{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:31:03Z","timestamp":1729643463623,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/scam.2007.20","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T16:50:08Z","timestamp":1209401408000},"page":"91-100","source":"Crossref","is-referenced-by-count":4,"title":["Reengineering Standard Java Runtime Systems through Dynamic Bytecode Instrumentation"],"prefix":"10.1109","author":[{"given":"Walter","family":"Binder","sequence":"first","affiliation":[]},{"given":"Jarle","family":"Hulaas","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Moret","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46423-9_2"},{"journal-title":"SPEC JVM98 benchmarks","year":"0","key":"ref38"},{"journal-title":"Java Virtual Machine Profiler Interface (JVMPI)","year":"0","key":"ref33"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1145\/989393.989446","article-title":"ATOM: A system for building customized program analysis tools","volume":"39","author":"srivastava","year":"2004","journal-title":"SIGPLAN Not"},{"journal-title":"ASM","year":"0","key":"ref31"},{"journal-title":"The NetBeans Profiler Project","year":"0","key":"ref30"},{"journal-title":"SPEC JBB2005 (Java Business Benchmark)","year":"0","key":"ref37"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/3-540-45821-2_18","article-title":"Altering Java semantics via bytecode manipulation","volume":"2487","author":"tanter","year":"2002","journal-title":"Proceedings of the ACM SIGPLAN\/SIGSOFT Conference on Generative Programming and Component Engineering (GPCE 2002)"},{"key":"ref35","first-page":"57","article-title":"Using hardware performance monitors to understand the behavior of Java applications","author":"sweeney","year":"2004","journal-title":"Virtual Machine Research and Technology Symposium"},{"journal-title":"JVM Tool Interface (JVMTI)","year":"0","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/spe.712"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/337449.337483"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.28"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1173706.1173733"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2006.302745"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504293"},{"key":"ref15","first-page":"313","article-title":"Load-time structural reflection in Java","volume":"1850","author":"chiba","year":"2000","journal-title":"Proc of the 14th European Conference on Object-Oriented Programming"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1007\/978-3-540-39815-8_22","article-title":"An easy-to-use toolkit for efficient Java bytecode translators","author":"chiba","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"ref17","first-page":"167","article-title":"Automatic program transformation with JOIE","author":"cohen","year":"1998","journal-title":"1998 USENIX Annual Technical Symposium"},{"key":"ref18","article-title":"Byte code engineering","author":"dahm","year":"1999","journal-title":"Java-Information-Tage 1999 (JIT'99)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/974044.974067"},{"key":"ref28","first-page":"220","article-title":"Aspect-oriented programming","volume":"1241","author":"kiczales","year":"1997","journal-title":"Proceedings of European Conference on Object-Oriented Programming"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/183432.183527"},{"journal-title":"Open source middleware software","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378832"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2001.905166"},{"key":"ref29","first-page":"229","article-title":"Comprehensive profiling support in the Java virtual machine","author":"liang","year":"1999","journal-title":"Proceedings of the 5th USENIX Conference on Object-Oriented Technologies and Systems (COOTS-99)"},{"journal-title":"BEA Serp","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011579730296"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/258915.258924"},{"key":"ref9","first-page":"110","article-title":"Portable profiling of memory allocation in Java","volume":"p 69","author":"binder","year":"2005","journal-title":"Net Object Days 2005 (NODe 2005)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.391.0211"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/949343.949320"},{"journal-title":"Java Concurrency in Practice","year":"2006","author":"goetz","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/949344.949425"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1028998"},{"key":"ref23","article-title":"The Java Language Specification","author":"gosling","year":"2005","journal-title":"The Java Series"},{"journal-title":"Jikes Bytecode Toolkit","year":"0","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1014007.1014024"}],"event":{"name":"Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)","start":{"date-parts":[[2007,9,30]]},"location":"Paris, France","end":{"date-parts":[[2007,10,1]]}},"container-title":["Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362882\/4362883\/04362901.pdf?arnumber=4362901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:29:59Z","timestamp":1497770999000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362901\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/scam.2007.20","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}