{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:29Z","timestamp":1750220849739,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006012","name":"Christian Doppler Forschungsgesellschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006012","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3357390.3361025","type":"proceedings-article","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T18:52:21Z","timestamp":1570733541000},"page":"95-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Detection of suspicious time windows in memory monitoring"],"prefix":"10.1145","author":[{"given":"Markus","family":"Weninger","sequence":"first","affiliation":[{"name":"JKU Linz, Austria"}]},{"given":"Elias","family":"Gander","sequence":"additional","affiliation":[{"name":"JKU Linz, Austria"}]},{"given":"Hanspeter","family":"M\u00f6ssenb\u00f6ck","sequence":"additional","affiliation":[{"name":"JKU Linz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"volume-title":"Proc. of the 5th Int'l Symp. on Software Visualization (SOFTVIS '10)","author":"Aftandilian Edward E.","key":"e_1_3_2_1_1_1","unstructured":"Edward E. Aftandilian , Sean Kelley , Connor Gramazio , Nathan Ricci , Sara L. Su , and Samuel Z. Guyer . 2010. Heapviz: Interactive Heap Visualization for Program Understanding and Debugging . In Proc. of the 5th Int'l Symp. on Software Visualization (SOFTVIS '10) . Edward E. Aftandilian, Sean Kelley, Connor Gramazio, Nathan Ricci, Sara L. Su, and Samuel Z. Guyer. 2010. Heapviz: Interactive Heap Visualization for Program Understanding and Debugging. In Proc. of the 5th Int'l Symp. on Software Visualization (SOFTVIS '10)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807426.2807433"},{"volume-title":"Proc. of the 12th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS XII).","author":"Michael","key":"e_1_3_2_1_3_1","unstructured":"Michael D. Bond and Kathryn S. McKinley. 2006. Bell: Bit-encoding Online Memory Leak Detection . In Proc. of the 12th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS XII). Michael D. Bond and Kathryn S. McKinley. 2006. Bell: Bit-encoding Online Memory Leak Detection. In Proc. of the 12th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS XII)."},{"volume-title":"Proc. of the 31st Annual Int'l Computer Software and Applications Conf. (COMPSAC '07)","author":"Chen K.","key":"e_1_3_2_1_4_1","unstructured":"K. Chen and J. Chen . 2007. Aspect-Based Instrumentation for Locating Memory Leaks in Java Programs . In Proc. of the 31st Annual Int'l Computer Software and Applications Conf. (COMPSAC '07) . K. Chen and J. Chen. 2007. Aspect-Based Instrumentation for Locating Memory Leaks in Java Programs. In Proc. of the 31st Annual Int'l Computer Software and Applications Conf. (COMPSAC '07)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/362422.362435"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2008.02.068"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646156.679713"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029873.1029879"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12029-9_20"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273480"},{"key":"e_1_3_2_1_11_1","unstructured":"Dynatrace. 2019. Demo Applications: easyTravel. https:\/\/community.dynatrace.com\/community\/display\/DL\/Demo+Applications+-+easyTravel.  Dynatrace. 2019. Demo Applications: easyTravel. https:\/\/community.dynatrace.com\/community\/display\/DL\/Demo+Applications+-+easyTravel."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2972206.2972210"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3195032"},{"volume-title":"Proc. of the 11th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS XI).","author":"Hauswirth Matthias","key":"e_1_3_2_1_14_1","unstructured":"Matthias Hauswirth and Trishul M. Chilimbi . 2004. Low-overhead Memory Leak Detection Using Adaptive Statistical Profiling . In Proc. of the 11th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS XI). Matthias Hauswirth and Trishul M. Chilimbi. 