메뉴 건너뛰기




Volumn 43, Issue 10, 2008, Pages 109-125

Tolerating memory leaks

Author keywords

Experimentation; Performance; Reliability

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER SCIENCE; RELIABILITY;

EID: 67650074763     PISSN: 15232867     EISSN: None     Source Type: Journal    
DOI: 10.1145/1449955.1449774     Document Type: Article
Times cited : (22)

References (63)
  • 10
    • 63549117815 scopus 로고    scopus 로고
    • Tolerating Memory Leaks
    • Technical Report TR-07-64, University of Texas at Austin, December
    • M. D. Bond and K. S. McKinley. Tolerating Memory Leaks. Technical Report TR-07-64, University of Texas at Austin, December 2007.
    • (2007)
    • Bond, M.D.1    McKinley, K.S.2
  • 24
    • 0000596666 scopus 로고
    • Purify: Fast Detection of Memory Leaks and Access Errors
    • R. Hastings and B. Joyce. Purify: Fast Detection of Memory Leaks and Access Errors. In Winter USENIX Conference, pages 125-136, 1992.
    • (1992) Winter USENIX Conference , pp. 125-136
    • Hastings, R.1    Joyce, B.2
  • 27
    • 0040078395 scopus 로고    scopus 로고
    • On the Usefulness of Type and Liveness Accuracy for Garbage Collection and Leak Detection
    • M. Hirzel, A. Diwan, and J. Henkel. On the Usefulness of Type and Liveness Accuracy for Garbage Collection and Leak Detection. ACM Transactions on Programming Languages and Systems, 24 (6) :593-624, 2002.
    • (2002) ACM Transactions on Programming Languages and Systems , vol.24 , Issue.6 , pp. 593-624
    • Hirzel, M.1    Diwan, A.2    Henkel, J.3
  • 28
    • 0004208625 scopus 로고    scopus 로고
    • PM3: An Orthogonal Persistent Systems Programming Language - Design, Implementation, Performance
    • A. L. Hosking and J. Chen. PM3: An Orthogonal Persistent Systems Programming Language - Design, Implementation, Performance. In International Conference on Very Large Data Bases, pages 587-598, 1999.
    • (1999) International Conference on Very Large Data Bases , pp. 587-598
    • Hosking, A.L.1    Chen, J.2
  • 32
    • 84869339001 scopus 로고    scopus 로고
    • Jikes RVM. http://www.jikesrvm.org.
    • Jikes RVM
  • 33
    • 84869344870 scopus 로고    scopus 로고
    • Jikes RVM Research Archive
    • Jikes RVM Research Archive. http://www.jikesrvm.org/- Research+Archive.
  • 34
    • 34548259241 scopus 로고    scopus 로고
    • M. Jump and K. S. McKinley. Cork: Dynamic Memory Leak Detection for Garbage-Collected Languages. In ACM Symposium on Principles of Programming Languages, pages 31-38, 2007.
    • M. Jump and K. S. McKinley. Cork: Dynamic Memory Leak Detection for Garbage-Collected Languages. In ACM Symposium on Principles of Programming Languages, pages 31-38, 2007.
  • 37
    • 67650072191 scopus 로고    scopus 로고
    • Mckoi SQL Database message board: memory/thread leak with Mckoi 0.93 in embedded mode, 2002. http://www.- mckoi.com/database/mail/subject.jsp?id=2172.
    • Mckoi SQL Database message board: memory/thread leak with Mckoi 0.93 in embedded mode, 2002. http://www.- mckoi.com/database/mail/subject.jsp?id=2172.
  • 38
    • 35248848478 scopus 로고    scopus 로고
    • LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
    • N. Mitchell and G. Sevitsky. LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications. In European Conference on Object- Oriented Programming, pages 351-377, 2003.
    • (2003) European Conference on Object- Oriented Programming , pp. 351-377
    • Mitchell, N.1    Sevitsky, G.2
  • 39
    • 0026902946 scopus 로고
    • Working with Persistent Objects: To Swizzle or Not to Swizzle
    • J. E. B. Moss. Working with Persistent Objects: To Swizzle or Not to Swizzle. IEEE Transactions on Computers, 18 (8) :657-673, 1992.
    • (1992) IEEE Transactions on Computers , vol.18 , Issue.8 , pp. 657-673
    • Moss, J.E.B.1
  • 42
    • 63549125955 scopus 로고    scopus 로고
    • Plug: Automatically Tolerating Memory Leaks in C and C++ Applications
    • Technical Report UM-CS-2008-009, University of Massachusetts
    • G. Novark, E. D. Berger, and B. G. Zorn. Plug: Automatically Tolerating Memory Leaks in C and C++ Applications. Technical Report UM-CS-2008-009, University of Massachusetts, 2008.
    • (2008)
    • Novark, G.1    Berger, E.D.2    Zorn, B.G.3
  • 47
    • 28444490333 scopus 로고    scopus 로고
    • SafeMem: Exploiting ECC- Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
    • F. Qin, S. Lu, and Y. Zhou. SafeMem: Exploiting ECC- Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. In International Symposium on High-Performance Computer Architecture, pages 291-302, 2005.
    • (2005) International Symposium on High-Performance Computer Architecture , pp. 291-302
    • Qin, F.1    Lu, S.2    Zhou, Y.3
  • 52
    • 70450240515 scopus 로고    scopus 로고
    • SciTech Software
    • SciTech Software.. NET Memory Profiler. http://www.- scitech.se/ memprofiler/.
    • NET Memory Profiler
  • 53
    • 67650064326 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation. SPECjvm98 Documentation, release 1.03 edition, 1999
    • Standard Performance Evaluation Corporation. SPECjvm98 Documentation, release 1.03 edition, 1999.
  • 54
    • 67650068961 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation. SPECjbb2000 Documentation, release 1.01 edition, 2001
    • Standard Performance Evaluation Corporation. SPECjbb2000 Documentation, release 1.01 edition, 2001.
  • 57
    • 63549096374 scopus 로고    scopus 로고
    • LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
    • Y. Tang, Q. Gao, and F. Qin. LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages. In USENIX Annual Technical Conference, pages 307-320, 2008.
    • (2008) USENIX Annual Technical Conference , pp. 307-320
    • Tang, Y.1    Gao, Q.2    Qin, F.3
  • 58
    • 0342322242 scopus 로고
    • Pointer Swizzling at Page Fault Time: Efficiently Supporting Huge Address Spaces on Standard Hardware
    • P. R. Wilson. Pointer Swizzling at Page Fault Time: Efficiently Supporting Huge Address Spaces on Standard Hardware. ACM SIGARCH Comput. Archit. News, 19 (4) :6-13, 1991.
    • (1991) ACM SIGARCH Comput. Archit. News , vol.19 , Issue.4 , pp. 6-13
    • Wilson, P.R.1
  • 63
    • 0013036316 scopus 로고
    • Barrier Methods for Garbage Collection
    • Technical Report CU-CS-494-90, University of Colorado at Boulder
    • B. Zorn. Barrier Methods for Garbage Collection. Technical Report CU-CS-494-90, University of Colorado at Boulder, 1990.
    • (1990)
    • Zorn, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.