{"id":"https://openalex.org/W2093735156","doi":"https://doi.org/10.1587/transinf.2014edp7320","title":"A Detection and Measurement Approach for Memory Leaked Objects in Java Programs","display_name":"A Detection and Measurement Approach for Memory Leaked Objects in Java Programs","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2093735156","doi":"https://doi.org/10.1587/transinf.2014edp7320","mag":"2093735156"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.2014edp7320","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2014edp7320","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E98.D/5/E98.D_2014EDP7320/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E98.D/5/E98.D_2014EDP7320/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100748135","display_name":"Yu Qiao","orcid":"https://orcid.org/0000-0002-1889-2567"},"institutions":[{"id":"https://openalex.org/I25757504","display_name":"China University of Mining and Technology","ror":"https://ror.org/01xt2dr21","country_code":"CN","type":"education","lineage":["https://openalex.org/I25757504"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiao YU","raw_affiliation_strings":["School of Computer Science and Technology, China University of Mining and Technology"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, China University of Mining and Technology","institution_ids":["https://openalex.org/I25757504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002351235","display_name":"Shujuan Jiang","orcid":"https://orcid.org/0000-0003-0643-0565"},"institutions":[{"id":"https://openalex.org/I25757504","display_name":"China University of Mining and Technology","ror":"https://ror.org/01xt2dr21","country_code":"CN","type":"education","lineage":["https://openalex.org/I25757504"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shujuan JIANG","raw_affiliation_strings":["School of Computer Science and Technology, China University of Mining and Technology"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, China University of Mining and Technology","institution_ids":["https://openalex.org/I25757504"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080886129","display_name":"Yingqi Liu","orcid":"https://orcid.org/0000-0002-8312-0088"},"institutions":[{"id":"https://openalex.org/I25757504","display_name":"China University of Mining and Technology","ror":"https://ror.org/01xt2dr21","country_code":"CN","type":"education","lineage":["https://openalex.org/I25757504"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingqi LIU","raw_affiliation_strings":["School of Computer Science and Technology, China University of Mining and Technology"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, China University of Mining and Technology","institution_ids":["https://openalex.org/I25757504"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100748135"],"corresponding_institution_ids":["https://openalex.org/I25757504"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05110183,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"E98.D","issue":"5","first_page":"1053","last_page":"1061"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9095988273620605},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.8114278316497803},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.7584246397018433},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.5453062653541565},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.47737929224967957},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.44828641414642334},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.44471102952957153},{"id":"https://openalex.org/keywords/crash","display_name":"Crash","score":0.4258239269256592},{"id":"https://openalex.org/keywords/c-dynamic-memory-allocation","display_name":"C dynamic memory allocation","score":0.42433232069015503},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4231509566307068},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.4171912670135498},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.3046714663505554},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.276973694562912},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.10899043083190918},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.08686083555221558}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9095988273620605},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.8114278316497803},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.7584246397018433},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5453062653541565},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.47737929224967957},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.44828641414642334},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.44471102952957153},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.4258239269256592},{"id":"https://openalex.org/C34339311","wikidata":"https://www.wikidata.org/wiki/Q1050390","display_name":"C dynamic memory allocation","level":4,"score":0.42433232069015503},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4231509566307068},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.4171912670135498},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.3046714663505554},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.276973694562912},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.10899043083190918},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.08686083555221558},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transinf.2014edp7320","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2014edp7320","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E98.D/5/E98.D_2014EDP7320/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transinf.2014edp7320","is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2014edp7320","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E98.D/5/E98.D_2014EDP7320/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1365067464","display_name":null,"funder_award_id":"60970032","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5134658887","display_name":null,"funder_award_id":"6097003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2093735156.pdf","grobid_xml":"https://content.openalex.org/works/W2093735156.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1510358061","https://openalex.org/W1574130313","https://openalex.org/W1992841501","https://openalex.org/W1996284269","https://openalex.org/W1996567876","https://openalex.org/W1999947813","https://openalex.org/W2000100269","https://openalex.org/W2050801173","https://openalex.org/W2072754671","https://openalex.org/W2076539532","https://openalex.org/W2102674270","https://openalex.org/W2105204977","https://openalex.org/W2120462664","https://openalex.org/W2122901253","https://openalex.org/W2129181700","https://openalex.org/W2145106894","https://openalex.org/W2148746214","https://openalex.org/W2154843497","https://openalex.org/W2166091242","https://openalex.org/W2166140339","https://openalex.org/W2166542330","https://openalex.org/W2171282711","https://openalex.org/W3005566493","https://openalex.org/W3114516458","https://openalex.org/W4232334241","https://openalex.org/W4237741282","https://openalex.org/W4241798402","https://openalex.org/W4245569013","https://openalex.org/W4247959794","https://openalex.org/W4251586031"],"related_works":["https://openalex.org/W2182829270","https://openalex.org/W2944895246","https://openalex.org/W2374095026","https://openalex.org/W2097849646","https://openalex.org/W2748018445","https://openalex.org/W1981015239","https://openalex.org/W2136651729","https://openalex.org/W4251791943","https://openalex.org/W2010367507","https://openalex.org/W2401488962"],"abstract_inverted_index":{"Memory":[0,16],"leak":[1],"occurs":[2],"when":[3,33],"useless":[4],"objects":[5,18,49,84,134],"cannot":[6],"be":[7],"released":[8],"for":[9,43],"a":[10,40],"long":[11],"time":[12,114],"during":[13],"program":[14,58],"execution.":[15],"leaked":[17,48,70,133],"may":[19],"cause":[20,28],"memory":[21,47,75,132],"overflow,":[22],"system":[23,30],"performance":[24],"degradation":[25],"and":[26,45,61,130],"even":[27],"the":[29,57,68,80,86,96,113],"to":[31,65,78,94,111,128],"crash":[32],"they":[34],"become":[35],"serious.":[36],"This":[37],"paper":[38],"presents":[39],"dynamic":[41],"approach":[42,55,125],"detecting":[44],"measuring":[46],"in":[50],"Java":[51],"programs.":[52],"First,":[53],"our":[54,99,117,124],"tracks":[56],"by":[59],"JDI":[60],"records":[62],"heap":[63],"information":[64],"find":[66],"out":[67],"potentially":[69],"objects.":[71],"Second,":[72],"we":[73,89,102],"present":[74],"leaking":[76],"confidence":[77],"measure":[79,131],"influence":[81],"of":[82,98,116],"these":[83],"on":[85],"program.":[87],"Finally,":[88],"select":[90],"three":[91],"open-source":[92],"programs":[93,105],"evaluate":[95],"efficiency":[97],"approach.":[100,118],"Furthermore,":[101],"choose":[103],"ten":[104],"from":[106],"DaCapo":[107],"9.12":[108],"benchmark":[109],"suite":[110],"reveal":[112],"overhead":[115],"The":[119],"experimental":[120],"results":[121],"show":[122],"that":[123],"is":[126],"able":[127],"detect":[129],"efficiently.":[135]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
