메뉴 건너뛰기




Volumn , Issue , 2009, Pages 419-430

Go with the flow: Profiling copies to find runtime bloat

Author keywords

Copy graph; Heap analysis; Memory bloat; Profiling

Indexed keywords

COMMERCIAL APPLICATIONS; DATA FLOW; JAVA APPLICATIONS; PERFORMANCE GAIN; PERFORMANCE OPTIMIZATIONS; PILE-UPS; RUNTIMES; SIMPLE OPERATION;

EID: 70450255124     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1542476.1542523     Document Type: Conference Paper
Times cited : (59)

References (34)
  • 1
    • 84936937947 scopus 로고    scopus 로고
    • Finding and removing performance bottlenecks in large systems
    • G. Ammons, J.-D. Choi, M. Gupta, and N. Swamy. Finding and removing performance bottlenecks in large systems. In ECOOP, pages 172-196, 2004.
    • (2004) ECOOP , pp. 172-196
    • Ammons, G.1    Choi, J.-D.2    Gupta, M.3    Swamy, N.4
  • 2
    • 20744446298 scopus 로고    scopus 로고
    • A survey of adaptive optimization in virtual machines
    • M. Arnold, S. Fink, D. Grove, M. Hind, and P. F. Sweeney. A survey of adaptive optimization in virtual machines. Proc. IEEE, 92(2):449-466, 2005.
    • (2005) Proc. IEEE , vol.92 , Issue.2 , pp. 449-466
    • Arnold, M.1    Fink, S.2    Grove, D.3    Hind, M.4    Sweeney, P.F.5
  • 3
    • 0030396393 scopus 로고    scopus 로고
    • Efficient path profiling
    • T. Ball and J. Larus. Efficient path profiling. In MICRO, pages 46-57, 1996.
    • (1996) MICRO , pp. 46-57
    • Ball, T.1    Larus, J.2
  • 4
    • 34248160938 scopus 로고    scopus 로고
    • The DaCapo benchmarks: Java benchmarking development and analysis
    • S. M. Blackburn and et al. The DaCapo benchmarks: Java benchmarking development and analysis. In OOPSLA, 2006.
    • (2006) OOPSLA
    • Blackburn, S.M.1    and et, al.2
  • 5
    • 33749399542 scopus 로고    scopus 로고
    • Continuous path and edge profiling
    • M. D. Bond and K. S. McKinley. Continuous path and edge profiling. In MICRO, pages 130-140, 2005.
    • (2005) MICRO , pp. 130-140
    • Bond, M.D.1    McKinley, K.S.2
  • 6
    • 42149110244 scopus 로고    scopus 로고
    • Tracking bad apples: Reporting the origin of null and undefined value errors
    • M. D. Bond, N. Nethercote, S. W. Kent, S. Z. Guyer, and K. S. McKinley. Tracking bad apples: reporting the origin of null and undefined value errors. In OOPSLA, pages 405-422, 2007.
    • (2007) OOPSLA , pp. 405-422
    • Bond, M.D.1    Nethercote, N.2    Kent, S.W.3    Guyer, S.Z.4    McKinley, K.S.5
  • 7
    • 34548212308 scopus 로고    scopus 로고
    • Dytan: A generic dynamic taint analysis framework
    • J. Clause, W. Li, and A. Orso. Dytan: A generic dynamic taint analysis framework. In ISSTA, pages 196-206, 2007.
    • (2007) ISSTA , pp. 196-206
    • Clause, J.1    Li, W.2    Orso, A.3
  • 9
    • 34548247645 scopus 로고    scopus 로고
    • Blended analysis for performance understanding of framework-based applications
    • B. Dufour, B. G. Ryder, and G. Sevitsky. Blended analysis for performance understanding of framework-based applications. In ISSTA, pages 118-128, 2007.
    • (2007) ISSTA , pp. 118-128
    • Dufour, B.1    Ryder, B.G.2    Sevitsky, G.3
  • 10
    • 67650812903 scopus 로고    scopus 로고
    • A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications
    • B. Dufour, B. G. Ryder, and G. Sevitsky. A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications. In FSE, pages 59-70, 2008.
    • (2008) FSE , pp. 59-70
    • Dufour, B.1    Ryder, B.G.2    Sevitsky, G.3
  • 11
    • 38849203773 scopus 로고    scopus 로고
    • ej-technologies
    • ej-technologies. JProfiler. www.ej-technologies.com.
    • JProfiler
  • 12
    • 70450231343 scopus 로고    scopus 로고
    • Java Development Blog. dld.blog-city.com
    • Java Development Blog. dld.blog-city.com.
  • 13
    • 70450226272 scopus 로고    scopus 로고
    • Java Heap Analyzer Tool HAT, hat.dev.java.net
    • Java Heap Analyzer Tool (HAT). hat.dev.java.net.
  • 14
    • 0032681069 scopus 로고    scopus 로고
    • Whole program paths
    • J. Larus. Whole program paths. In PLDI, pages 259-269, 1999.
    • (1999) PLDI , pp. 259-269
    • Larus, J.1
  • 15
    • 67650787118 scopus 로고    scopus 로고
    • An empirical study of the strength of information flows in programs
    • W. Masri and A. Podgurski. An empirical study of the strength of information flows in programs. In WODA, pages 73-80, 2006.
    • (2006) WODA , pp. 73-80
    • Masri, W.1    Podgurski, A.2
  • 16
    • 13844296853 scopus 로고    scopus 로고
    • Parameterized object sensitivity for points-to analysis for Java
    • A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points-to analysis for Java. TOSEM, 14(1):1-41, 2005.
