{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T22:32:31Z","timestamp":1648938751238},"reference-count":30,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2015]]},"DOI":"10.1587\/transinf.2014edp7320","type":"journal-article","created":{"date-parts":[[2015,4,30]],"date-time":"2015-04-30T22:15:54Z","timestamp":1430432154000},"page":"1053-1061","source":"Crossref","is-referenced-by-count":0,"title":["A Detection and Measurement Approach for Memory Leaked Objects in Java Programs"],"prefix":"10.1587","volume":"E98.D","author":[{"given":"Qiao","family":"YU","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, China University of Mining and Technology"}]},{"given":"Shujuan","family":"JIANG","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, China University of Mining and Technology"}]},{"given":"Yingqi","family":"LIU","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, China University of Mining and Technology"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] D.F. Bacon, P. Cheng, and V. Rajan, \u201cA real-time garbage collector with low overhead and consistent utilization,\u201d ACM SIGPLAN Notices, vol.38, no.1, pp.285-298, 2003.","DOI":"10.1145\/640128.604155"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] M. Hertz, Y. Feng, and E.D. Berger, \u201cGarbage collection without paging,\u201d ACM SIGPLAN Notices, vol.40, no.6, pp.143-153, 2005.","DOI":"10.1145\/1064978.1065028"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] U. Ramachandran, N. Harel, A. Mandviwala, and K. Knobe, \u201cDistributed garbage collection algorithms for timestamped data,\u201d IEEE Trans. Parallel Distrib. Syst., vol.17, no.10, pp.1057-1071, 2006.","DOI":"10.1109\/TPDS.2006.138"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] S.M. Blackburn and K.S. McKinley, \u201cImmix: A mark-region garbage collector with space efficiency, fast collection, and mutator performance,\u201d ACM SIGPLAN Notices, vol.43, no.6, pp.22-32, 2008.","DOI":"10.1145\/1379022.1375586"},{"key":"5","unstructured":"[5] JProfiler. http:\/\/www.ej-technologies.com\/products\/jprofiler\/overview.html"},{"key":"6","unstructured":"[6] Yourkit. http:\/\/www.yourkit.com\/overview\/"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] Y. Xie and A. Aiken, \u201cContext-and path-sensitive memory leak detection,\u201d ACM SIGSOFT Software Engineering Notes, vol.30, no.5, pp.115-125, 2005.","DOI":"10.1145\/1095430.1081728"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] Z. Xu and J. Zhang, \u201cPath and context sensitive inter-procedural memory leak detection,\u201d Proc. International Conference on Quality Software, Oxford, UK, pp.412-420, Aug. 2008.","DOI":"10.1109\/QSIC.2008.12"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] Z. Xu, J. Zhang, and Z. Xu, \u201cMemory leak detection based on memory state transition graph,\u201d Proc. Asia Pacific in Software Engineering Conference, Ho Chi Minh city, Vietnam, pp.33-40, Dec. 2011.","DOI":"10.1109\/APSEC.2011.22"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] Y. Sui, D. Ye, and J. Xue, \u201cStatic memory leak detection using full-sparse value-flow analysis,\u201d Proc. International Symposium on Software Testing and Analysis, Minneapolis, MN, pp.254-264, July 2012.","DOI":"10.1145\/2338965.2336784"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M. Jump and K.S. McKinley, \u201cCork: Dynamic memory leak detection for garbage-collected languages,\u201d ACM SIGPLAN Notices, vol.42, no.1, pp.31-38, 2007.","DOI":"10.1145\/1190215.1190224"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] M. Jump and K.S. McKinley, \u201cDetecting memory leaks in managed languages with Cork,\u201d Software: Practice and Experience, vol.40, no.1, pp.1-22, 2010.","DOI":"10.1002\/spe.945"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] N. Mitchell and G. Sevitsky, \u201cLeakBot: An automated and lightweight tool for diagnosing memory leaks in large Java applications,\u201d