메뉴 건너뛰기




Volumn , Issue , 2010, Pages 174-186

Finding low-utility data structures

Author keywords

abstract dynamic thin slicing; cost benefit analysis; memory bloat

Indexed keywords

ABSTRACT DOMAINS; ABSTRACT DYNAMIC THIN SLICING; COSTS AND BENEFITS; DATA FLOW; DATA VALUES; FORMATTERS; INCREMENTAL COST; JAVA APPLICATIONS; MEMORY REQUIREMENTS; PROGRAM OPTIMIZATION; RUN-TIME ANALYSIS; RUNTIMES; VALUE FLOW;

EID: 77954709852     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1806596.1806617     Document Type: Conference Paper
Times cited : (81)

References (42)
  • 1
    • 0025448361 scopus 로고
    • Dynamic program slicing
    • H. Agrawal and J. R. Horgan. Dynamic program slicing. In PLDI, pages 246-256, 1990.
    • (1990) PLDI , pp. 246-256
    • Agrawal, H.1    Horgan, J.R.2
  • 2
    • 63549113935 scopus 로고    scopus 로고
    • QVM: An efficient runtime for detecting defects in deployed systems
    • M. Arnold, M. Vechev, and E. Yahav. QVM: An efficient runtime for detecting defects in deployed systems. In OOPSLA, pages 143-162, 2008.
    • (2008) OOPSLA , pp. 143-162
    • Arnold, M.1    Vechev, M.2    Yahav, E.3
  • 3
    • 0030396393 scopus 로고    scopus 로고
    • Efficient path profiling
    • T. Ball and J. Larus. Efficient path profiling. In MICRO, pages 46-57, 1996.
    • (1996) MICRO , pp. 46-57
    • Ball, T.1    Larus, J.2
  • 5
    • 33846521634 scopus 로고    scopus 로고
    • Bell: Bit-encoding online memory leak detection
    • M. D. Bond and K. S. McKinley. Bell: Bit-encoding online memory leak detection. In ASPLOS, pages 61-72, 2006.
    • (2006) ASPLOS , pp. 61-72
    • Bond, M.D.1    McKinley, K.S.2
  • 6
    • 42149117768 scopus 로고    scopus 로고
    • Probabilistic calling context
    • M. D. Bond and K. S. McKinley. Probabilistic calling context. In OOPSLA, pages 97-112, 2007.
    • (2007) OOPSLA , pp. 97-112
    • Bond, M.D.1    McKinley, K.S.2
  • 7
    • 63549090530 scopus 로고    scopus 로고
    • Tolerating memory leaks
    • M. D. Bond and K. S. McKinley. Tolerating memory leaks. In OOPSLA, pages 109-126, 2008.
    • (2008) OOPSLA , pp. 109-126
    • Bond, M.D.1    McKinley, K.S.2
  • 8
    • 67650789331 scopus 로고    scopus 로고
    • Leak pruning
    • M. D. Bond and K. S. McKinley. Leak pruning. In ASPLOS, pages 277-288, 2009.
    • (2009) ASPLOS , pp. 277-288
    • Bond, M.D.1    McKinley, K.S.2
  • 9
    • 42149110244 scopus 로고    scopus 로고
    • Tracking bad apples: Reporting the origin of null and undefined value errors
    • M. D. Bond, N. Nethercote, S. W. Kent, S. Z. Guyer, and K. S. McKinley. Tracking bad apples: Reporting the origin of null and undefined value errors. In OOPSLA, pages 405-422, 2007.
    • (2007) OOPSLA , pp. 405-422
    • Bond, M.D.1    Nethercote, N.2    Kent, S.W.3    Guyer, S.Z.4    McKinley, K.S.5
  • 11
    • 67650812903 scopus 로고    scopus 로고
    • A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications
    • B. Dufour, B. G. Ryder, and G. Sevitsky. A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications. In FSE, pages 59-70, 2008.
    • (2008) FSE , pp. 59-70
    • Dufour, B.1    Ryder, B.G.2    Sevitsky, G.3
  • 12
    • 37849052544 scopus 로고    scopus 로고
    • Measuring empirical computational complexity
    • S. F. Goldsmith, A. S. Aiken, and D. S. Wilkerson. Measuring empirical computational complexity. In FSE, pages 395-404, 2007.
    • (2007) FSE , pp. 395-404
    • Goldsmith, S.F.1    Aiken, A.S.2    Wilkerson, D.S.3
  • 13
    • 34548259241 scopus 로고    scopus 로고
    • Cork: Dynamic memory leak detection for garbage-collected languages
    • M. Jump and K. S. McKinley. Cork: Dynamic memory leak detection for garbage-collected languages. In POPL, pages 31-38, 2007.
    • (2007) POPL , pp. 31-38
    • Jump, M.1    McKinley, K.S.2
  • 14
    • 0025510535 scopus 로고
