{"id":"https://openalex.org/W2032997497","doi":"https://doi.org/10.1145/1168054.1168069","title":"Heap protection for Java virtual machines","display_name":"Heap protection for Java virtual machines","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W2032997497","doi":"https://doi.org/10.1145/1168054.1168069","mag":"2032997497"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1168054.1168069","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030352514","display_name":"Yuji Chiba","orcid":null},"institutions":[],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yuji Chiba","raw_affiliation_strings":["Systems Development Laboratory, Ozenji, Asao, Kawasaki, Kanagawa, Japan"],"affiliations":[{"raw_affiliation_string":"Systems Development Laboratory, Ozenji, Asao, Kawasaki, Kanagawa, Japan","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":0,"corresponding_author_ids":["https://openalex.org/A5030352514"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.417,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.518776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":79,"max":80},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.7844019},{"id":"https://openalex.org/keywords/exception-handling","display_name":"Exception handling","score":0.4564597}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.86426747},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.7844019},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.7713646},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6973151},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.51732326},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.51332873},{"id":"https://openalex.org/C145428669","wikidata":"https://www.wikidata.org/wiki/Q471748","display_name":"Exception handling","level":2,"score":0.4564597}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1168054.1168069","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1499965119","https://openalex.org/W1499992849","https://openalex.org/W1501130552","https://openalex.org/W1560840983","https://openalex.org/W1973326708","https://openalex.org/W2004559305","https://openalex.org/W2036790532","https://openalex.org/W2041745533","https://openalex.org/W2051049607","https://openalex.org/W2055578361","https://openalex.org/W2082111032","https://openalex.org/W2104764555","https://openalex.org/W2107082099","https://openalex.org/W2113350481","https://openalex.org/W2137622193","https://openalex.org/W2140611647","https://openalex.org/W2144977275","https://openalex.org/W2146528747","https://openalex.org/W2521923940"],"related_works":["https://openalex.org/W4248174414","https://openalex.org/W3124171372","https://openalex.org/W2976854232","https://openalex.org/W2943837643","https://openalex.org/W2931307517","https://openalex.org/W2622620488","https://openalex.org/W2404093817","https://openalex.org/W2396685351","https://openalex.org/W2235294519","https://openalex.org/W2075174112"],"abstract_inverted_index":{"Java":[0,51],"virtual":[1],"machine":[2],"(JVM)":[3],"crashes":[4],"are":[5],"often":[6],"due":[7],"to":[8,13,75,95,125],"an":[9,147],"invalid":[10,23],"memory":[11],"reference":[12,24],"the":[14,18,22,38,42,58,76,82,96,102,112,115,122,127,130,133,150],"JVM":[15,39,77,83,97],"heap.":[16,78],"Before":[17],"bug":[19,131],"that":[20,67],"caused":[21],"can":[25,34],"be":[26,31,35],"fixed,":[27],"its":[28],"location":[29,113,128],"must":[30],"identified.":[32],"It":[33],"in":[36,46,132],"either":[37],"implementation":[40],"or":[41],"native":[43,71,86,91,134],"library":[44],"written":[45],"C":[47],"language":[48],"invoked":[49],"from":[50,73],"applications.":[52],"To":[53],"help":[54],"system":[55,123],"engineers":[56],"identify":[57,126],"location,":[59],"we":[60],"implemented":[61],"a":[62,106],"feature":[63,80,142],"using":[64,140,149],"page":[65],"protection":[66],"prevents":[68],"threads":[69],"executing":[70],"methods":[72],"referring":[74],"This":[79,120],"protects":[81],"heap":[84,98],"during":[85],"method":[87,92],"execution,":[88],"and":[89,109,153],"when":[90],"execution":[93,103],"refers":[94],"invalidly,":[99],"it":[100],"interrupts":[101],"by":[104],"generating":[105],"page-fault":[107,116],"exception":[108,117],"then":[110],"reports":[111],"where":[114],"was":[118],"generated.":[119],"helps":[121],"engineer":[124],"of":[129],"library.":[135],"The":[136],"runtime":[137],"overhead":[138],"for":[139],"this":[141],"averaged":[143],"4.4%":[144],"based":[145],"on":[146],"estimation":[148],"SPECjvm98,":[151],"SPECjbb2000,":[152],"JFCMark":[154],"benchmark":[155],"suites.":[156]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2032997497","counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-10T20:04:38.284812","created_date":"2016-06-24"}