메뉴 건너뛰기




Volumn , Issue , 2010, Pages 115-124

Diagnosing memory leaks using graph mining on heap dumps

Author keywords

Dominator tree; Graph grammars; Graph mining; Heap profiling; Memory leaks

Indexed keywords

DOMINATOR TREE; GRAPH GRAMMAR; GRAPH MINING; HEAP PROFILING; MEMORY LEAKS;

EID: 77956202108     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1835804.1835822     Document Type: Conference Paper
Times cited : (46)

References (37)
  • 1
    • 70349434052 scopus 로고    scopus 로고
    • Frequent pattern-growth approach for document organization
    • M. Akbar and R. Angryk. Frequent pattern-growth approach for document organization. In CIKM '08, pages 77-82, 2008.
    • (2008) CIKM '08 , pp. 77-82
    • Akbar, M.1    Angryk, R.2
  • 2
    • 33745432231 scopus 로고    scopus 로고
    • LibX - A firefox extension for enhanced library access
    • A. Bailey and G. Back. LibX - a Firefox extension for enhanced library access. Library Hi Tech, 24(2):290-304, 2006.
    • (2006) Library Hi Tech , vol.24 , Issue.2 , pp. 290-304
    • Bailey, A.1    Back, G.2
  • 3
    • 33846521634 scopus 로고    scopus 로고
    • Bell: Bit-encoding online memory leak detection
    • M. Bond and K. McKinley. Bell: bit-encoding online memory leak detection. In ASPLOS-XII '06, pages 61-72, 2006.
    • (2006) ASPLOS-XII '06 , pp. 61-72
    • Bond, M.1    McKinley, K.2
  • 4
    • 63549090530 scopus 로고    scopus 로고
    • Tolerating memory leaks
    • M. Bond and K. McKinley. Tolerating memory leaks. In OOPSLA '08, pages 109-126, 2008.
    • (2008) OOPSLA '08 , pp. 109-126
    • Bond, M.1    McKinley, K.2
  • 5
    • 85008256270 scopus 로고    scopus 로고
    • Identifying bug signatures using discriminative graph mining
    • New York, NY, USA
    • H. Cheng, D. Lo, Y. Zhou, X. Wang, and X. Yan. Identifying bug signatures using discriminative graph mining. In ISSTA '09, pages 141-152, New York, NY, USA, 2009.
    • (2009) ISSTA '09 , pp. 141-152
    • Cheng, H.1    Lo, D.2    Zhou, Y.3    Wang, X.4    Yan, X.5
  • 6
    • 52649163329 scopus 로고    scopus 로고
    • Direct discriminative pattern mining for effective classification
    • H. Cheng, X. Yan, J. Han, and P. Yu. Direct discriminative pattern mining for effective classification. In ICDE '07, pages 169-178, 2008.
    • (2008) ICDE '07 , pp. 169-178
    • Cheng, H.1    Yan, X.2    Han, J.3    Yu, P.4
  • 7
    • 49749102365 scopus 로고    scopus 로고
    • GApprox: Mining frequent approximate patterns from a massive network
    • C. Chent, X. Yan, F. Zhu, and J. Han. gApprox: Mining frequent approximate patterns from a massive network. In ICDM '07, pages 445-450, 2007.
    • (2007) ICDM '07 , pp. 445-450
    • Chent, C.1    Yan, X.2    Zhu, F.3    Han, J.4
  • 8
    • 35448996514 scopus 로고    scopus 로고
    • Practical memory leak detection using guarded value-flow analysis
    • S. Cherem, L. Princehouse, and R. Rugina. Practical memory leak detection using guarded value-flow analysis. In PLDI '07, pages 480-491, 2007.
    • (2007) PLDI '07 , pp. 480-491
    • Cherem, S.1    Princehouse, L.2    Rugina, R.3
  • 9
    • 0027652468 scopus 로고
    • Substructure discovery using minimum description length and background knowledge
    • D. Cook and L. Holder. Substructure discovery using minimum description length and background knowledge. JAIR, 1:231-255, 1994.
    • (1994) JAIR , vol.1 , pp. 231-255
    • Cook, D.1    Holder, L.2
  • 11
    • 0039253846 scopus 로고    scopus 로고
    • Mining frequent patterns without candidate generation
    • J. Han, J. Pei, and Y. Yin. Mining frequent patterns without candidate generation. In SIGMOD '00, pages 1-12, 2000.
    • (2000) SIGMOD '00 , pp. 1-12
    • Han, J.1    Pei, J.2    Yin, Y.3
  • 12
    • 0000596666 scopus 로고
    • Purify: A tool for detecting memory leaks and access errors in c and c++ programs
