iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1002/SPE.600
{"id":"https://openalex.org/W2148659619","doi":"https://doi.org/10.1002/spe.600","title":"The implementation of generic smart pointers for advanced defensive programming","display_name":"The implementation of generic smart pointers for advanced defensive programming","publication_year":2004,"publication_date":"2004-05-21","ids":{"openalex":"https://openalex.org/W2148659619","doi":"https://doi.org/10.1002/spe.600","mag":"2148659619"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/spe.600","pdf_url":null,"source":{"id":"https://openalex.org/S122199241","display_name":"Software Practice and Experience","issn_l":"0038-0644","issn":["0038-0644","1097-024X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004717794","display_name":"Anthony Savidis","orcid":null},"institutions":[{"id":"https://openalex.org/I8901234","display_name":"Foundation for Research and Technology Hellas","ror":"https://ror.org/052rphn09","country_code":"GR","type":"facility","lineage":["https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Anthony Savidis","raw_affiliation_strings":["Institute of Computer Science, Foundation for Research & Technology\u2014Hellas, Heraklion, Crete, GR-71110, Greece"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science, Foundation for Research & Technology\u2014Hellas, Heraklion, Crete, GR-71110, Greece","institution_ids":["https://openalex.org/I8901234"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5004717794"],"corresponding_institution_ids":["https://openalex.org/I8901234"],"apc_list":{"value":4220,"currency":"USD","value_usd":4220,"provenance":"doaj"},"apc_paid":null,"fwci":2.022,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":9,"citation_normalized_percentile":{"value":0.855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":81},"biblio":{"volume":"34","issue":"10","first_page":"977","last_page":"1009"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Language-based Information Flow Security","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security and Vulnerability Detection","score":0.997,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Automated Software Testing Techniques","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.800924},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.6651292},{"id":"https://openalex.org/keywords/indirection","display_name":"Indirection","score":0.6108503},{"id":"https://openalex.org/keywords/pointer-analysis","display_name":"Pointer analysis","score":0.604869},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.5496177},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory Protection","score":0.510522},{"id":"https://openalex.org/keywords/macro","display_name":"Macro","score":0.48729503},{"id":"https://openalex.org/keywords/exception-handling","display_name":"Exception handling","score":0.43556973},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.4304824},{"id":"https://openalex.org/keywords/manual-memory-management","display_name":"Manual memory management","score":0.4282381}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.84049207},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.800924},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.77481955},{"id":"https://openalex.org/C105122174","wikidata":"https://www.wikidata.org/wiki/Q322202","display_name":"Garbage collection","level":3,"score":0.7258942},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.6651292},{"id":"https://openalex.org/C89377073","wikidata":"https://www.wikidata.org/wiki/Q1171224","display_name":"Indirection","level":2,"score":0.6108503},{"id":"https://openalex.org/C7263679","wikidata":"https://www.wikidata.org/wiki/Q5978076","display_name":"Pointer analysis","level":3,"score":0.604869},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5538093},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.5496177},{"id":"https://openalex.org/C75403996","wikidata":"https://www.wikidata.org/wiki/Q5521979","display_name":"Garbage","level":2,"score":0.49494213},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.48729503},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.48014897},{"id":"https://openalex.org/C34339311","wikidata":"https://www.wikidata.org/wiki/Q1050390","display_name":"C dynamic memory allocation","level":4,"score":0.47350532},{"id":"https://openalex.org/C145428669","wikidata":"https://www.wikidata.org/wiki/Q471748","display_name":"Exception handling","level":2,"score":0.43556973},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.4304824},{"id":"https://openalex.org/C82810778","wikidata":"https://www.wikidata.org/wiki/Q6752316","display_name":"Manual memory management","level":4,"score":0.4282381},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.34608147},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.3455326},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.26936543},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.18344083},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.16563594},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.15392947},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09688994}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/spe.600","pdf_url":null,"source":{"id":"https://openalex.org/S122199241","display_name":"Software Practice and Experience","issn_l":"0038-0644","issn":["0038-0644","1097-024X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":7,"referenced_works":["https://openalex.org/W153342319","https://openalex.org/W2104055277","https://openalex.org/W2163241155","https://openalex.org/W2462997721","https://openalex.org/W2561675875","https://openalex.org/W2798277317","https://openalex.org/W2994571107"],"related_works":["https://openalex.org/W2951878528","https://openalex.org/W2572740268","https://openalex.org/W2479380548","https://openalex.org/W2148659619","https://openalex.org/W2138369269","https://openalex.org/W2133680060","https://openalex.org/W2121094954","https://openalex.org/W1680603524","https://openalex.org/W16371115","https://openalex.org/W100570981"],"abstract_inverted_index":{"Abstract":[0],"Smart":[1],"pointers":[2,60,71,110,142],"denote":[3],"a":[4,35,55,88,122],"well\u2010known":[5],"technique":[6,85],"for":[7,40,59,70,91,108,126],"collective":[8],"resource":[9],"ownership,":[10],"e.g.":[11],"sharing":[12],"dynamic":[13],"object":[14],"instances,":[15],"while":[16],"usually":[17],"supporting":[18],"automatic":[19],"garbage":[20,123],"collection":[21,124,135],"based":[22],"on":[23],"reference":[24],"counting.":[25],"The":[26],"original":[27],"method":[28,39],"has":[29],"been":[30],"retargeted":[31],"to":[32,61,72,151],"serve":[33],"as":[34,67,69],"generic":[36],"defensive":[37,141],"programming":[38],"\u2018exhaustive":[41],"tracking\u2019":[42],"of":[43,120,136],"erroneous":[44],"pointer":[45],"use":[46],"in":[47,54],"C++.":[48],"Automatic":[49],"bug":[50,113],"tracking":[51],"is":[52],"supported":[53,107],"unified":[56],"manner":[57],"both":[58],"heap":[62],"memory,":[63,76],"i.e.":[64,77],"free":[65],"storage,":[66],"well":[68],"stack":[73],"or":[74,79],"global":[75],"auto":[78],"static":[80],"storage.":[81],"Overall,":[82],"the":[83],"presented":[84],"(a)":[86],"offers":[87,116],"simple":[89],"contract":[90],"memory":[92,127],"allocation":[93],"and":[94,99,130],"use;":[95],"(b)":[96],"supports":[97],"type":[98],"indirection":[100],"depth":[101],"genericity;":[102],"(c)":[103],"implements":[104],"most":[105],"operators":[106],"built\u2010in":[109],"with":[111,146],"embedded":[112],"defense;":[114],"(d)":[115],"an":[117,133,147],"alternative":[118,148],"way":[119],"employing":[121],"facility":[125],"leak":[128],"detection;":[129],"(e)":[131],"provides":[132],"appropriate":[134],"utility":[137],"macros,":[138],"through":[139],"which":[140],"should":[143],"be":[144],"used,":[145],"version":[149],"re\u2010targeted":[150],"normal":[152],"native":[153],"pointers.":[154],"Copyright":[155],"\u00a9":[156],"2004":[157],"John":[158],"Wiley":[159],"&":[160],"Sons,":[161],"Ltd.":[162]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2148659619","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2024-09-30T22:15:17.786114","created_date":"2016-06-24"}