{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:39:05Z","timestamp":1725705545354},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/icsm.2012.6405323","type":"proceedings-article","created":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T20:28:25Z","timestamp":1358454505000},"page":"571-574","source":"Crossref","is-referenced-by-count":4,"title":["Inferring weak references for fixing Java memory leaks"],"prefix":"10.1109","author":[{"given":"Ju","family":"Qian","sequence":"first","affiliation":[]},{"given":"Xiaoyu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"JVMTI","year":"0","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993530"},{"journal-title":"JProfiler","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44898-5_27"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368110"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321661"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/512429.512437"},{"journal-title":"European Conference on Object-Oriented Computing (ECOOP)","article-title":"LeakBot: An automated and lightweight tool for diagnosing memory leaks in large java applications","year":"2003","author":"mitchell","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542521"},{"journal-title":"International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","article-title":"Low-overhead memory leak detection using adaptive statistical profiling","year":"2004","author":"chilimbi","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168866"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542503"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835822"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/586088.586089"},{"journal-title":"Java Theory and Practice Plugging Memory Leaks with Weak References","year":"0","author":"goetz","key":"6"},{"key":"5","first-page":"116","article-title":"Visualizing reference patterns for solving memory leaks in java","author":"de pauw","year":"1999","journal-title":"European Conference on Object-Oriented Programming (ECOOP)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806874"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1290520.1290521"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190224"}],"event":{"name":"2012 IEEE International Conference on Software Maintenance (ICSM)","start":{"date-parts":[[2012,9,23]]},"location":"Trento, Italy","end":{"date-parts":[[2012,9,28]]}},"container-title":["2012 28th IEEE International Conference on Software Maintenance (ICSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6384336\/6404866\/06405323.pdf?arnumber=6405323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:21:03Z","timestamp":1490214063000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6405323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icsm.2012.6405323","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}