    • R. Hastings and B. Joyce. Purify: A tool for detecting memory leaks and access errors in c and c++ programs. In Winter USENIX Conference, pages 125-138, 1992.
    • (1992) Winter USENIX Conference , pp. 125-138
    • Hastings, R.1    Joyce, B.2
  • 13
    • 12344327721 scopus 로고    scopus 로고
    • Low-overhead memory leak detection using adaptive statistical profiling
    • M. Hauswirth and T. Chilimbi. Low-overhead memory leak detection using adaptive statistical profiling. In ASPLOS-XI '04, pages 156-164, 2004.
    • (2004) ASPLOS-XI '04 , pp. 156-164
    • Hauswirth, M.1    Chilimbi, T.2
  • 14
    • 1442337850 scopus 로고    scopus 로고
    • A practical flow-sensitive and context-sensitive C and C++ memory leak detector
    • D. Heine and M. Lam. A practical flow-sensitive and context-sensitive C and C++ memory leak detector. In PLDI '03, pages 168-181, 2003.
    • (2003) PLDI '03 , pp. 168-181
    • Heine, D.1    Lam, M.2
  • 15
    • 32844460819 scopus 로고    scopus 로고
    • MDL-based context-free graph grammar induction and applications
    • I. Jonyer, L. Holder, and D. Cook. MDL-based context-free graph grammar induction and applications. IJAIT, 13(1):65-79, 2004.
    • (2004) IJAIT , vol.13 , Issue.1 , pp. 65-79
    • Jonyer, I.1    Holder, L.2    Cook, D.3
  • 16
    • 34548259241 scopus 로고    scopus 로고
    • Cork: Dynamic memory leak detection for garbage-collected languages
    • M. Jump and K. McKinley. Cork: dynamic memory leak detection for garbage-collected languages. In POPL '07, pages 31-38, 2007.
    • (2007) POPL '07 , pp. 31-38
    • Jump, M.1    McKinley, K.2
  • 18
    • 78149312583 scopus 로고    scopus 로고
    • Frequent subgraph discovery
    • M. Kuramochi and G. Karypis. Frequent subgraph discovery. In ICDM '01, pages 313-320, 2001.
    • (2001) ICDM '01 , pp. 313-320
    • Kuramochi, M.1    Karypis, G.2
  • 19
    • 84976651458 scopus 로고
    • A fast algorithm for finding dominators in a flowgraph
    • T. Lengauer and R. Tarjan. A fast algorithm for finding dominators in a flowgraph. ACM Trans. Program. Lang. Syst., 1(1):121-141, 1979.
    • (1979) ACM Trans. Program. Lang. Syst. , vol.1 , Issue.1 , pp. 121-141
    • Lengauer, T.1    Tarjan, R.2
  • 20
    • 84880122671 scopus 로고    scopus 로고
    • Mining behavior graphs for "backtrace" of noncrashing bugs
    • C. Liu, X. Yan, H. Yu, J. Han, and P. Yu. Mining behavior graphs for "backtrace" of noncrashing bugs. In SDM '05, pages 286-297.
    • SDM '05 , pp. 286-297
    • Liu, C.1    Yan, X.2    Yu, H.3    Han, J.4    Yu, P.5
  • 21
    • 47349083499 scopus 로고    scopus 로고
    • The runtime structure of object ownership
    • D. Thomas, editor
    • N. Mitchell. The runtime structure of object ownership. In D. Thomas, editor, ECOOP '06, 2006.
    • (2006) ECOOP '06
    • Mitchell, N.1
  • 22
    • 33746632902 scopus 로고    scopus 로고
    • LeakBot: An automated and lightweight tool for diagnosing memory leaks in large java applications
    • N. Mitchell and G. Sevitsky. LeakBot: An automated and lightweight tool for diagnosing memory leaks in large java applications. In ECOOP '03, 2003.
    • (2003) ECOOP '03
    • Mitchell, N.1    Sevitsky, G.2
  • 23
    • 42149169980 scopus 로고    scopus 로고
    • The causes of bloat, the limits of health
    • N. Mitchell and G. Sevitsky. The causes of bloat, the limits of health. In OOPSLA '07, pages 245-260, 2007.
    • (2007) OOPSLA '07 , pp. 245-260
    • Mitchell, N.1    Sevitsky, G.2
  • 24
    • 67650085819 scopus 로고    scopus 로고
    • Valgrind: A framework for heavyweight dynamic binary instrumentation
    • N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In PLDI '07, pages 89-100, 2007.
    • (2007) PLDI '07 , pp. 89-100
    • Nethercote, N.1    Seward, J.2
  • 25
    • 33749842455 scopus 로고    scopus 로고
    • Memory leak analysis by contradiction
    • Springer
    • M. Orlovich and R. Rugina. Memory leak analysis by contradiction. In Lecture Notes in Computer Science, volume 4134, pages 405-424. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4134 , pp. 405-424
