-
1
-
-
0342321935
-
-
ALPERN, B., ATTANASIO, C. R., BARTON, J. J., BURKE, M. G., CHENG, P., CHOI, J.-D., COCCHI, A., FINK, S. J., GROVE, D., HIND, M., HUMMEL, S. F., LIEBER, D., LITVINOV, V., MERGEN, M., NGO, T., RUSSELL, J. R., SARKAR, V., SERRANO, M. J., SHEPHERD, J., SMITH, S., SREEDHAR, V. C., SRINIVASAN, H., AND WHALEY, J. The Jalapeño Virtual Machine. IBM Systems Journal 39, 1 (2000), 211-238.
-
ALPERN, B., ATTANASIO, C. R., BARTON, J. J., BURKE, M. G., CHENG, P., CHOI, J.-D., COCCHI, A., FINK, S. J., GROVE, D., HIND, M., HUMMEL, S. F., LIEBER, D., LITVINOV, V., MERGEN, M., NGO, T., RUSSELL, J. R., SARKAR, V., SERRANO, M. J., SHEPHERD, J., SMITH, S., SREEDHAR, V. C., SRINIVASAN, H., AND WHALEY, J. The Jalapeño Virtual Machine. IBM Systems Journal 39, 1 (2000), 211-238.
-
-
-
-
2
-
-
84864840992
-
Adaptive Optimization in the Jalapeño JVM
-
ARNOLD, M., FINK, S. J., GROVE, D., HIND, M., AND SWEENEY, P. F. Adaptive Optimization in the Jalapeño JVM. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (2000), pp. 47-65.
-
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (2000)
, pp. 47-65
-
-
ARNOLD, M.1
FINK, S.J.2
GROVE, D.3
HIND, M.4
SWEENEY, P.F.5
-
4
-
-
4544359906
-
Oil and Water? High Performance Garbage Collection in Java with MMTk
-
BLACKBURN, S. M., CHENG, P., AND MCKINLEY, K. S. Oil and Water? High Performance Garbage Collection in Java with MMTk. In ACM International Conference on Software Engineering (2004), pp. 137-146.
-
(2004)
ACM International Conference on Software Engineering
, pp. 137-146
-
-
BLACKBURN, S.M.1
CHENG, P.2
MCKINLEY, K.S.3
-
5
-
-
33750426693
-
-
BLACKBURN, S. M., GARNER, R., HOFFMAN, C., KHAN, A. M., MCKINLEY, K. S., BENTZUR, R., DIWAN, A., FEINBERG, D., FRAMPTON, D., GUYER, S. Z., HIRZEL, M., HOSKING, A., JUMP, M., LEE, H., MOSS, J. E. B., PHANSALKAR, A., STEFANOVIĆ, D., VANDRUNEN, T., VON DINCKLAGE, D., AND WIEDERMANN, B. The DaCapo Benchmarks: Java Benchmarking Development and Analysis. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (2006), pp. 169-190.
-
BLACKBURN, S. M., GARNER, R., HOFFMAN, C., KHAN, A. M., MCKINLEY, K. S., BENTZUR, R., DIWAN, A., FEINBERG, D., FRAMPTON, D., GUYER, S. Z., HIRZEL, M., HOSKING, A., JUMP, M., LEE, H., MOSS, J. E. B., PHANSALKAR, A., STEFANOVIĆ, D., VANDRUNEN, T., VON DINCKLAGE, D., AND WIEDERMANN, B. The DaCapo Benchmarks: Java Benchmarking Development and Analysis. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (2006), pp. 169-190.
-
-
-
-
8
-
-
63549090530
-
Tolerating Memory Leaks
-
BOND, M. D., AND MCKINLEY, K. S. Tolerating Memory Leaks. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (2008), pp. 109-126.
-
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (2008)
, pp. 109-126
-
-
BOND, M.D.1
MCKINLEY, K.S.2
-
9
-
-
34748871572
-
PANACEA-Towards a Self-Healing Development Framework
-
BREITGAND, D., GOLDSTEIN, M., HENIS, E., SHEHORY, O., AND WEINSBERG, Y. PANACEA-Towards a Self-Healing Development Framework. In Integrated Network Management (2007), pp. 169-178.
-
(2007)
Integrated Network Management
, pp. 169-178
-
-
BREITGAND, D.1
GOLDSTEIN, M.2
HENIS, E.3
SHEHORY, O.4
WEINSBERG, Y.5
-
10
-
-
35448996514
-
Practical Memory Leak Detection using Guarded Value-Flow Analysis
-
CHEREM, S., PRINCEHOUSE, L., AND RUGINA, R. Practical Memory Leak Detection using Guarded Value-Flow Analysis. In ACM Conference on Programming Language Design and Implementation (2007), pp. 480-491.
