-
1
-
-
0025448361
-
Dynamic program slicing
-
H. Agrawal and J. R. Horgan. Dynamic program slicing. In PLDI, pages 246-256, 1990.
-
(1990)
PLDI
, pp. 246-256
-
-
Agrawal, H.1
Horgan, J.R.2
-
2
-
-
63549113935
-
QVM: An efficient runtime for detecting defects in deployed systems
-
M. Arnold, M. Vechev, and E. Yahav. QVM: An efficient runtime for detecting defects in deployed systems. In OOPSLA, pages 143-162, 2008.
-
(2008)
OOPSLA
, pp. 143-162
-
-
Arnold, M.1
Vechev, M.2
Yahav, E.3
-
3
-
-
0030396393
-
Efficient path profiling
-
T. Ball and J. Larus. Efficient path profiling. In MICRO, pages 46-57, 1996.
-
(1996)
MICRO
, pp. 46-57
-
-
Ball, T.1
Larus, J.2
-
4
-
-
33750426693
-
The DaCapo benchmarks: Java benchmarking development and analysis
-
S. M. Blackburn, R. Garner, C. Hoffman, A. M. Khan, K. S. McKinley, R. Bentzur, A. Diwan, D. Feinberg, D. Frampton, S. Z. Guyer, M. Hirzel, A. Hosking, M. Jump, H. Lee, J. E. B.Moss, A. Phansalkar, D. Stefanović, T. VanDrunen, D. von Dincklage, and B. Wiedermann. The DaCapo benchmarks: Java benchmarking development and analysis. In OOPSLA, pages 169-190, 2006.
-
(2006)
OOPSLA
, pp. 169-190
-
-
Blackburn, S.M.1
Garner, R.2
Hoffman, C.3
Khan, A.M.4
McKinley, K.S.5
Bentzur, R.6
Diwan, A.7
Feinberg, D.8
Frampton, D.9
Guyer, S.Z.10
Hirzel, M.11
Hosking, A.12
Jump, M.13
Lee, H.14
Moss, J.E.B.15
Phansalkar, A.16
Stefanović, D.17
VanDrunen, T.18
Von Dincklage, D.19
Wiedermann, B.20
more..
-
5
-
-
33846521634
-
Bell: Bit-encoding online memory leak detection
-
M. D. Bond and K. S. McKinley. Bell: Bit-encoding online memory leak detection. In ASPLOS, pages 61-72, 2006.
-
(2006)
ASPLOS
, pp. 61-72
-
-
Bond, M.D.1
McKinley, K.S.2
-
6
-
-
42149117768
-
Probabilistic calling context
-
M. D. Bond and K. S. McKinley. Probabilistic calling context. In OOPSLA, pages 97-112, 2007.
-
(2007)
OOPSLA
, pp. 97-112
-
-
Bond, M.D.1
McKinley, K.S.2
-
7
-
-
63549090530
-
Tolerating memory leaks
-
M. D. Bond and K. S. McKinley. Tolerating memory leaks. In OOPSLA, pages 109-126, 2008.
-
(2008)
OOPSLA
, pp. 109-126
-
-
Bond, M.D.1
McKinley, K.S.2
-
9
-
-
42149110244
-
Tracking bad apples: Reporting the origin of null and undefined value errors
-
M. D. Bond, N. Nethercote, S. W. Kent, S. Z. Guyer, and K. S. McKinley. Tracking bad apples: Reporting the origin of null and undefined value errors. In OOPSLA, pages 405-422, 2007.
-
(2007)
OOPSLA
, pp. 405-422
-
-
Bond, M.D.1
Nethercote, N.2
Kent, S.W.3
Guyer, S.Z.4
McKinley, K.S.5
-
11
-
-
67650812903
-
A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications
-
B. Dufour, B. G. Ryder, and G. Sevitsky. A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications. In FSE, pages 59-70, 2008.
-
(2008)
FSE
, pp. 59-70
-
-
Dufour, B.1
Ryder, B.G.2
Sevitsky, G.3
-
12
-
-
37849052544
-
Measuring empirical computational complexity
-
S. F. Goldsmith, A. S. Aiken, and D. S. Wilkerson. Measuring empirical computational complexity. In FSE, pages 395-404, 2007.
-
(2007)
FSE
, pp. 395-404
-
-
Goldsmith, S.F.1
Aiken, A.S.2
Wilkerson, D.S.3
-
13
-
-
34548259241
-
Cork: Dynamic memory leak detection for garbage-collected languages
-
M. Jump and K. S. McKinley. Cork: Dynamic memory leak detection for garbage-collected languages. In POPL, pages 31-38, 2007.
