iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3453933.3454021
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:25:47Z","timestamp":1725794747465},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Science Foundation","award":["1908313"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,16]]},"DOI":"10.1145\/3453933.3454021","type":"proceedings-article","created":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T05:33:57Z","timestamp":1617860037000},"page":"153-164","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Automated bug localization in JIT compilers"],"prefix":"10.1145","author":[{"given":"HeuiChan","family":"Lim","sequence":"first","affiliation":[{"name":"University of Arizona, USA"}]},{"given":"Saumya","family":"Debray","sequence":"additional","affiliation":[{"name":"University of Arizona, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Mohammed Aboullaite. 2017. Understanding JIT compiler (just-in-time compiler). https:\/\/aboullaite.me \/understanding-jit-compiler-just-intime-compiler\/ Mohammed Aboullaite. 2017. Understanding JIT compiler (just-in-time compiler). https:\/\/aboullaite.me \/understanding-jit-compiler-just-intime-compiler\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/249069.231388"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/143095.143108"},{"key":"e_1_3_2_1_4_1","unstructured":"bugs.chromium.org. 2016. Issue 5129: Turbofan changes ? < 0 to < which is not equivalent when ( ? ) overflows. https:\/\/bugs.chromium.org\/p\/v8\/issues\/detail?id= 5129 bugs.chromium.org. 2016. Issue 5129: Turbofan changes ? < 0 to < which is not equivalent when ( ? ) overflows. https:\/\/bugs.chromium.org\/p\/v8\/issues\/detail?id= 5129"},{"key":"e_1_3_2_1_5_1","unstructured":"bugs.chromium.org. 2018. Issue 8056 : [turbofan] Optimized Array#indexOf and Array#includes ignore a prototype that is not initial. https:\/\/bugs.chromium.org\/p\/v8\/issues\/detail?id= 8056 bugs.chromium.org. 2018. Issue 8056 : [turbofan] Optimized Array#indexOf and Array#includes ignore a prototype that is not initial. https:\/\/bugs.chromium.org\/p\/v8\/issues\/detail?id= 8056"},{"key":"e_1_3_2_1_6_1","unstructured":"bugs.chromium.org. 2019. Issue 961237: Security: jit diference on comparison in d8. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/ detail?id= 961237 bugs.chromium.org. 2019. Issue 961237: Security: jit diference on comparison in d8. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/ detail?id= 961237"},{"key":"e_1_3_2_1_7_1","unstructured":"bugs.chromium.org. 2020. Issue 1072171: Security: missing the-0 case when intersecting and computing the Type::Range in NumberMax. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id= 1072171 bugs.chromium.org. 2020. Issue 1072171: Security: missing the-0 case when intersecting and computing the Type::Range in NumberMax. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id= 1072171"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070506"},{"key":"e_1_3_2_1_9_1","unstructured":"Adam C. Conrad. 2018. How JavaScript Engines Work. https:\/\/adamconrad.dev\/blog\/how-javascript-engines-work Adam C. Conrad. 2018. How JavaScript Engines Work. https:\/\/adamconrad.dev\/blog\/how-javascript-engines-work"},{"key":"e_1_3_2_1_10_1","unstructured":"Max Copperman. 1992. Debugging Optimized Code Without Being Misled. Max Copperman. 1992. Debugging Optimized Code Without Being Misled."},{"key":"e_1_3_2_1_11_1","unstructured":"Apple developers. [n.d.]. JavaScriptCore. https:\/\/developer.apple.com\/ documentation\/javascriptcore Apple developers. [n.d.]. JavaScriptCore. https:\/\/developer.apple.com\/ documentation\/javascriptcore"},{"key":"e_1_3_2_1_12_1","unstructured":"Google V8 developers. [n.d.]. V8. https:\/\/v8.dev\/ Google V8 developers. [n.d.]. V8. https:\/\/v8.dev\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Microsoft Chakra developers. [n.d.]. ChakraCore. https:\/\/github.com\/ chakra-core\/ChakraCore Microsoft Chakra developers. [n.d.]. ChakraCore. https:\/\/github.com\/ chakra-core\/ChakraCore"},{"key":"e_1_3_2_1_14_1","unstructured":"JS Foundation. [n.d.]. esprima-python. https:\/\/github.com\/Kronuz\/ esprima-python JS Foundation. [n.d.]