-
(2007)
ACM Conference on Programming Language Design and Implementation
, pp. 480-491
-
-
CHEREM, S.1
PRINCEHOUSE, L.2
RUGINA, R.3
-
12
-
-
32044451942
-
The Pauseless GC Algorithm
-
CLICK, C., TENE, G., AND WOLF, M. The Pauseless GC Algorithm. In ACM/USENIX International Conference on Virtual Execution Environments (2005), pp. 46-56.
-
(2005)
ACM/USENIX International Conference on Virtual Execution Environments
, pp. 46-56
-
-
CLICK, C.1
TENE, G.2
WOLF, M.3
-
13
-
-
0004116989
-
-
2nd ed. The MIT Press, McGraw-Hill Book Company, ch. 11
-
CORMEN, T. H., LEISERSON, C. E., RIVEST, R. L., AND STEIN, C. Introduction to Algorithms, 2nd ed. The MIT Press, McGraw-Hill Book Company, 2001, ch. 11.
-
(2001)
Introduction to Algorithms
-
-
CORMEN, T.H.1
LEISERSON, C.E.2
RIVEST, R.L.3
STEIN, C.4
-
14
-
-
63549140513
-
Java Performance Evaluation through Rigorous Replay Compilation
-
GEORGES, A., EECKHOUT, L., AND BUYTAERT, D. Java Performance Evaluation through Rigorous Replay Compilation. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (2008), pp. 367-384.
-
(2008)
ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
, pp. 367-384
-
-
GEORGES, A.1
EECKHOUT, L.2
BUYTAERT, D.3
-
15
-
-
41149098209
-
Can Self-Healing Software Cope With Loitering?
-
GOLDSTEIN, M., SHEHORY, O., AND WEINSBERG, Y. Can Self-Healing Software Cope With Loitering? In International Workshop on Software Quality Assurance (2007), pp. 1-8.
-
(2007)
International Workshop on Software Quality Assurance
, pp. 1-8
-
-
GOLDSTEIN, M.1
SHEHORY, O.2
WEINSBERG, Y.3
-
16
-
-
0000596666
-
Purify: Fast Detection of Memory Leaks and Access Errors
-
HASTINGS, R., AND JOYCE, B. Purify: Fast Detection of Memory Leaks and Access Errors. In Winter USENIX Conference (1992), pp. 125-136.
-
(1992)
Winter USENIX Conference
, pp. 125-136
-
-
HASTINGS, R.1
JOYCE, B.2
-
18
-
-
31744448550
-
Garbage Collection without Paging
-
HERTZ, M., FENG, Y., AND BERGER, E. D. Garbage Collection without Paging. In ACM Conference on Programming Language Design and Implementation (2005), pp. 143-153.
-
(2005)
ACM Conference on Programming Language Design and Implementation
, pp. 143-153
-
-
HERTZ, M.1
FENG, Y.2
BERGER, E.D.3
-
19
-
-
34548259241
-
-
JUMP, M., AND MCKINLEY, K. S. Cork: Dynamic Memory Leak Detection for Garbage-Collected Languages. In ACM Symposium on Principles of Programming Languages (2007), pp. 31-38.
-
JUMP, M., AND MCKINLEY, K. S. Cork: Dynamic Memory Leak Detection for Garbage-Collected Languages. In ACM Symposium on Principles of Programming Languages (2007), pp. 31-38.
-
-
-
-
21
-
-
63549106758
-
Precise Detection of Memory Leaks
-
MAEBE, J., RONSSE, M., AND BOSSCHERE, K. D. Precise Detection of Memory Leaks. In International Workshop on Dynamic Analysis (2004), pp. 25-31.
-
(2004)
International Workshop on Dynamic Analysis
, pp. 25-31
-
-
MAEBE, J.1
RONSSE, M.2
BOSSCHERE, K.D.3
-
22
-
-
35248848478
-
LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications
-
MITCHELL, N., AND SEVITSKY, G. LeakBot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications. In European Conference on Object-Oriented Programming (2003), pp. 351-377.
-
(2003)
European Conference on Object-Oriented Programming
, pp. 351-377
-
-
MITCHELL, N.1
SEVITSKY, G.2
-
24
-
-
67650085819
-
-
NETHERCOTE, N., AND SEWARD, J. Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation. In ACM Conference on Programming Language Design and Implementation (2007), pp. 89-100.
-
NETHERCOTE, N., AND SEWARD, J. Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation. In ACM Conference on Programming Language Design and Implementation (2007), pp. 89-100.