    • Orlovich, M.1    Rugina, R.2
  • 26
    • 0034499541 scopus 로고    scopus 로고
    • Visualizing reference patterns for solving memory leaks in java
    • W. De Pauw and G. Sevitsky. Visualizing reference patterns for solving memory leaks in java. Concurrency - Practice and Experience, 12(14):1431-1454, 2000.
    • (2000) Concurrency - Practice and Experience , vol.12 , Issue.14 , pp. 1431-1454
    • De Pauw, W.1    Sevitsky, G.2
  • 27
    • 84917687527 scopus 로고    scopus 로고
    • Fault localization with nearest neighbor queries
    • M. Renieris and S. Reiss. Fault localization with nearest neighbor queries. In ASE '03, pages 30-39, 2003.
    • (2003) ASE '03 , pp. 30-39
    • Renieris, M.1    Reiss, S.2
  • 29
    • 77954022242 scopus 로고    scopus 로고
    • Program, enhance thyself! demand-driven pattern-oriented program enhancement
    • April
    • E. Tilevich and G. Back. Program, enhance thyself! demand-driven pattern-oriented program enhancement. In AOSD '08, pages 13-24, April 2008.
    • (2008) AOSD '08 , pp. 13-24
    • Tilevich, E.1    Back, G.2
  • 30
    • 34547674949 scopus 로고    scopus 로고
    • Memtracker: Efficient and programmable support for memory access monitoring and debugging
    • G. Venkataramani, B. Roemer, Y. Solihin, and M. Prvulovic. Memtracker: Efficient and programmable support for memory access monitoring and debugging. In HPCA '07, pages 273-284, 2007.
    • (2007) HPCA '07 , pp. 273-284
    • Venkataramani, G.1    Roemer, B.2    Solihin, Y.3    Prvulovic, M.4
  • 31
    • 69449096143 scopus 로고    scopus 로고
    • Data mining for software engineering
    • Aug
    • T. Xie, S. Thummalapenta, D. Lo, and C. Liu. Data Mining for Software Engineering. IEEE Computer, Vol. 42(8):35-42, Aug 2009.
    • (2009) IEEE Computer , vol.42 , Issue.8 , pp. 35-42
    • Xie, T.1    Thummalapenta, S.2    Lo, D.3    Liu, C.4
  • 32
    • 32344440613 scopus 로고    scopus 로고
    • Context- and path-sensitive memory leak detection
    • Y. Xie and A. Aiken. Context- and path-sensitive memory leak detection. In ESEC/FSE-13, pages 115-125, 2005.
    • (2005) ESEC/FSE-13 , pp. 115-125
    • Xie, Y.1    Aiken, A.2
  • 33
    • 67650714764 scopus 로고    scopus 로고
    • Precise memory leak detection for java software using container profiling
    • G. Xu and A. Rountev. Precise memory leak detection for Java software using container profiling. In ICSE '08, pages 151-160, 2008.
    • (2008) ICSE '08 , pp. 151-160
    • Xu, G.1    Rountev, A.2
  • 34
    • 57149124218 scopus 로고    scopus 로고
    • Mining significant graph patterns by leap search
    • X. Yan, H. Cheng, J. Han, and P. Yu. Mining significant graph patterns by leap search. In SIGMOD '08, pages 433-444, 2008.
    • (2008) SIGMOD '08 , pp. 433-444
    • Yan, X.1    Cheng, H.2    Han, J.3    Yu, P.4
  • 35
    • 78149333073 scopus 로고    scopus 로고
    • GSpan: Graph-based substructure pattern mining
    • X. Yan and J. Han. gSpan: graph-based substructure pattern mining. In ICDM '02, pages 721-724, 2002.
    • (2002) ICDM '02 , pp. 721-724
    • Yan, X.1    Han, J.2
  • 36
    • 77952334885 scopus 로고    scopus 로고
    • CloseGraph: Mining closed frequent graph patterns
    • 956784
    • X. Yan and J. Han. CloseGraph: mining closed frequent graph patterns. In SIGKDD '03, pages 286-295, 2003. 956784.
    • (2003) SIGKDD '03 , pp. 286-295
    • Yan, X.1    Han, J.2
  • 37
    • 34547455408 scopus 로고    scopus 로고
    • Out-of-core coherent closed quasi-clique mining from large dense graph databases
    • Z. Zeng, J. Wang, L. Zhou, and G. Karypis. Out-of-core coherent closed quasi-clique mining from large dense graph databases. ACM TODS, 32(2), 2007.
    • (2007) ACM TODS , vol.32 , Issue.2
    • Zeng, Z.1    Wang, J.2    Zhou, L.3    Karypis, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.