{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:16Z","timestamp":1750306096329,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T00:00:00Z","timestamp":1512604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12,7]]},"DOI":"10.1145\/3155133.3155183","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T13:26:53Z","timestamp":1512998813000},"page":"409-416","source":"Crossref","is-referenced-by-count":1,"title":["A Compositional Type Systems for Finding Log Memory Bounds of Transactional Programs"],"prefix":"10.1145","author":[{"given":"Ngoc-Khai","family":"Nguyen","sequence":"first","affiliation":[{"name":"Hanoi University of Natural Resources and Environment, Hanoi, Vietnam"}]},{"given":"Anh-Hoang","family":"Truong","sequence":"additional","affiliation":[{"name":"VNU University of Engineering and Technology, Hanoi, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1569"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Elvira Albert Puri Arenas Samir Genaim Germ\u00e1n Puebla and Damiano Zanardini. 2007. Cost Analysis of Java Bytecode. In ESOP. Elvira Albert Puri Arenas Samir Genaim Germ\u00e1n Puebla and Damiano Zanardini. 2007. Cost Analysis of Java Bytecode. In ESOP.","DOI":"10.1007\/978-3-540-71316-6_12"},{"key":"e_1_3_2_1_3_1","volume-title":"SAS 2014 (LNCS), Markus M\u00fcller-Olm and Helmut Seidl (Eds.)","volume":"8723","author":"Albert Elvira","year":"2014"},{"volume-title":"ABC: Algebraic Bound Computation for Loops. In Logic for Programming, Artificial Intelligence, and Reasoning - 16th International Conference, LPAR-16, Dakar, Senegal, April 25-May 1","year":"2010","author":"Blanc R\u00e9gis","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/232627.232650"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429077"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/320385.320388"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11526841_8"},{"volume-title":"ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings. 105--131","year":"2015","author":"Cern\u00fd Pavol","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062500"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Jong-Deok Choi Manish Gupta Mauricio Serrano Vugranam C. Sreedhar and Sam Midkiff. 1999. Escape analysis for Java. SIGPLAN Not. 34 10 (1999). 10.1145\/320385.320386 Jong-Deok Choi Manish Gupta Mauricio Serrano Vugranam C. Sreedhar and Sam Midkiff. 1999. Escape analysis for Java. SIGPLAN Not. 34 10 (1999). 10.1145\/320385.320386","DOI":"10.1145\/320385.320386"},{"volume-title":"ESOP 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015. Proceedings. 406--431","author":"\u00c7i\u00e7ek Ezgi","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2784731.2784749"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2428116.2428123"},{"key":"e_1_3_2_1_16_1","unstructured":"Diego Garbervetsky and Sergio Yovine. 2007. Symbolic Prediction of Dynamic Memory Requirements. Diego Garbervetsky and Sergio Yovine. 2007. Symbolic Prediction of Dynamic Memory Requirements."},{"key":"e_1_3_2_1_17_1","unstructured":"Ovidiu Gheorghioiu Martin Rinard and Arthur C. Smith. 2002. Statically Determining Memory Consumption of Real-Time Java Threads. Ovidiu Gheorghioiu Martin Rinard and Arthur C. Smith. 2002. Statically Determining Memory Consumption of Real-Time Java Threads."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/173682.165164"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604148"},{"key":"e_1_3_2_1_20_1","unstructured":"John Hughes and Lars Pareto. 1999. Recursion and Dynamic Data-Structures in Bounded Space: Towards Embedded ML Programming. SIGPLAN Notices 34 9 (1999). 10.1145\/317765.317785 John Hughes and Lars Pareto. 1999. Recursion and Dynamic Data-Structures in Bounded Space: Towards Embedded ML Programming. SIGPLAN Notices 34 9 (1999). 10.1145\/317765.317785"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2005.03.001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2008.30"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_50"},{"key":"e_1_3_2_1_24_1","volume-title":"ICDCIT 2016, Proceedings (LNCS), Nikolaj Bj\u00f8rner, Sanjiva Prasad, and Laxmi Parida (Eds.)","volume":"9581","author":"Truong Anh-Hoang","year":"2016"},{"key":"e_1_3_2_1_25_1","volume-title":"13th International Colloquium","volume":"9965","author":"Truong Anh-Hoang","year":"2016"},{"volume-title":"4th International Seminar on Program Verification, Automated Debugging and Symbolic Computation,.","year":"2015","author":"Tung Vu Xuan","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","unstructured":"Leena Unnikrishnan Scott D. Stoller and Yanhong A. Liu. {n. d.}. Optimized Live Heap Bound Analysis. Leena Unnikrishnan Scott D. Stoller and Yanhong A. Liu. {n. d.}. Optimized Live Heap Bound Analysis."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2350716.2350722"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"B. Wegbreit. 1975. Mechanical program analysis. Commun. ACM 18 9 (1975). 10.1145\/361002.361016 B. Wegbreit. 1975. Mechanical program analysis. Commun. ACM 18 9 (1975). 10.1145\/361002.361016","DOI":"10.1145\/361002.361016"}],"event":{"name":"SoICT 2017: The Eighth International Symposium on Information and Communication Technology","sponsor":["SOICT School of Information and Communication Technology - HUST","NAFOSTED The National Foundation for Science and Technology Development"],"location":"Nha Trang City Viet Nam","acronym":"SoICT 2017"},"container-title":["Proceedings of the Eighth International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155183","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3155133.3155183","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:28Z","timestamp":1750217428000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3155133.3155183"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,7]]},"references-count":29,"alternative-id":["10.1145\/3155133.3155183","10.1145\/3155133"],"URL":"https:\/\/doi.org\/10.1145\/3155133.3155183","relation":{},"subject":[],"published":{"date-parts":[[2017,12,7]]}}}