{"id":"https://openalex.org/W2573147826","doi":"https://doi.org/10.1504/ijes.2017.10002587","title":"A hybrid methodology to detect memory leaks in soft real-time embedded systems software","display_name":"A hybrid methodology to detect memory leaks in soft real-time embedded systems software","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2573147826","doi":"https://doi.org/10.1504/ijes.2017.10002587","mag":"2573147826"},"language":"en","primary_location":{"id":"doi:10.1504/ijes.2017.10002587","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijes.2017.10002587","pdf_url":null,"source":{"id":"https://openalex.org/S204369148","display_name":"International Journal of Embedded Systems","issn_l":"1741-1068","issn":["1741-1068","1741-1076"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112207434","display_name":"Franz J. Rammig","orcid":null},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Franz Josef Rammig","raw_affiliation_strings":["Heinz Nixdorf Institute, University of Paderborn, F\u00fcrstenallee 11, 33102 Paderborn, Germany"],"affiliations":[{"raw_affiliation_string":"Heinz Nixdorf Institute, University of Paderborn, F\u00fcrstenallee 11, 33102 Paderborn, Germany","institution_ids":["https://openalex.org/I206945453"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062446836","display_name":"Mabel Mary Joy","orcid":null},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mabel Mary Joy","raw_affiliation_strings":["C-Lab, University of Paderborn, F\u00fcrstenallee 11, 33102 Paderborn, Germany"],"affiliations":[{"raw_affiliation_string":"C-Lab, University of Paderborn, F\u00fcrstenallee 11, 33102 Paderborn, Germany","institution_ids":["https://openalex.org/I206945453"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112207434"],"corresponding_institution_ids":["https://openalex.org/I206945453"],"apc_list":null,"apc_paid":null,"fwci":0.4836,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70648636,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9","issue":"1","first_page":"61","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.818383514881134},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.7863092422485352},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5614482164382935},{"id":"https://openalex.org/keywords/embedded-software","display_name":"Embedded software","score":0.48717445135116577},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4754890203475952},{"id":"https://openalex.org/keywords/leak","display_name":"Leak","score":0.46379926800727844},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.42220473289489746},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.3192853331565857},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2438010275363922},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.1553921103477478},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09089848399162292}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.818383514881134},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.7863092422485352},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5614482164382935},{"id":"https://openalex.org/C154488198","wikidata":"https://www.wikidata.org/wiki/Q1335007","display_name":"Embedded software","level":3,"score":0.48717445135116577},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4754890203475952},{"id":"https://openalex.org/C2780378346","wikidata":"https://www.wikidata.org/wiki/Q1349983","display_name":"Leak","level":2,"score":0.46379926800727844},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.42220473289489746},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.3192853331565857},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2438010275363922},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.1553921103477478},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09089848399162292},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijes.2017.10002587","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijes.2017.10002587","pdf_url":null,"source":{"id":"https://openalex.org/S204369148","display_name":"International Journal of Embedded Systems","issn_l":"1741-1068","issn":["1741-1068","1741-1076"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Embedded Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2182829270","https://openalex.org/W4384948881","https://openalex.org/W2064228006","https://openalex.org/W2355497386","https://openalex.org/W2592247214","https://openalex.org/W2104098106","https://openalex.org/W2165063050","https://openalex.org/W2533131237","https://openalex.org/W2158767818","https://openalex.org/W2304927939"],"abstract_inverted_index":{"As":[0],"embedded":[1,34,50],"software":[2,19,35],"becomes":[3],"complex":[4],"and":[5,57,80,124,135],"time":[6],"to":[7,10,60],"production":[8],"needs":[9],"be":[11],"minimized,":[12],"early":[13,126],"fixing":[14],"of":[15,76,89],"flaws":[16],"in":[17,33,96,112],"a":[18,39],"design":[20],"is":[21,132,140],"important.":[22],"Memory":[23],"leaks":[24,103],"are":[25,104],"the":[26,74,107,113],"most":[27],"important":[28],"memory-related":[29],"problems":[30],"commonly":[31],"occurring":[32],"development.":[36],"We":[37],"propose":[38],"novel":[40],"hybrid":[41],"automated":[42],"memory":[43,70,91,99],"leak":[44,71,109,128],"detection":[45],"approach":[46,54,122,131],"for":[47],"soft":[48],"real-time":[49],"system":[51],"software.":[52],"Our":[53,130],"combines":[55],"static":[56,66,114],"dynamic":[58,85,117],"methodologies":[59],"overcome":[61],"their":[62],"individual":[63],"limitations.":[64],"The":[65,84,116],"phase":[67,86,119,127],"generates":[68],"potential":[69,108],"warnings":[72,110],"with":[73,93],"help":[75],"source":[77],"code":[78],"annotation":[79],"control":[81],"flow":[82],"graphs.":[83],"involves":[87],"simulation":[88,118],"abstracted":[90],"behaviour":[92],"data":[94],"collected":[95],"an":[97],"abstract":[98],"model":[100],"(AMM).":[101],"Actual":[102],"determined":[105],"from":[106],"generated":[111],"phase.":[115],"makes":[120],"our":[121],"faster":[123],"enables":[125],"detection.":[129],"platform":[133],"independent":[134],"evaluation":[136],"shows":[137],"that":[138],"it":[139],"more":[141],"accurate":[142],"than":[143],"existing":[144],"tools.":[145]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