ECOOP 2003 Object-Oriented Programming, pp.351-377, 2003.","DOI":"10.1007\/978-3-540-45070-2_16"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] M. Hauswirth and T.M. Chilimbi, \u201cLow-overhead memory leak detection using adaptive statistical profiling,\u201d ACM SIGPLAN Notices, vol.39, no.11, pp.156-164, 2004.","DOI":"10.1145\/1037187.1024412"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] M.D. Bond and K.S. McKinley, \u201cBell: bit-encoding online memory leak detection,\u201d ACM Sigplan Notices, vol.41, no.11, pp.61-72, 2006.","DOI":"10.1145\/1168918.1168866"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] M.D. Bond and K.S. McKinley, \u201cTolerating memory leaks,\u201d ACM Sigplan Notices, vol.43, no.10, pp.109-126, 2008.","DOI":"10.1145\/1449955.1449774"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] G. Xu and A. Rountev, \u201cPrecise memory leak detection for java software using container profiling,\u201d Proc. International Conference on Software Engineering, Leipzig, Germany, pp.151-160, May 2008.","DOI":"10.1145\/1368088.1368110"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] Z. Dai, X. Mao, Y. Lei, X. Wan, and K. Ben, \u201cResco: Automatic collection of leaked resources,\u201d IEICE Trans. Inf. &amp; Syst., vol.E96-D, no.1, pp.28-39, Jan. 2013.","DOI":"10.1587\/transinf.E96.D.28"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] H.H. Nguyen and M. Rinard, \u201cDetecting and eliminating memory leaks using cyclic memory allocation,\u201d Proc. International Symposium on Memory Management, Montreal, Canada, pp.15-30, Oct. 2007.","DOI":"10.1145\/1296907.1296912"},{"key":"20","unstructured":"[20] Y. Tang, Q. Gao, and F. Qin, \u201cLeakSurvivor: Towards safely tolerating memory leaks for garbage-collected languages,\u201d Proc. USENIX Annual Technical Conference, pp.307-320, Boston, Massachusetts, June 2008."},{"key":"21","unstructured":"[21] G. Novark, E.D. Berger, and B.G. Zorn, \u201cPlug: automatically tolerating memory leaks in C and C++ applications,\u201d University of Massachusetts, 2008."},{"key":"22","unstructured":"[22] Java Debug Interface. http:\/\/www.ibm.com\/developerworks\/cn\/java\/j-lo-jpda4\/"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] V. \u0160or and S.N. Srirama, \u201cMemory leak detection in Java: Taxonomy and classification of approaches,\u201d J. Systems and Software, 2014.","DOI":"10.1016\/j.jss.2014.06.005"},{"key":"24","unstructured":"[24] ArgoUML. http:\/\/argouml.tigris.org\/"},{"key":"25","unstructured":"[25] EclEmma. http:\/\/eclemma.org\/"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] S.M. Blackburn, R. Garner, C. Hoffmann, A.M. Khang, K.S. McKinley, R. Bentzur, et al., \u201cThe DaCapo benchmarks: Java benchmarking development and analysis,\u201d ACM SIGPLAN Notices, vol.41, no.1, pp.169-190, 2006.","DOI":"10.1145\/1167515.1167488"},{"key":"27","unstructured":"[27] JFlex. http:\/\/sourceforge.net\/projects\/jflex\/"},{"key":"28","unstructured":"[28] Portecle. http:\/\/sourceforge.net\/projects\/portecle\/"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] K. Chen and J. Chen, \u201cAspect-based instrumentation for locating memory leaks in java programs,\u201d Proc. Computer Software and Applications Conference, pp.23-28, Beijing, China, July 2007.","DOI":"10.1109\/COMPSAC.2007.79"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] G. Xu, M.D. Bond, F. Qin, and A. Rountev, \u201cLeakChaser: helping programmers narrow down causes of memory leaks,\u201d ACM SIGPLAN Notices, vol.46, no.6, pp.270-282, 2011.","DOI":"10.1145\/1993316.1993530"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E98.D\/5\/E98.D_2014EDP7320\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T11:08:17Z","timestamp":1566644897000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E98.D\/5\/E98.D_2014EDP7320\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2014edp7320","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}