. esprima-python. https:\/\/github.com\/Kronuz\/ esprima-python"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"e_1_3_2_1_16_1","unstructured":"Franziska Hinkelmann. 2017. Understanding V8's Bytecode. https:\/\/medium.com\/dailyjs\/understanding-v8s-bytecode-317d46c94775 Franziska Hinkelmann. 2017. Understanding V8's Bytecode. https:\/\/medium.com\/dailyjs\/understanding-v8s-bytecode-317d46c94775"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Urs Holzle. 1992. Debugging optimized code with dynamic deoptimization. ACM Sigplan Notices 27 ( 1992 ). Issue 7. Urs Holzle. 1992. Debugging optimized code with dynamic deoptimization. ACM Sigplan Notices 27 ( 1992 ). Issue 7.","DOI":"10.1145\/143103.143114"},{"key":"e_1_3_2_1_18_1","unstructured":"Fedor Indutny. 2015. Sea of Nodes. https:\/\/darksi.de\/d.sea-of-nodes\/ Fedor Indutny. 2015. Sea of Nodes. https:\/\/darksi.de\/d.sea-of-nodes\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Intel Corp. [n.d.]. Intel XED. https:\/\/intelxed.github.io. Intel Corp. [n.d.]. Intel XED. https:\/\/intelxed.github.io."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321660"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869481"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.24"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Ben Liblit Alex Aiken Alice X Zheng and Michael I Jordan. 2003. Bug isolation via remote program sampling. ACM Sigplan Notices 38 5 ( 2003 ) 141-154. Ben Liblit Alex Aiken Alice X Zheng and Michael I Jordan. 2003. Bug isolation via remote program sampling. ACM Sigplan Notices 38 5 ( 2003 ) 141-154.","DOI":"10.1145\/780822.781148"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Ben Liblit Mayur Naik Alice X Zheng Alex Aiken and Michael I Jordan. 2005. Scalable statistical bug isolation. Acm Sigplan Notices 40 6 ( 2005 ) 15-26. Ben Liblit Mayur Naik Alice X Zheng Alex Aiken and Michael I Jordan. 2005. Scalable statistical bug isolation. Acm Sigplan Notices 40 6 ( 2005 ) 15-26.","DOI":"10.1145\/1064978.1065014"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Chao Liu Xifeng Yan Long Fei Jiawei Han and Samuel P Midkif. 2005. SOBER: statistical model-based bug localization. ACM SIGSOFT Software Engineering Notes 30 5 ( 2005 ) 286-295. Chao Liu Xifeng Yan Long Fei Jiawei Han and Samuel P Midkif. 2005. SOBER: statistical model-based bug localization. ACM SIGSOFT Software Engineering Notes 30 5 ( 2005 ) 286-295.","DOI":"10.1145\/1095430.1081753"},{"key":"e_1_3_2_1_27_1","unstructured":"lokihardt. 2017. Issue 791245: Security: V8: JIT: Simplified-lowererer IrOpcode::kStoreField IrOpcode::kStoreElement optimization bug. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id= 791245 lokihardt. 2017. Issue 791245: Security: V8: JIT: Simplified-lowererer IrOpcode::kStoreField IrOpcode::kStoreElement optimization bug. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id= 791245"},{"first-page":"190","volume-title":"Proc. ACM Conference on Programming Language Design and Implementation (PLDI)","author":"Luk C.-K.","key":"e_1_3_2_1_28_1","unstructured":"C.-K. Luk , R. Cohn , R. Muth , H. Patil , A. Klauser , G. Lowney , S. Wallace , V. J. Reddi , and K. Hazelwood . 2005. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation . In Proc. ACM Conference on Programming Language Design and Implementation (PLDI) . Chicago, IL , 190 - 200 . C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. 2005. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In Proc. ACM Conference on Programming Language Design and Implementation (PLDI). Chicago, IL, 190-200."},{"volume-title":"Etzkorn","year":"2010","author":"Lukins Stacy K.","key":"e_1_3_2_1_29_1","unstructured":"Stacy K. Lukins , Nicholas A. Kraft , and Letha H . Etzkorn . 2010 . Bug localization using latent Dirichlet allocation. Information and Software Technology 52, 9 ( 2010 ), 972-990. Stacy K. Lukins, Nicholas A. Kraft, and Letha H. Etzkorn. 2010. Bug localization using latent Dirichlet allocation. Information and Software Technology 52, 9 ( 2010 ), 972-990."},{"key":"e_1_3_2_1_30_1","unstructured":"Benedikt Meurer. 2017. An Introduction to Speculative Optimization in V8. https:\/\/ponyfoo.com \/articles\/an-introduction-to-speculativeoptimization-in-v8 Benedikt Meurer. 