-
-
-
-
26
-
-
63549125955
-
Plug: Automatically Tolerating Memory Leaks in C and C++ Applications
-
Tech. Rep. UM-CS-2008-009, University of Massachusetts
-
NOVARK, G., BERGER, E. D., AND ZORN, B. G. Plug: Automatically Tolerating Memory Leaks in C and C++ Applications. Tech. Rep. UM-CS-2008-009, University of Massachusetts, 2008.
-
(2008)
-
-
NOVARK, G.1
BERGER, E.D.2
ZORN, B.G.3
-
27
-
-
67650799803
-
-
ORACLE. JRockit Mission Control. http://www.oracle. com/technology/products/jrockit/missioncontrol/.
-
ORACLE. JRockit Mission Control. http://www.oracle. com/technology/products/jrockit/missioncontrol/.
-
-
-
-
28
-
-
28444490333
-
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
-
QIN, F., LU, S., AND ZHOU, Y. SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. In International Symposium on High-Performance Computer Architecture (2005), pp. 291-302.
-
(2005)
International Symposium on High-Performance Computer Architecture
, pp. 291-302
-
-
QIN, F.1
LU, S.2
ZHOU, Y.3
-
29
-
-
84885578759
-
Treating Bugs as Allergies - A Safe Method to Survive Software Failures
-
QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: Treating Bugs as Allergies - A Safe Method to Survive Software Failures. In ACM Symposium on Operating Systems Principles (2005), pp. 235-248.
-
(2005)
ACM Symposium on Operating Systems Principles
, pp. 235-248
-
-
QIN, F.1
TUCEK, J.2
SUNDARESAN, J.3
ZHOU, Y.R.4
-
30
-
-
67650815870
-
-
QUEST. JProbe Memory Debugger. http://www.quest. com/jprobe/debugger.asp.
-
QUEST. JProbe Memory Debugger. http://www.quest. com/jprobe/debugger.asp.
-
-
-
-
31
-
-
84906487819
-
Enhancing Server Availability and Security through Failure-Oblivious Computing
-
RINARD, M., CADAR, C., DUMITRAN, D., ROY, D., LEU, T., AND BEEBEE, W. Enhancing Server Availability and Security through Failure-Oblivious Computing. In USENIX Symposium on Operating Systems Design and Implementation (2004), pp. 303-316.
-
(2004)
USENIX Symposium on Operating Systems Design and Implementation
, pp. 303-316
-
-
RINARD, M.1
CADAR, C.2
DUMITRAN, D.3
ROY, D.4
LEU, T.5
BEEBEE, W.6
-
32
-
-
84869541383
-
-
SCITECH SOFTWARE
-
SCITECH SOFTWARE. .NET Memory Profiler. http: //www.scitech.se/memprofiler/.
-
NET Memory Profiler. http
-
-
-
33
-
-
67650844858
-
-
STANDARD PERFORMANCE EVALUATION CORPORATION. SPECjvm98 Documentation, release 1.03 ed, 1999
-
STANDARD PERFORMANCE EVALUATION CORPORATION. SPECjvm98 Documentation, release 1.03 ed., 1999.
-
-
-
-
34
-
-
67650806031
-
-
STANDARD PERFORMANCE EVALUATION CORPORATION. SPECjbb2000 Documentation, release 1.01 ed, 2001
-
STANDARD PERFORMANCE EVALUATION CORPORATION. SPECjbb2000 Documentation, release 1.01 ed., 2001.
-
-
-
-
35
-
-
63549096374
-
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
-
TANG, Y., GAO, Q., AND QIN, F. LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages. In USENIX Annual Technical Conference (2008), pp. 307-320.
-
(2008)
USENIX Annual Technical Conference
, pp. 307-320
-
-
TANG, Y.1
GAO, Q.2
QIN, F.3
-
36
-
-
85050315617
-
Memory Management For A Gigantic LISP Environment or, GC Considered Harmful
-
WHITE, J. L. Address/Memory Management For A Gigantic LISP Environment or, GC Considered Harmful. In ACM Conference on LISP and Functional Programming (1980), pp. 119-127.
-
(1980)
ACM Conference on LISP and Functional Programming
, pp. 119-127
-
-
WHITE, J.L.A.1
-
37
-
-
85076757258
-
CRAMM: Virtual Memory Support for Garbage-Collected Applications
-
YANG, T., BERGER, E. D., KAPLAN, S. F., AND MOSS, J. E. B. CRAMM: Virtual Memory Support for Garbage-Collected Applications. In USENIX Symposium on Operating Systems Design and Implementation (2006), pp. 103-116.
-
(2006)
USENIX Symposium on Operating Systems Design and Implementation
, pp. 103-116
-
-
YANG, T.1
BERGER, E.D.2
KAPLAN, S.F.3
MOSS, J.E.B.4
|