-
(2007)
POPL
, pp. 31-38
-
-
Jump, M.1
McKinley, K.S.2
-
14
-
-
0025510535
-
Dynamic slicing of computer programs
-
B. Korel and J. Laski. Dynamic slicing of computer programs. J. Syst. Softw., 13(3):187-195, 1990.
-
(1990)
J. Syst. Softw.
, vol.13
, Issue.3
, pp. 187-195
-
-
Korel, B.1
Laski, J.2
-
15
-
-
0032681069
-
Whole program paths
-
J. Larus. Whole program paths. In PLDI, pages 259-269, 1999.
-
(1999)
PLDI
, pp. 259-269
-
-
Larus, J.1
-
16
-
-
67049100821
-
Spending Moore's dividend
-
J. Larus. Spending Moore's dividend. Commun. ACM, 52(5):62-69, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.5
, pp. 62-69
-
-
Larus, J.1
-
17
-
-
13844296853
-
Parameterized object sensitivity for points-to analysis for Java
-
A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points-to analysis for Java. TOSEM, 14(1):1-41, 2005.
-
(2005)
TOSEM
, vol.14
, Issue.1
, pp. 1-41
-
-
Milanova, A.1
Rountev, A.2
Ryder, B.G.3
-
19
-
-
75149134776
-
Four trends leading to Java runtime bloat
-
N. Mitchell, E. Schonberg, and G. Sevitsky. Four trends leading to Java runtime bloat. In IEEE Software, 27(1):56-63, 2010.
-
(2010)
IEEE Software
, vol.27
, Issue.1
, pp. 56-63
-
-
Mitchell, N.1
Schonberg, E.2
Sevitsky, G.3
-
20
-
-
35248848478
-
Leakbot: An automated and lightweight tool for diagnosing memory leaks in large Java applications
-
N. Mitchell and G. Sevitsky. Leakbot: An automated and lightweight tool for diagnosing memory leaks in large Java applications. In ECOOP, pages 351-377, 2003.
-
(2003)
ECOOP
, pp. 351-377
-
-
Mitchell, N.1
Sevitsky, G.2
-
21
-
-
42149169980
-
The causes of bloat, the limits of health
-
N. Mitchell and G. Sevitsky. The causes of bloat, the limits of health. OOPSLA, pages 245-260, 2007.
-
(2007)
OOPSLA
, pp. 245-260
-
-
Mitchell, N.1
Sevitsky, G.2
-
22
-
-
33746587440
-
Modeling runtime behavior in framework-based applications
-
N. Mitchell, G. Sevitsky, and H. Srinivasan. Modeling runtime behavior in framework-based applications. In ECOOP, pages 429-451, 2006.
-
(2006)
ECOOP
, pp. 429-451
-
-
Mitchell, N.1
Sevitsky, G.2
Srinivasan, H.3
-
23
-
-
67650081268
-
Architectural support for shadow memory in multiprocessors
-
V. Nagarajan and R. Gupta. Architectural support for shadow memory in multiprocessors. In VEE, pages 1-10, 2009.
-
(2009)
VEE
, pp. 1-10
-
-
Nagarajan, V.1
Gupta, R.2
-
24
-
-
35448963872
-
How to shadow every byte of memory used by a program
-
N. Nethercote and J. Seward. How to shadow every byte of memory used by a program. In VEE, pages 65-74, 2007.
-
(2007)
VEE
, pp. 65-74
-
-
Nethercote, N.1
Seward, J.2
-
25
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
26
-
-
70450250104
-
Efficiently and precisely locating memory leaks and bloat
-
G. Novark, E. D. Berger, and B. G. Zorn. Efficiently and precisely locating memory leaks and bloat. In PLDI, pages 397-407, 2009.
-
(2009)
PLDI
, pp. 397-407
-
-
Novark, G.1
Berger, E.D.2
Zorn, B.G.3
-
27
-
-
40349087553
-
Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, pages 135-148, 2006.