2017. An Introduction to Speculative Optimization in V8. https:\/\/ponyfoo.com \/articles\/an-introduction-to-speculativeoptimization-in-v8"},{"key":"e_1_3_2_1_31_1","unstructured":"Mozilla. [n.d.]. SpiderMonkey: The Mozilla JavaScript runtime. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/SpiderMonkey Mozilla. [n.d.]. SpiderMonkey: The Mozilla JavaScript runtime. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Projects\/SpiderMonkey"},{"volume-title":"Mohammed Atiquzzaman, and Shutao Xia.","year":"2020","author":"Peng Zhendong","key":"e_1_3_2_1_32_1","unstructured":"Zhendong Peng , Xi Xiao , Guangwu Hu , Arun Kumar Sangaiah , Mohammed Atiquzzaman, and Shutao Xia. 2020 . ABFL : An autoencoder based practical approach for software fault localization. Information Sciences 510 ( 2020 ), 108-121. Zhendong Peng, Xi Xiao, Guangwu Hu, Arun Kumar Sangaiah, Mohammed Atiquzzaman, and Shutao Xia. 2020. ABFL: An autoencoder based practical approach for software fault localization. Information Sciences 510 ( 2020 ), 108-121."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3345629.3345632"},{"key":"e_1_3_2_1_34_1","unstructured":"Jordan Rabet. 2017. Browser security beyond sandboxing. Microsoft Windows Defender Research. https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/ 10\/18\/browser-security-beyond-sandboxing. Jordan Rabet. 2017. Browser security beyond sandboxing. Microsoft Windows Defender Research. https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/ 10\/18\/browser-security-beyond-sandboxing."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_2_1_36_1","unstructured":"Jaroslav Sevcik. 2016. Deoptimization in V8. https:\/\/docs.google. com\/presentation\/d\/1Z6oCocRASCf TqGq1GCo1jbULDGS-wnzxkbVF7Up0u0\/htmlpresent Jaroslav Sevcik. 2016. Deoptimization in V8. https:\/\/docs.google. com\/presentation\/d\/1Z6oCocRASCf TqGq1GCo1jbULDGS-wnzxkbVF7Up0u0\/htmlpresent"},{"volume-title":"Virtual machines: versatile platforms for systems and processes","author":"Smith Jim","key":"e_1_3_2_1_37_1","unstructured":"Jim Smith and Ravi Nair . 2005. Virtual machines: versatile platforms for systems and processes . Elsevier . Jim Smith and Ravi Nair. 2005. Virtual machines: versatile platforms for systems and processes. Elsevier."},{"key":"e_1_3_2_1_38_1","unstructured":"Yusuke Suzuki. [n.d.]. Edcodegen. https:\/\/github.com\/estools\/ escodegen Yusuke Suzuki. [n.d.]. Edcodegen. https:\/\/github.com\/estools\/ escodegen"},{"volume-title":"Proceedings of ACM SIGPLAN Workshop on Program Analysis for Software Tools and Engineering. ACM.","author":"Tice Caroline","key":"e_1_3_2_1_39_1","unstructured":"Caroline Tice and Susan L. Graham . 1998. OPTVIEW: A New Approach for Examining Optimized Code . In Proceedings of ACM SIGPLAN Workshop on Program Analysis for Software Tools and Engineering. ACM. Caroline Tice and Susan L. Graham. 1998. OPTVIEW: A New Approach for Examining Optimized Code. In Proceedings of ACM SIGPLAN Workshop on Program Analysis for Software Tools and Engineering. ACM."},{"key":"e_1_3_2_1_40_1","unstructured":"Ben L. Titzer. 2015. Digging into the TurboFan JIT. https:\/\/v8.dev\/blog\/turbofan-jit. Ben L. Titzer. 2015. Digging into the TurboFan JIT. https:\/\/v8.dev\/blog\/turbofan-jit."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3374005"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591099"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337226"}],"event":{"name":"VEE '21: 17th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Virtual USA","acronym":"VEE '21"},"container-title":["Proceedings of the 17th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3453933.3454021","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3453933.3454021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T21:43:56Z","timestamp":1673473436000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453933.3454021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":42,"alternative-id":["10.1145\/3453933.3454021","10.1145\/3453933"],"URL":"https:\/\/doi.org\/10.1145\/3453933.3454021","relation":{},"subject":[],"published":{"date-parts":[[2021,4,7]]},"assertion":[{"value":"2021-04-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}