2004. Low-overhead Memory Leak Detection Using Adaptive Statistical Profiling. In Proc. of the 11th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS XI)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511352"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133651.1133654"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2411"},{"volume-title":"The garbage collection handbook: the art of automatic memory management","author":"Jones Richard","key":"e_1_3_2_1_18_1","unstructured":"Richard Jones , Antony Hosking , and Eliot Moss . 2016. The garbage collection handbook: the art of automatic memory management . Chapman and Hall\/CRC. Richard Jones, Antony Hosking, and Eliot Moss. 2016. The garbage collection handbook: the art of automatic memory management. Chapman and Hall\/CRC."},{"volume-title":"Proc. of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '07)","author":"Jump Maria","key":"e_1_3_2_1_19_1","unstructured":"Maria Jump and Kathryn S . McKinley. 2007. Cork: Dynamic Memory Leak Detection for Garbage-collected Languages . In Proc. of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '07) . Maria Jump and Kathryn S. McKinley. 2007. Cork: Dynamic Memory Leak Detection for Garbage-collected Languages. In Proc. of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '07)."},{"volume-title":"Proc. of the 34th Annual ACM SIGPLAN-SIGACT Symp. on Principles of Programming Languages (POPL '07)","author":"Jump Maria","key":"e_1_3_2_1_20_1","unstructured":"Maria Jump and Kathryn S . McKinley. 2007. Cork: Dynamic Memory Leak Detection for Garbage-collected Languages . In Proc. of the 34th Annual ACM SIGPLAN-SIGACT Symp. on Principles of Programming Languages (POPL '07) . Maria Jump and Kathryn S. McKinley. 2007. Cork: Dynamic Memory Leak Detection for Garbage-collected Languages. In Proc. of the 34th Annual ACM SIGPLAN-SIGACT Symp. on Principles of Programming Languages (POPL '07)."},{"key":"e_1_3_2_1_21_1","volume-title":"McKinley","author":"Jump Maria","year":"2009","unstructured":"Maria Jump and Kathryn S . McKinley . 2009 . Detecting Memory Leaks in Managed Languages with Cork . Software : Practice and Experience 40, 1 (2009). Maria Jump and Kathryn S. McKinley. 2009. Detecting Memory Leaks in Managed Languages with Cork. Software: Practice and Experience 40, 1 (2009)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835822"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2972206.2972220"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668930.2688037"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851553.2851555"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030211"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_5"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45070-2_16"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297046"},{"volume-title":"Classical and modern regression with applications","author":"Myers Raymond H","key":"e_1_3_2_1_30_1","unstructured":"Raymond H Myers and Raymond H Myers . 1990. Classical and modern regression with applications . Vol. 2 . Duxbury press Belmont , CA. Raymond H Myers and Raymond H Myers. 1990. Classical and modern regression with applications. Vol. 2. Duxbury press Belmont, CA."},{"key":"e_1_3_2_1_31_1","volume-title":"Visualizing Reference Patterns for Solving Memory Leaks in Java. Concurrency: Practice and Experience 12, 14","author":"Pauw Wim De","year":"2000","unstructured":"Wim De Pauw and Gary Sevitsky . 2000. Visualizing Reference Patterns for Solving Memory Leaks in Java. Concurrency: Practice and Experience 12, 14 ( 2000 ). Wim De Pauw and Gary Sevitsky. 2000. Visualizing Reference Patterns for Solving Memory Leaks in Java. Concurrency: Practice and Experience 12, 14 (2000)."},{"volume-title":"Proc. of the 7th ACM\/SPEC on Int'l Conf. on Performance Engineering (ICPE '16)","author":"Peiris Manjula","key":"e_1_3_2_1_32_1","unstructured":"Manjula Peiris and James H. Hill . 2016. Automatically Detecting \"Excessive Dynamic Memory Allocations\" Software Performance Anti-Pattern . In Proc. of the 7th ACM\/SPEC on Int'l Conf. on Performance Engineering (ICPE '16) . Manjula Peiris and James H. Hill. 2016. Automatically Detecting \"Excessive Dynamic Memory Allocations\" Software Performance Anti-Pattern. In Proc. of the 7th ACM\/SPEC on Int'l Conf. on Performance Engineering (ICPE '16)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314637"},{"volume-title":"Proc. of the 2012 28th IEEE Int'l Conf. on Software Maintenance (ICSM '12)","author":"Qian J.","key":"e_1_3_2_1_34_1","unstructured":"J. Qian and X. Zhou . 