{"id":"https://openalex.org/W2157579724","doi":"https://doi.org/10.1145/2491509.2491511","title":"Precise memory leak detection for java software using container profiling","display_name":"Precise memory leak detection for java software using container profiling","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2157579724","doi":"https://doi.org/10.1145/2491509.2491511","mag":"2157579724"},"language":"en","primary_location":{"id":"doi:10.1145/2491509.2491511","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2491509.2491511","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2491509.2491511","source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/2491509.2491511","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101967307","display_name":"Guoqing Xu","orcid":"https://orcid.org/0000-0003-4737-2146"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Guoqing Xu","raw_affiliation_strings":["University of California, Irvine, CA"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, CA","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039624297","display_name":"Atanas Rountev","orcid":"https://orcid.org/0000-0003-4556-4937"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Atanas Rountev","raw_affiliation_strings":["Ohio State University, OH"],"affiliations":[{"raw_affiliation_string":"Ohio State University, OH","institution_ids":["https://openalex.org/I52357470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101967307"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":2.262,"has_fulltext":true,"cited_by_count":29,"citation_normalized_percentile":{"value":0.89837666,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"22","issue":"3","first_page":"1","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.890068769454956},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.871587872505188},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.6753939986228943},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6470489501953125},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.5786964893341064},{"id":"https://openalex.org/keywords/container","display_name":"Container (type theory)","score":0.4953993558883667},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.49427103996276855},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.4578621983528137},{"id":"https://openalex.org/keywords/leak","display_name":"Leak","score":0.4398253560066223},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.426616907119751},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3685603737831116},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3364362120628357},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.2366948425769806},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.11404365301132202}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.890068769454956},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.871587872505188},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.6753939986228943},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6470489501953125},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.5786964893341064},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.4953993558883667},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.49427103996276855},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.4578621983528137},{"id":"https://openalex.org/C2780378346","wikidata":"https://www.wikidata.org/wiki/Q1349983","display_name":"Leak","level":2,"score":0.4398253560066223},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.426616907119751},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3685603737831116},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3364362120628357},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.2366948425769806},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.11404365301132202},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2491509.2491511","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2491509.2491511","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2491509.2491511","source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/2491509.2491511","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2491509.2491511","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/2491509.2491511","source":{"id":"https://openalex.org/S142627899","display_name":"ACM Transactions on Software Engineering and Methodology","issn_l":"1049-331X","issn":["1049-331X","1557-7392"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Software Engineering and Methodology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2209364217","display_name":"SHF: Small: Algorithms for Dynamic Analysis of Run-Time Bloat","funder_award_id":"1017204","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G265497205","display_name":null,"funder_award_id":"CCF-0546040, CCF-1017204","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"},{"id":"https://openalex.org/G6671297155","display_name":null,"funder_award_id":"CAREER","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G810896834","display_name":"CAREER: