 , pages 3 -- 17 . D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In NDSS'00, pages 3--17."},{"key":"e_1_3_2_1_70_1","volume-title":"Workshop Evaluating & Architecting Sys. Depend.","author":"Xu J.","year":"2002","unstructured":"J. Xu , Z. Kalbarczyk , S. Patel , and R. Iyer . Architecture support for defending against buffer overflow attacks . In Workshop Evaluating & Architecting Sys. Depend. , 2002 . J. Xu, Z. Kalbarczyk, S. Patel, and R. Iyer. Architecture support for defending against buffer overflow attacks. In Workshop Evaluating & Architecting Sys. Depend., 2002."},{"key":"e_1_3_2_1_71_1","volume-title":"Workshop on the Evaluation of Software Defect Detection Tools","author":"Zhivich M.","year":"2005","unstructured":"M. Zhivich , T. Leek , and R. Lippmann . Dynamic buffer overflow detection . In Workshop on the Evaluation of Software Defect Detection Tools , 2005 . M. Zhivich, T. Leek, and R. Lippmann. Dynamic buffer overflow detection. In Workshop on the Evaluation of Software Defect Detection Tools, 2005."}],"event":{"name":"PLDI '11: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"San Jose California USA","acronym":"PLDI '11","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993541","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993498.1993541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:05:46Z","timestamp":1750230346000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993541"}},"subtitle":["concurrent heap buffer overflow monitoring using lock-free data structures"],"short-title":[],"issued":{"date-parts":[[2011,6,4]]},"references-count":71,"alternative-id":["10.1145\/1993498.1993541","10.1145\/1993498"],"URL":"https:\/\/doi.org\/10.1145\/1993498.1993541","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1993316.1993541","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2011,6,4]]},"assertion":[{"value":"2011-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}