-
(2006)
MICRO
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.4
Zhou, Y.5
Wu, Y.6
-
28
-
-
70450235107
-
Chameleon: Adaptive selection of collections
-
O. Shacham,M. Vechev, and E. Yahav. Chameleon: Adaptive selection of collections. In PLDI, pages 408-418, 2009.
-
(2009)
PLDI
, pp. 408-418
-
-
Shacham, O.1
Vechev, M.2
Yahav, E.3
-
29
-
-
63549145872
-
JOLT: Lightweight dynamic analysis and removal of object churn
-
A. Shankar, M. Arnold, and R. Bodik. JOLT: Lightweight dynamic analysis and removal of object churn. In OOPSLA, pages 127-142, 2008.
-
(2008)
OOPSLA
, pp. 127-142
-
-
Shankar, A.1
Arnold, M.2
Bodik, R.3
-
31
-
-
67650837951
-
Binary analysis for measurement and attribution of program performance
-
N. R. Tallent, J. M. Mellor-Crummey, and M. W. Fagan. Binary analysis for measurement and attribution of program performance. In PLDI, pages 441-452, 2009.
-
(2009)
PLDI
, pp. 441-452
-
-
Tallent, N.R.1
Mellor-Crummey, J.M.2
Fagan, M.W.3
-
32
-
-
0000990322
-
A survey of program slicing techniques
-
F. Tip. A survey of program slicing techniques. Journal of Programming Languages, 3:121-189, 1995.
-
(1995)
Journal of Programming Languages
, vol.3
, pp. 121-189
-
-
Tip, F.1
-
34
-
-
70450255124
-
Go with the flow: Profiling copies to find runtime bloat
-
G. Xu, M. Arnold, N. Mitchell, A. Rountev, and G. Sevitsky. Go with the flow: Profiling copies to find runtime bloat. In PLDI, pages 419-430, 2009.
-
(2009)
PLDI
, pp. 419-430
-
-
Xu, G.1
Arnold, M.2
Mitchell, N.3
Rountev, A.4
Sevitsky, G.5
-
35
-
-
67650714764
-
Precise memory leak detection for Java software using container profiling
-
G. Xu and A. Rountev. Precise memory leak detection for Java software using container profiling. In ICSE, pages 151-160, 2008.
-
(2008)
ICSE
, pp. 151-160
-
-
Xu, G.1
Rountev, A.2
-
36
-
-
77954748220
-
Detecting inefficiently-used containers to avoid bloat
-
G. Xu and A. Rountev. Detecting inefficiently-used containers to avoid bloat. In PLDI, 2010.
-
(2010)
PLDI
-
-
Xu, G.1
Rountev, A.2
-
37
-
-
33746089176
-
Pruning dynamic slices with confidence
-
X. Zhang, N. Gupta, and R. Gupta. Pruning dynamic slices with confidence. In PLDI, pages 169-180, 2006.
-
(2006)
PLDI
, pp. 169-180
-
-
Zhang, X.1
Gupta, N.2
Gupta, R.3
-
38
-
-
4544283390
-
Cost effective dynamic program slicing
-
X. Zhang and R. Gupta. Cost effective dynamic program slicing. In PLDI, pages 94-106, 2004.
-
(2004)
PLDI
, pp. 94-106
-
-
Zhang, X.1
Gupta, R.2
-
39
-
-
21644486871
-
Whole execution traces
-
X. Zhang and R. Gupta. Whole execution traces. In MICRO, pages 105-116, 2004.
-
(2004)
MICRO
, pp. 105-116
-
-
Zhang, X.1
Gupta, R.2
-
40
-
-
0038262825
-
Precise dynamic slicing algorithms
-
X. Zhang, R. Gupta, and Y. Zhang. Precise dynamic slicing algorithms. In ICSE, pages 319-329, 2003.
-
(2003)
ICSE
, pp. 319-329
-
-
Zhang, X.1
Gupta, R.2
Zhang, Y.3
-
41
-
-
34547309741
-
Dynamic slicing long running programs through execution fast forwarding
-
X. Zhang, S. Tallam, and R. Gupta. Dynamic slicing long running programs through execution fast forwarding. In FSE, pages 81-91, 2006.
-
(2006)
FSE
, pp. 81-91
-
-
Zhang, X.1
Tallam, S.2
Gupta, R.3
-
42
-
-
33746100320
-
Accurate, efficient, and adaptive calling context profiling
-
X. Zhuang, M. J. Serrano, H. W. Cain, and J.-D. Choi. Accurate, efficient, and adaptive calling context profiling. In PLDI, pages 263-271, 2006.
-
(2006)
PLDI
, pp. 263-271
-
-
Zhuang, X.1
Serrano, M.J.2
Cain, H.W.3
Choi, J.-D.4
|