메뉴 건너뛰기




Volumn , Issue , 2007, Pages 245-260

The causes of bloat, the limits of health

Author keywords

Bloat; Limit studies; Memory footprint; Metrics

Indexed keywords

APPLICATIONS; ASYMPTOTIC ANALYSIS; BENCHMARKING; COMPUTER SYSTEMS PROGRAMMING; LINGUISTICS; NEODYMIUM;

EID: 42149169980     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1297027.1297046     Document Type: Conference Paper
Times cited : (80)

References (27)
  • 1
    • 0346249913 scopus 로고    scopus 로고
    • Exploiting hardware performance counters with flow and context sensitive profiling
    • G. Ammons, T. Ball, and J. R. Larus. Exploiting hardware performance counters with flow and context sensitive profiling. In Programming Language Design and Implementation, pages 85-96, 1997.
    • (1997) Programming Language Design and Implementation , pp. 85-96
    • Ammons, G.1    Ball, T.2    Larus, J.R.3
  • 2
    • 60849094123 scopus 로고    scopus 로고
    • Shape analysis for composite data structures
    • Technical Report MSR-TR-2007-13, Microsoft Research
    • J. Berdine, C. Calcagno, B. Cook, D. Distefano, P. W. O'Hearn, T. Wies, and H. Yang. Shape analysis for composite data structures. Technical Report MSR-TR-2007-13, Microsoft Research, 2007.
    • (2007)
    • Berdine, J.1    Calcagno, C.2    Cook, B.3    Distefano, D.4    O'Hearn, P.W.5    Wies, T.6    Yang, H.7
  • 5
    • 33744503416 scopus 로고    scopus 로고
    • A model of configuration complexity and its application to a change management system
    • A. B. Brown, A. Keller, and J. L. Hellerstein. A model of configuration complexity and its application to a change management system. In Integrated Management, 2005.
    • (2005) Integrated Management
    • Brown, A.B.1    Keller, A.2    Hellerstein, J.L.3
  • 11
    • 0000596666 scopus 로고
    • Purify -fast detection of memory leaks and access errors
    • R. Hastings and B. Joynce. Purify -fast detection of memory leaks and access errors. In USENIX Proceedings, pages 125-136, 1992.
    • (1992) USENIX Proceedings , pp. 125-136
    • Hastings, R.1    Joynce, B.2
  • 12
    • 29744434686 scopus 로고    scopus 로고
    • O'Reilly Media, Inc, first edition, Apr
    • S. Holzner. Eclipse. O'Reilly Media, Inc., first edition, Apr. 2004.
    • (2004) Eclipse
    • Holzner, S.1
  • 13
    • 33846507255 scopus 로고    scopus 로고
    • M. Jump and K. S. McKinley. Cork: dynamic memory leak detection for garbage-collected languages. In Symposium on Principles of Programming Languages, pages 31-38, 2007.
    • M. Jump and K. S. McKinley. Cork: dynamic memory leak detection for garbage-collected languages. In Symposium on Principles of Programming Languages, pages 31-38, 2007.
  • 15
    • 33746645978 scopus 로고    scopus 로고
    • The runtime structure of object ownership
    • The European Conference on Object-Oriented Programming, of, Springer-Verlag, July
    • N. Mitchell. The runtime structure of object ownership. In The European Conference on Object-Oriented Programming, volume 4067 of Lecture Notes in Computer Science, pages 74-98. Springer-Verlag, July 2006.
    • (2006) Lecture Notes in Computer Science , vol.4067 , pp. 74-98
    • Mitchell, N.1
  • 16
    • 35248848478 scopus 로고    scopus 로고
    • Leakbot: An automated and lightweight tool for diagnosing memory leaks in large Java applications
    • The European Conference on ObjectOriented Programming, of, Springer-Verlag, July
    • N. Mitchell and G. Sevitsky. Leakbot: An automated and lightweight tool for diagnosing memory leaks in large Java applications. In The European Conference on ObjectOriented Programming, volume 2743 of Lecture Notes in Computer Science, pages 351-377. Springer-Verlag, July 2003.
    • (2003) Lecture Notes in Computer Science , vol.2743 , pp. 351-377
    • Mitchell, N.1    Sevitsky, G.2
  • 18
    • 33746587440 scopus 로고    scopus 로고
    • Modeling runtime behavior in framework-based applications
    • The European Conference on Object-Oriented Programming, of, Springer-Verlag, July
    • N. Mitchell, G. Sevitsky, and H. Srinivasan. Modeling runtime behavior in framework-based applications. In The European Conference on Object-Oriented Programming, volume 4067 of Lecture Notes in Computer Science, pages 429-451. Springer-Verlag, July 2006.
    • (2006) Lecture Notes in Computer Science , vol.4067 , pp. 429-451
    • Mitchell, N.1    Sevitsky, G.2    Srinivasan, H.3
  • 25
    • 84883069085 scopus 로고    scopus 로고
    • Yourkit LLC. Yourkit profiler. http://www.yourkit. com.
    • Yourkit profiler
  • 26
    • 18044382110 scopus 로고    scopus 로고
    • Checking inside the black box: Regression testing based on value spectra differences
    • Chicago, Illinois, Sept
    • T. Xie and D. Notkin. Checking inside the black box: Regression testing based on value spectra differences. In International Conference on Software Maintenance, pages 28-37, Chicago, Illinois, Sept. 2004.
    • (2004) International Conference on Software Maintenance , pp. 28-37
    • Xie, T.1    Notkin, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.