2012. Inferring weak references for fixing Java memory leaks . In Proc. of the 2012 28th IEEE Int'l Conf. on Software Maintenance (ICSM '12) . J. Qian and X. Zhou. 2012. Inferring weak references for fixing Java memory leaks. In Proc. of the 2012 28th IEEE Int'l Conf. on Software Maintenance (ICSM '12)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321661"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138912.1138924"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOF.2009.5336418"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378820"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/647476.727764"},{"volume-title":"Proc. of the 2nd Int'l Workshop on Software and Performance (WOSP '00)","author":"Connie","key":"e_1_3_2_1_40_1","unstructured":"Connie U. Smith and Lloyd G. Williams. 2000. Software Performance Antipatterns . In Proc. of the 2nd Int'l Workshop on Software and Performance (WOSP '00) . Connie U. Smith and Lloyd G. Williams. 2000. Software Performance Antipatterns. In Proc. of the 2nd Int'l Workshop on Software and Performance (WOSP '00)."},{"volume-title":"Intl. CMG Conf.","author":"Connie","key":"e_1_3_2_1_41_1","unstructured":"Connie U. Smith and Lloyd G. Williams. 2002. New Software Performance Antipatterns: More Ways to Shoot Yourself in the Foot . In Intl. CMG Conf. Connie U. Smith and Lloyd G. Williams. 2002. New Software Performance Antipatterns: More Ways to Shoot Yourself in the Foot. In Intl. CMG Conf."},{"volume-title":"Intl. CMG Conf.","author":"Connie","key":"e_1_3_2_1_42_1","unstructured":"Connie U. Smith and Lloyd G. Williams. 2003. More New Software Performance Antipatterns: Even More Ways to Shoot Yourself in the Foot . In Intl. CMG Conf. Connie U. Smith and Lloyd G. Williams. 2003. More New Software Performance Antipatterns: Even More Ways to Shoot Yourself in the Foot. In Intl. CMG Conf."},{"volume-title":"Proc. of the 2013 IEEE Int'l Conf. on Software Maintenance (ICSM '13)","author":"Sor V.","key":"e_1_3_2_1_43_1","unstructured":"V. Sor , P. O\u00fc , T. Treier , and S. N. Srirama . 2013. Improving Statistical Approach for Memory Leak Detection Using Machine Learning . In Proc. of the 2013 IEEE Int'l Conf. on Software Maintenance (ICSM '13) . V. Sor, P. O\u00fc, T. Treier, and S. N. Srirama. 2013. Improving Statistical Approach for Memory Leak Detection Using Machine Learning. In Proc. of the 2013 IEEE Int'l Conf. on Software Maintenance (ICSM '13)."},{"key":"e_1_3_2_1_44_1","volume-title":"On the Move to Meaningful Internet Systems (OTM","author":"Vladimir","year":"2011","unstructured":"Vladimir ?or, Nikita Salnikov-Tarnovski , and Satish Narayana Srirama . 2011. Automated Statistical Approach for Memory Leak Detection: Case Studies . In On the Move to Meaningful Internet Systems (OTM 2011 ). Vladimir ?or, Nikita Salnikov-Tarnovski, and Satish Narayana Srirama. 2011. Automated Statistical Approach for Memory Leak Detection: Case Studies. In On the Move to Meaningful Internet Systems (OTM 2011)."},{"key":"e_1_3_2_1_45_1","volume-title":"Memory leak detection in Java: Taxonomy and classification of approaches. Journal of Systems and Software 96","author":"Satish Narayana Vladimir","year":"2014","unstructured":"Vladimir ?or and Satish Narayana Sr irama. 2014. Memory leak detection in Java: Taxonomy and classification of approaches. Journal of Systems and Software 96 ( 2014 ). Vladimir ?or and Satish Narayana Srirama. 2014. Memory leak detection in Java: Taxonomy and classification of approaches. Journal of Systems and Software 96 (2014)."},{"volume-title":"Proc. of the 8th Int'l Workshop on Principles of Software Evolution (IWPSE '05)","author":"Taniguchi K.","key":"e_1_3_2_1_46_1","unstructured":"K. Taniguchi , T. Ishio , T. Kamiya , S. Kusumoto , and K. Inoue . 2005. Extracting sequence diagram from execution trace of Java program . In Proc. of the 8th Int'l Workshop on Principles of Software Evolution (IWPSE '05) . K. Taniguchi, T. Ishio, T. Kamiya, S. Kusumoto, and K. Inoue. 2005. Extracting sequence diagram from execution trace of Java program. In Proc. of the 8th Int'l Workshop on Principles of Software Evolution (IWPSE '05)."