with the number of bytes that would be reclaimed. It is up to you to check if the presented objects are still needed by the application, and how the critical references should be removed.

Using Heuristics to Locate Possible Hot Spots

79