    • Dynamic slicing of computer programs
    • B. Korel and J. Laski. Dynamic slicing of computer programs. J. Syst. Softw., 13(3):187-195, 1990.
    • (1990) J. Syst. Softw. , vol.13 , Issue.3 , pp. 187-195
    • Korel, B.1    Laski, J.2
  • 15
    • 0032681069 scopus 로고    scopus 로고
    • Whole program paths
    • J. Larus. Whole program paths. In PLDI, pages 259-269, 1999.
    • (1999) PLDI , pp. 259-269
    • Larus, J.1
  • 16
    • 67049100821 scopus 로고    scopus 로고
    • Spending Moore's dividend
    • J. Larus. Spending Moore's dividend. Commun. ACM, 52(5):62-69, 2009.
    • (2009) Commun. ACM , vol.52 , Issue.5 , pp. 62-69
    • Larus, J.1
  • 17
    • 13844296853 scopus 로고    scopus 로고
    • Parameterized object sensitivity for points-to analysis for Java
    • A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points-to analysis for Java. TOSEM, 14(1):1-41, 2005.
    • (2005) TOSEM , vol.14 , Issue.1 , pp. 1-41
    • Milanova, A.1    Rountev, A.2    Ryder, B.G.3
  • 19
    • 75149134776 scopus 로고    scopus 로고
    • Four trends leading to Java runtime bloat
    • N. Mitchell, E. Schonberg, and G. Sevitsky. Four trends leading to Java runtime bloat. In IEEE Software, 27(1):56-63, 2010.
    • (2010) IEEE Software , vol.27 , Issue.1 , pp. 56-63
    • Mitchell, N.1    Schonberg, E.2    Sevitsky, G.3
  • 20
    • 35248848478 scopus 로고    scopus 로고
    • Leakbot: An automated and lightweight tool for diagnosing memory leaks in large Java applications
    • N. Mitchell and G. Sevitsky. Leakbot: An automated and lightweight tool for diagnosing memory leaks in large Java applications. In ECOOP, pages 351-377, 2003.
    • (2003) ECOOP , pp. 351-377
    • Mitchell, N.1    Sevitsky, G.2
  • 21
    • 42149169980 scopus 로고    scopus 로고
    • The causes of bloat, the limits of health
    • N. Mitchell and G. Sevitsky. The causes of bloat, the limits of health. OOPSLA, pages 245-260, 2007.
    • (2007) OOPSLA , pp. 245-260
    • Mitchell, N.1    Sevitsky, G.2
  • 22
    • 33746587440 scopus 로고    scopus 로고
    • Modeling runtime behavior in framework-based applications
    • N. Mitchell, G. Sevitsky, and H. Srinivasan. Modeling runtime behavior in framework-based applications. In ECOOP, pages 429-451, 2006.
    • (2006) ECOOP , pp. 429-451
    • Mitchell, N.1    Sevitsky, G.2    Srinivasan, H.3
  • 23
    • 67650081268 scopus 로고    scopus 로고
    • Architectural support for shadow memory in multiprocessors
    • V. Nagarajan and R. Gupta. Architectural support for shadow memory in multiprocessors. In VEE, pages 1-10, 2009.
    • (2009) VEE , pp. 1-10
    • Nagarajan, V.1    Gupta, R.2
  • 24
    • 35448963872 scopus 로고    scopus 로고
    • How to shadow every byte of memory used by a program
    • N. Nethercote and J. Seward. How to shadow every byte of memory used by a program. In VEE, pages 65-74, 2007.
    • (2007) VEE , pp. 65-74
    • Nethercote, N.1    Seward, J.2
  • 25
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 26
    • 70450250104 scopus 로고    scopus 로고
    • Efficiently and precisely locating memory leaks and bloat
    • G. Novark, E. D. Berger, and B. G. Zorn. Efficiently and precisely locating memory leaks and bloat. In PLDI, pages 397-407, 2009.
    • (2009) PLDI , pp. 397-407
    • Novark, G.1    Berger, E.D.2    Zorn, B.G.3
  • 27
    • 40349087553 scopus 로고    scopus 로고
    • Lift: A low-overhead practical information flow tracking system for detecting security attacks
    • F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO, pages 135-148, 2006.
    • (2006) MICRO , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.4    Zhou, Y.5    Wu, Y.6
  • 28
    • 70450235107 scopus 로고    scopus 로고
    • Chameleon: Adaptive selection of collections
    • O. Shacham,M. Vechev, and E. Yahav. Chameleon: Adaptive selection of collections. In PLDI, pages 408-418, 2009.
