-
2
-
-
84858088401
-
-
BEA
-
BEA. JRockit. http://dev2dev.bea.com/jrockit/.
-
JRockit
-
-
-
4
-
-
0038147962
-
Reconsidering Custom Memory Allocation
-
E. D. Berger, B. G. Zorn, and R. S. McKinley. Reconsidering Custom Memory Allocation. In Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 1-12, 2002.
-
(2002)
Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 1-12
-
-
Berger, E.D.1
Zorn, B.G.2
McKinley, R.S.3
-
6
-
-
34248160938
-
The DaCapo Benchmarks: Java Benchmarking Development and Analysis
-
S. M. Blackburn, R. Garner, C. Hoffman, A. M. Khan, K. S. McKinley, R. Bentzur, A. Diwan, D. Feinberg, D. Frampton, S. Z. Guyer, M. Hirzel, A. Hosking, M. Jump, H. Lee, J. E. B. Moss, A. Phansalkar, D. Stefanović, T. VanDranen, D. von Dincklage, and B. Wiedermann. The DaCapo Benchmarks: Java Benchmarking Development and Analysis. In Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2006.
-
(2006)
Conference on Object-Oriented Programming, Systems, Languages, and Applications
-
-
Blackburn, S.M.1
Garner, R.2
Hoffman, C.3
Khan, A.M.4
McKinley, K.S.5
Bentzur, R.6
Diwan, A.7
Feinberg, D.8
Frampton, D.9
Guyer, S.Z.10
Hirzel, M.11
Hosking, A.12
Jump, M.13
Lee, H.14
Moss, J.E.B.15
Phansalkar, A.16
Stefanović, D.17
VanDranen, T.18
von Dincklage, D.19
Wiedermann, B.20
more..
-
9
-
-
34547498892
-
-
CERT/CC. CERT/CC Advisories, http://www.cert.oi-g/advisories/.
-
CERT/CC. CERT/CC Advisories, http://www.cert.oi-g/advisories/.
-
-
-
-
11
-
-
0023985259
-
Unbiased Bits from. Sources of Weak Randomness and Probabilistic Communication Complexity
-
B. Chor and O. Goldreich. Unbiased Bits from. Sources of Weak Randomness and Probabilistic Communication Complexity. SIAM J. Comput., 17(2):230-261, 1988.
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
17
-
-
31744435928
-
Java Just-in-Time Compiler and Virtual Machine Improvements for Server and Middleware Applications
-
N. Grcevski, A. Kielstra, K. Stoodley, M. G. Stoodley, and V. Sundaresan. Java Just-in-Time Compiler and Virtual Machine Improvements for Server and Middleware Applications. In Virtual Machine Research and Technology Symposium, pages 151-162, 2004.
-
(2004)
Virtual Machine Research and Technology Symposium
, pp. 151-162
-
-
Grcevski, N.1
Kielstra, A.2
Stoodley, K.3
Stoodley, M.G.4
Sundaresan, V.5
-
18
-
-
0000596666
-
Purify: Fast Detection of Memory Leaks and Access Errors
-
R. Hastings and B. Joyce. Purify: Fast Detection of Memory Leaks and Access Errors. In Winter USENIX Conference, pages 125-136, 1992.
-
(1992)
Winter USENIX Conference
, pp. 125-136
-
-
Hastings, R.1
Joyce, B.2
-
20
-
-
84858090050
-
-
Jikes RVM Research Archive
-
Jikes RVM Research Archive, http://jikesrvm.sourcefo.rge.net/info/- research-archive.shtml.
-
-
-
-
22
-
-
34547495055
-
-
M. Jump and K. S. McKinley. Cork: Dynamic Memory Leak. Detection for Java. Technical Report TR-06-07, The University of Texas at Austin, 2006. Under submission.
-
M. Jump and K. S. McKinley. Cork: Dynamic Memory Leak. Detection for Java. Technical Report TR-06-07, The University of Texas at Austin, 2006. Under submission.
-
-
-
-
24
-
-
35248848478
-
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
-
N. Mitchell and G. Sevitsky. LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications. In European Conference on Object-Oriented Programming, pages 351-377, 2003.
-
(2003)
European Conference on Object-Oriented Programming
, pp. 351-377
-
-
Mitchell, N.1
Sevitsky, G.2
-
26
-
-
28444490333
-
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
-
F. Qin, S. Lu, and Y. Zhou. SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. In International Symposium on High-Performance Computer Architecture, pages 291-302, 2005.
-
(2005)
International Symposium on High-Performance Computer Architecture
, pp. 291-302
-
-
Qin, F.1
Lu, S.2
Zhou, Y.3
-
28
-
-
33846547682
-
-
Profiler
-
SciTech Software. .NET Memory Profiler, http://www.scitech.se/- memprofiler/.
-
Memory
-
-
SciTech1
-
30
-
-
34547551274
-
-
Standard Performance Evaluation Corporation. SPECjvm98 Documentation, release 1.03 edition, 1999
-
Standard Performance Evaluation Corporation. SPECjvm98 Documentation, release 1.03 edition, 1999.
-
-
-
-
31
-
-
34547510349
-
-
Standard Performance Evaluation Corporation. SPECjbb2000 Documentation, release 1.01 edition, 2001
-
Standard Performance Evaluation Corporation. SPECjbb2000 Documentation, release 1.01 edition, 2001.
-
-
-
-
33
-
-
0013036316
-
Barrier Methods for Garbage Collection
-
Technical Report CU-CS-494-90, University of Colmado at Boulder
-
B. Zorn. Barrier Methods for Garbage Collection, Technical Report CU-CS-494-90, University of Colmado at Boulder, 1990.
-
(1990)
-
-
Zorn, B.1
|