},{"key":"e_1_3_2_1_47_1","unstructured":"Oracle. 2019. The HotSpot Group. http:\/\/openjdk.java.net\/groups\/hotspot\/.  Oracle. 2019. The HotSpot Group. http:\/\/openjdk.java.net\/groups\/hotspot\/."},{"key":"e_1_3_2_1_48_1","unstructured":"Oracle. 2019. ZGC - The Z Garbage Collector. http:\/\/openjdk.java.net\/projects\/zgc\/.  Oracle. 2019. ZGC - The Z Garbage Collector. http:\/\/openjdk.java.net\/projects\/zgc\/."},{"key":"e_1_3_2_1_49_1","volume-title":"FOSDEM 2018","author":"Lid\u00e9n Per","year":"2018","unstructured":"Per Lid\u00e9n & Stefan Karlsson . 2018 . The Z Garbage Collector - An Introduction , FOSDEM 2018 . http:\/\/cr.openjdk.java.net\/~pliden\/slides\/ZGC-FOSDEM-2018.pdf. Per Lid\u00e9n & Stefan Karlsson. 2018. The Z Garbage Collector - An Introduction, FOSDEM 2018. http:\/\/cr.openjdk.java.net\/~pliden\/slides\/ZGC-FOSDEM-2018.pdf."},{"key":"e_1_3_2_1_50_1","volume-title":"van Wijk","author":"van den Elzen Stef","year":"2013","unstructured":"Stef van den Elzen and Jarke J . van Wijk . 2013 . Small Multiples, Large Singles : A New Approach for Visual Data Exploration. Comput. Graph. Forum 32 (2013). Stef van den Elzen and Jarke J. van Wijk. 2013. Small Multiples, Large Singles: A New Approach for Visual Data Exploration. Comput. Graph. Forum 32 (2013)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297663.3310297"},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. of the 9th Symposium on Software Performance (SSP '18)","author":"Weninger Markus","year":"2018","unstructured":"Markus Weninger , Elias Gander , and Hanspeter M\u00f6ssenb\u00f6ck . 2018 . Analyzing the Evolution of Data Structures Over Time in Trace-Based Offline Memory Monitoring . In Proc. of the 9th Symposium on Software Performance (SSP '18) . Markus Weninger, Elias Gander, and Hanspeter M\u00f6ssenb\u00f6ck. 2018. Analyzing the Evolution of Data Structures Over Time in Trace-Based Offline Memory Monitoring. In Proc. of the 9th Symposium on Software Performance (SSP '18)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3237009.3237023"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030236"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Markus Weninger Lukas Makor Elias Gander and Hanspeter M\u00f6ssenb\u00f6ck. 2019. AntTracks TrendViz: Configurable Heap Memory Visualization Over Time. In Companion of the 2019 ACM\/SPEC Int'l Conf. on Performance Engineering (ICPE '19).   Markus Weninger Lukas Makor Elias Gander and Hanspeter M\u00f6ssenb\u00f6ck. 2019. AntTracks TrendViz: Configurable Heap Memory Visualization Over Time. In Companion of the 2019 ACM\/SPEC Int'l Conf. on Performance Engineering (ICPE '19) .","DOI":"10.1145\/3302541.3313100"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184407.3184412"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOF.2007.4290706"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993530"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368110"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544151"},{"volume-title":"Proc. of the 2015 IEEE 15th Int'l Working Conf. on Source Code Analysis and Manipulation (SCAM '15)","author":"Yu H.","key":"e_1_3_2_1_61_1","unstructured":"H. Yu , X. Shi , and W. Feng . [n.d.]. LeakTracer: Tracing leaks along the way . In Proc. of the 2015 IEEE 15th Int'l Working Conf. on Source Code Analysis and Manipulation (SCAM '15) . H. Yu, X. Shi, and W. Feng. [n.d.]. LeakTracer: Tracing leaks along the way. In Proc. of the 2015 IEEE 15th Int'l Working Conf. on Source Code Analysis and Manipulation (SCAM '15)."}],"event":{"name":"MPLR '19: 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Athens Greece","acronym":"MPLR '19"},"container-title":["Proceedings of the 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357390.3361025","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357390.3361025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:11Z","timestamp":1750202591000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357390.3361025"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":61,"alternative-id":["10.1145\/3357390.3361025","10.1145\/3357390"],"URL":"https:\/\/doi.org\/10.1145\/3357390.3361025","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}