    • (2009) PLDI , pp. 408-418
    • Shacham, O.1    Vechev, M.2    Yahav, E.3
  • 29
    • 63549145872 scopus 로고    scopus 로고
    • JOLT: Lightweight dynamic analysis and removal of object churn
    • A. Shankar, M. Arnold, and R. Bodik. JOLT: Lightweight dynamic analysis and removal of object churn. In OOPSLA, pages 127-142, 2008.
    • (2008) OOPSLA , pp. 127-142
    • Shankar, A.1    Arnold, M.2    Bodik, R.3
  • 31
    • 67650837951 scopus 로고    scopus 로고
    • Binary analysis for measurement and attribution of program performance
    • N. R. Tallent, J. M. Mellor-Crummey, and M. W. Fagan. Binary analysis for measurement and attribution of program performance. In PLDI, pages 441-452, 2009.
    • (2009) PLDI , pp. 441-452
    • Tallent, N.R.1    Mellor-Crummey, J.M.2    Fagan, M.W.3
  • 32
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • F. Tip. A survey of program slicing techniques. Journal of Programming Languages, 3:121-189, 1995.
    • (1995) Journal of Programming Languages , vol.3 , pp. 121-189
    • Tip, F.1
  • 34
    • 70450255124 scopus 로고    scopus 로고
    • Go with the flow: Profiling copies to find runtime bloat
    • G. Xu, M. Arnold, N. Mitchell, A. Rountev, and G. Sevitsky. Go with the flow: Profiling copies to find runtime bloat. In PLDI, pages 419-430, 2009.
    • (2009) PLDI , pp. 419-430
    • Xu, G.1    Arnold, M.2    Mitchell, N.3    Rountev, A.4    Sevitsky, G.5
  • 35
    • 67650714764 scopus 로고    scopus 로고
    • Precise memory leak detection for Java software using container profiling
    • G. Xu and A. Rountev. Precise memory leak detection for Java software using container profiling. In ICSE, pages 151-160, 2008.
    • (2008) ICSE , pp. 151-160
    • Xu, G.1    Rountev, A.2
  • 36
    • 77954748220 scopus 로고    scopus 로고
    • Detecting inefficiently-used containers to avoid bloat
    • G. Xu and A. Rountev. Detecting inefficiently-used containers to avoid bloat. In PLDI, 2010.
    • (2010) PLDI
    • Xu, G.1    Rountev, A.2
  • 37
    • 33746089176 scopus 로고    scopus 로고
    • Pruning dynamic slices with confidence
    • X. Zhang, N. Gupta, and R. Gupta. Pruning dynamic slices with confidence. In PLDI, pages 169-180, 2006.
    • (2006) PLDI , pp. 169-180
    • Zhang, X.1    Gupta, N.2    Gupta, R.3
  • 38
    • 4544283390 scopus 로고    scopus 로고
    • Cost effective dynamic program slicing
    • X. Zhang and R. Gupta. Cost effective dynamic program slicing. In PLDI, pages 94-106, 2004.
    • (2004) PLDI , pp. 94-106
    • Zhang, X.1    Gupta, R.2
  • 39
    • 21644486871 scopus 로고    scopus 로고
    • Whole execution traces
    • X. Zhang and R. Gupta. Whole execution traces. In MICRO, pages 105-116, 2004.
    • (2004) MICRO , pp. 105-116
    • Zhang, X.1    Gupta, R.2
  • 40
    • 0038262825 scopus 로고    scopus 로고
    • Precise dynamic slicing algorithms
    • X. Zhang, R. Gupta, and Y. Zhang. Precise dynamic slicing algorithms. In ICSE, pages 319-329, 2003.
    • (2003) ICSE , pp. 319-329
    • Zhang, X.1    Gupta, R.2    Zhang, Y.3
  • 41
    • 34547309741 scopus 로고    scopus 로고
    • Dynamic slicing long running programs through execution fast forwarding
    • X. Zhang, S. Tallam, and R. Gupta. Dynamic slicing long running programs through execution fast forwarding. In FSE, pages 81-91, 2006.
    • (2006) FSE , pp. 81-91
    • Zhang, X.1    Tallam, S.2    Gupta, R.3
  • 42
    • 33746100320 scopus 로고    scopus 로고
    • Accurate, efficient, and adaptive calling context profiling
    • X. Zhuang, M. J. Serrano, H. W. Cain, and J.-D. Choi. Accurate, efficient, and adaptive calling context profiling. In PLDI, pages 263-271, 2006.
    • (2006) PLDI , pp. 263-271
    • Zhuang, X.1    Serrano, M.J.2    Cain, H.W.3    Choi, J.-D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.