Dataflow Analysis for Modern Software Systems","funder_award_id":"0546040","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307762","display_name":"International Business Machines Corporation","ror":"https://ror.org/05hh8d621"},{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2157579724.pdf","grobid_xml":"https://content.openalex.org/works/W2157579724.grobid-xml"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W54833955","https://openalex.org/W1510358061","https://openalex.org/W1536265389","https://openalex.org/W1537003042","https://openalex.org/W1554164734","https://openalex.org/W1574879889","https://openalex.org/W1576911972","https://openalex.org/W1598245396","https://openalex.org/W1990535818","https://openalex.org/W1991546210","https://openalex.org/W2000100269","https://openalex.org/W2001799599","https://openalex.org/W2012886500","https://openalex.org/W2014530617","https://openalex.org/W2068880428","https://openalex.org/W2069568053","https://openalex.org/W2072754671","https://openalex.org/W2082827821","https://openalex.org/W2098809490","https://openalex.org/W2098883184","https://openalex.org/W2101857770","https://openalex.org/W2102674270","https://openalex.org/W2105204977","https://openalex.org/W2108867943","https://openalex.org/W2119424404","https://openalex.org/W2121094954","https://openalex.org/W2124770494","https://openalex.org/W2126952942","https://openalex.org/W2128835824","https://openalex.org/W2131734025","https://openalex.org/W2133638476","https://openalex.org/W2133802223","https://openalex.org/W2135275954","https://openalex.org/W2138369269","https://openalex.org/W2154843497","https://openalex.org/W2157432684","https://openalex.org/W2158767818","https://openalex.org/W2166140339","https://openalex.org/W2170927924","https://openalex.org/W2272202644","https://openalex.org/W2278011425","https://openalex.org/W4237257431","https://openalex.org/W4244800399","https://openalex.org/W4251369193","https://openalex.org/W4388920325"],"related_works":["https://openalex.org/W1537002606","https://openalex.org/W4226215696","https://openalex.org/W4307888121","https://openalex.org/W4224692222","https://openalex.org/W2072754671","https://openalex.org/W4247959794","https://openalex.org/W2119424404","https://openalex.org/W2749562936","https://openalex.org/W3163325258","https://openalex.org/W2245715030"],"abstract_inverted_index":{"A":[0],"memory":[1,76,151],"leak":[2,38,215],"in":[3,78,195,208],"a":[4,65,139,147,192],"Java":[5,79],"program":[6],"occurs":[7],"when":[8],"object":[9],"references":[10,93,117],"that":[11,51,74,91,174,214],"are":[12,16,21,52],"no":[13],"longer":[14],"needed":[15],"unnecessarily":[17],"maintained.":[18],"Such":[19],"leaks":[20,77,114],"difficult":[22],"to":[23,55,83,89,94,118],"detect":[24],"because":[25],"static":[26],"analysis":[27],"typically":[28],"cannot":[29],"precisely":[30],"identify":[31],"these":[32],"redundant":[33],"references,":[34],"and":[35,42,57,112,126,134,153,198],"existing":[36],"dynamic":[37],"detection":[39],"tools":[40],"track":[41],"report":[43],"fine-grained":[44],"information":[45],"about":[46],"individual":[47],"objects,":[48,120],"producing":[49],"results":[50,172],"usually":[53],"hard":[54],"interpret":[56],"lack":[58],"precision.":[59],"In":[60],"this":[61],"article":[62],"we":[63],"introduce":[64],"novel":[66],"container-based":[67],"heap-tracking":[68],"technique,":[69],"based":[70,145],"on":[71,146],"the":[72,101,121,129,132,136,175,179,205,209,212],"fact":[73],"many":[75],"programs":[80],"occur":[81],"due":[82],"incorrect":[84],"uses":[85],"of":[86,100,108,131,149],"containers,":[87],"leading":[88],"containers":[90,125,207,213],"keep":[92],"unused":[95,119],"data":[96],"entries.":[97],"The":[98],"novelty":[99],"described":[102],"work":[103],"is":[104],"twofold:":[105],"(1)":[106],"instead":[107],"tracking":[109],"arbitrary":[110],"objects":[111],"finding":[113],"by":[115,178,190],"analyzing":[116],"technique":[122,137,181],"tracks":[123],"only":[124],"directly":[127],"identifies":[128],"source":[130],"leak,":[133],"(2)":[135],"computes":[138],"confidence":[140],"value":[141],"for":[142,186],"each":[143],"container":[144],"combination":[148],"its":[150,154],"consumption":[152],"elements'":[155],"staleness":[156],"(time":[157],"since":[158],"last":[159],"retrieval),":[160],"while":[161],"previous":[162],"approaches":[163],"do":[164],"not":[165],"consider":[166],"such":[167],"combined":[168],"metrics.":[169],"Our":[170],"experimental":[171],"show":[173],"reports":[176,210],"generated":[177],"proposed":[180],"can":[182],"be":[183],"very":[184],"precise:":[185],"two":[187],"bugs":[188],"reported":[189],"Sun,":[191],"known":[193],"bug":[194,201],"SPECjbb":[196],"2000,":[197],"an":[199],"example":[200],"from":[202],"IBM":[203],"developerWorks,":[204],"top":[206],"include":[211],"memory.":[216]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
