{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:26:27Z","timestamp":1766579187602,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/V007165\/1"],"award-info":[{"award-number":["EP\/V007165\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Royal Society Industry Fellowship","award":["INF\\R1\\211001"],"award-info":[{"award-number":["INF\\R1\\211001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,29]]},"DOI":"10.1145\/3563834.3567538","type":"proceedings-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T18:48:11Z","timestamp":1669920491000},"page":"15-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Who You Gonna Call: Analyzing the Run-Time Call-Site Behavior of Ruby Applications"],"prefix":"10.1145","author":[{"given":"Sophie","family":"Kaleba","sequence":"first","affiliation":[{"name":"University of Kent, UK"}]},{"given":"Octave","family":"Larose","sequence":"additional","affiliation":[{"name":"University of Kent, UK"}]},{"given":"Richard","family":"Jones","sequence":"additional","affiliation":[{"name":"University of Kent, UK"}]},{"given":"Stefan","family":"Marr","sequence":"additional","affiliation":[{"name":"University of Kent, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597103"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2936313.2816717"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.176"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3486606.3486781"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276478"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428288"},{"volume-title":"Smalltalk-80: the language and its implementation","author":"Goldberg Adele","key":"e_1_3_2_1_7_1","unstructured":"Adele Goldberg and David Robson . 1983. Smalltalk-80: the language and its implementation . Addison-Wesley Longman Publishing Co., Inc. . Adele Goldberg and David Robson. 1983. Smalltalk-80: the language and its implementation. Addison-Wesley Longman Publishing Co., Inc.."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Thirty-Second Australasian Conference on Computer Science -","volume":"91","author":"Holkner Alex","year":"2009","unstructured":"Alex Holkner and James Harland . 2009 . Evaluating the Dynamic Behaviour of Python Applications . In Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91 (ACSC \u201909). Australian Computer Society, Inc., AUS. 19\u201328. isbn:978 1920682729 https:\/\/doi.org\/10.5555\/1862659.1862665 10.5555\/1862659.1862665 Alex Holkner and James Harland. 2009. Evaluating the Dynamic Behaviour of Python Applications. In Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91 (ACSC \u201909). Australian Computer Society, Inc., AUS. 19\u201328. isbn:9781920682729 https:\/\/doi.org\/10.5555\/1862659.1862665"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646149.679193"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.1996.10474713"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7319817"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/778559.778562"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2989225.2989232"},{"key":"e_1_3_2_1_14_1","unstructured":"Yukio Matsumoto and Kiju Ishituka. 2002. Ruby programming language. \t\t\t\t  Yukio Matsumoto and Kiju Ishituka. 2002. Ruby programming language."},{"volume-title":"Analysis, Detection, and Exploitation of Phase Behavior in Java Programs. Ph. D. Dissertation","author":"Nagpurkar Priya","key":"e_1_3_2_1_15_1","unstructured":"Priya Nagpurkar . 2007. Analysis, Detection, and Exploitation of Phase Behavior in Java Programs. Ph. D. Dissertation . University of California Santa Barbara . Priya Nagpurkar. 2007. Analysis, Detection, and Exploitation of Phase Behavior in Java Programs. Ph. D. Dissertation. University of California Santa Barbara."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2006.1639325"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806598"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542142.2542144"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/359810.359830"},{"key":"e_1_3_2_1_20_1","unstructured":"Chris Seaton Benoit Daloze Kevin Menard Petr Chalupa Brandon Fish and Duncan MacGregor. 2017. TruffleRuby\u2014A High Performance Implementation of the Ruby Programming Language. \t\t\t\t  Chris Seaton Benoit Daloze Kevin Menard Petr Chalupa Brandon Fish and Duncan MacGregor. 2017. TruffleRuby\u2014A High Performance Implementation of the Ruby Programming Language."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062381"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384577.2384587"}],"event":{"name":"DLS '22: 18th ACM SIGPLAN International Symposium on Dynamic Languages","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Auckland New Zealand","acronym":"DLS '22"},"container-title":["Proceedings of the 18th ACM SIGPLAN International Symposium on Dynamic Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563834.3567538","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3563834.3567538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:08Z","timestamp":1750186808000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3563834.3567538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,29]]},"references-count":22,"alternative-id":["10.1145\/3563834.3567538","10.1145\/3563834"],"URL":"https:\/\/doi.org\/10.1145\/3563834.3567538","relation":{},"subject":[],"published":{"date-parts":[[2022,11,29]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}