    • (2005) TOSEM , vol.14 , Issue.1 , pp. 1-41
    • Milanova, A.1    Rountev, A.2    Ryder, B.G.3
  • 17
    • 42149169980 scopus 로고    scopus 로고
    • The causes of bloat, the limits of health
    • N. Mitchell and G. Sevitsky. The causes of bloat, the limits of health. OOPSLA, pages 245-260, 2007.
    • (2007) OOPSLA , pp. 245-260
    • Mitchell, N.1    Sevitsky, G.2
  • 18
    • 33746587440 scopus 로고    scopus 로고
    • Modeling runtime behavior in framework-based applications
    • N. Mitchell, G. Sevitsky, and H. Srinivasan. Modeling runtime behavior in framework-based applications. In ECOOP, pages 429-451, 2006.
    • (2006) ECOOP , pp. 429-451
    • Mitchell, N.1    Sevitsky, G.2    Srinivasan, H.3
  • 19
    • 35448963872 scopus 로고    scopus 로고
    • How to shadow every byte of memory used by a program
    • N. Nethercote and J. Seward. How to shadow every byte of memory used by a program. In VEE, pages 65-74, 2007.
    • (2007) VEE , pp. 65-74
    • Nethercote, N.1    Seward, J.2
  • 20
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 21
    • 40349087553 scopus 로고    scopus 로고
    • F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, pages 135-148, 2006.
    • F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, pages 135-148, 2006.
  • 23
    • 67650803159 scopus 로고    scopus 로고
    • Object ownership profiling: A technique for finding and fixing memory leaks
    • D. Rayside and L. Mendel. Object ownership profiling: a technique for finding and fixing memory leaks. In ASE, pages 194-203, 2007.
    • (2007) ASE , pp. 194-203
    • Rayside, D.1    Mendel, L.2
  • 24
    • 63549145872 scopus 로고    scopus 로고
    • JOLT: Lightweight dynamic analysis and removal of object churn
    • A. Shankar, M. Arnold, and R. Bodik. JOLT: Lightweight dynamic analysis and removal of object churn. In OOPSLA, pages 127-142, 2008.
    • (2008) OOPSLA , pp. 127-142
    • Shankar, A.1    Arnold, M.2    Bodik, R.3
  • 25
    • 84956693522 scopus 로고
    • Control-flow analysis in Scheme
    • O. Shivers. Control-flow analysis in Scheme. In PLDI, pages 164-174, 1988.
    • (1988) PLDI , pp. 164-174
    • Shivers, O.1
  • 26
    • 32344438702 scopus 로고    scopus 로고
    • Summarizing application performance from a component perspective
    • K. Srinivas and H. Srinivasan. Summarizing application performance from a component perspective. In FSE, pages 136-145, 2005.
    • (2005) FSE , pp. 136-145
    • Srinivas, K.1    Srinivasan, H.2
  • 27
    • 70450271613 scopus 로고    scopus 로고
    • Sun Java Forum. forums.java.net/jive/thread.jspa? messageID=180784.
    • Sun Java Forum. forums.java.net/jive/thread.jspa? messageID=180784.
  • 28
    • 33846522392 scopus 로고    scopus 로고
    • Preferential path profiling: Compactly numbering interesting paths
    • K. Vaswani, A. V. Nori, and T. M. Chilimbi. Preferential path profiling: Compactly numbering interesting paths. In POPL, pages 351-362, 2007.
    • (2007) POPL , pp. 351-362
    • Vaswani, K.1    Nori, A.V.2    Chilimbi, T.M.3
  • 29
    • 67650714764 scopus 로고    scopus 로고
    • Precise memory leak detection for Java software using container profiling
    • G. Xu and A. Rountev. Precise memory leak detection for Java software using container profiling. In ICSE, pages 151-160, 2008.
    • (2008) ICSE , pp. 151-160
    • Xu, G.1    Rountev, A.2
  • 30
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In USENIX Security, pages 121-136, 2006.
    • (2006) USENIX Security , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3
  • 31
    • 33746089176 scopus 로고    scopus 로고
    • Pruning dynamic slices with confidence
    • X. Zhang, N. Gupta, and R. Gupta. Pruning dynamic slices with confidence. In PLDI, pages 169-180, 2006.
    • (2006) PLDI , pp. 169-180
    • Zhang, X.1    Gupta, N.2    Gupta, R.3
  • 32
    • 4544283390 scopus 로고    scopus 로고
    • Cost effective dynamic program slicing
    • X. Zhang and R. Gupta. Cost effective dynamic program slicing. In PLDI, pages 94-106, 2004.
    • (2004) PLDI , pp. 94-106
    • Zhang, X.1    Gupta, R.2
  • 33
    • 21644486871 scopus 로고    scopus 로고
    • Whole execution traces
    • X. Zhang and R. Gupta. Whole execution traces. In MICRO, pages 105-116, 2004.
    • (2004) MICRO , pp. 105-116
    • Zhang, X.1    Gupta, R.2
  • 34
    • 0038262825 scopus 로고    scopus 로고
    • Precise dynamic slicing algorithms
    • X. Zhang, R. Gupta, and Y. Zhang. Precise dynamic slicing algorithms. In ICSE, pages 319-329, 2003.
    • (2003) ICSE , pp. 319-329
    • Zhang, X.1    Gupta, R.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.