메뉴 건너뛰기




Volumn 6813 LNCS, Issue , 2011, Pages 383-407

Patterns of memory inefficiency

Author keywords

memory bloat; memory footprint; pattern detection; tools

Indexed keywords

MEMORY BLOATS; MEMORY CONSUMPTION; MEMORY FOOTPRINT; MEMORY PROBLEMS; PATTERN DETECTION;

EID: 79961140519     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22655-7_18     Document Type: Conference Paper
Times cited : (36)

References (18)
  • 1
    • 79961164861 scopus 로고    scopus 로고
    • Apache: Commonslibrary
    • Apache: Commonslibrary,http://commons.apache.org
  • 2
    • 84948983939 scopus 로고    scopus 로고
    • Visual-izing the execution of java programs
    • In: Diehl, S. (ed.) Dagstuhl Seminar 2001 Springer, Heidelberg
    • De Pauw, W., Jensen, E., Mitchell, N., Sevitsky, G., Vlissides, J., Yang, J.: Visual-izing the Execution of Java Programs. In: Diehl, S. (ed.) Dagstuhl Seminar 2001. LNCS, vol. 2269, pp. 151-162. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2269 , pp. 151-162
    • De Pauw, W.1    Jensen, E.2    Mitchell, N.3    Sevitsky, G.4    Vlissides, J.5    Yang, J.6
  • 3
    • 79961160823 scopus 로고    scopus 로고
    • Eclipse Project: Eclipse memory analyzer
    • Eclipse Project: Eclipse memory analyzer, http://www.eclipse.org/mat/
  • 5
    • 79961165222 scopus 로고    scopus 로고
    • GNU: Trove library
    • GNU: Trove library, http://trove4j.sourceforge.net
  • 6
    • 0036623749 scopus 로고    scopus 로고
    • Scalable visualizations of object-oriented systems with ownership trees
    • Hill, T., Noble, J., Potter, J.: Scalable visualizations of object-oriented systems with ownership trees. J. Vis. Lang. Comput. 13(3), 319-339 (2002)
    • (2002) J. Vis. Lang. Comput. , vol.13 , Issue.3 , pp. 319-339
    • Hill, T.1    Noble, J.2    Potter, J.3
  • 8
    • 69949181869 scopus 로고    scopus 로고
    • Systematically refactoring inheritance to delegation in a class-based object-oriented programming language
    • Kegel, H., Steimann, F.: Systematically refactoring inheritance to delegation in a class-based object-oriented programming language. In: International Conference on Software Engineering (2008)
    • (2008) International Conference on Software Engineering
    • Kegel, H.1    Steimann, F.2
  • 9
    • 84976651458 scopus 로고
    • A fast algorithm for finding dominators in a flowgraph
    • Lengauer, T., Tarjan, R.E.: A fast algorithm for finding dominators in a flowgraph. ACM Trans. Program. Lang. Syst. 1(1), 121-141 (1979)
    • (1979) ACM Trans. Program. Lang. Syst. , vol.1 , Issue.1 , pp. 121-141
    • Lengauer, T.1    Tarjan, R.E.2
  • 10
    • 69949153115 scopus 로고    scopus 로고
    • Making sense of large heaps
    • In: Drossopoulou, S. (ed.) ECOOP 2009 Springer, Hei-delberg
    • Mitchell, N., Schonberg, E., Sevitsky, G.: Making sense of large heaps. In: Drossopoulou, S. (ed.) ECOOP 2009. LNCS, vol. 5653, pp. 77-97. Springer, Hei-delberg (2009)
    • (2009) LNCS , vol.5653 , pp. 77-97
    • Mitchell, N.1    Schonberg, E.2    Sevitsky, G.3
  • 11
    • 75149134776 scopus 로고    scopus 로고
    • Four trends leading to java runtime bloat
    • Mitchell, N., Schonberg, E., Sevitsky, G.: Four trends leading to java runtime bloat. IEEE Software 27, 56-63 (2010)
    • IEEE Software , vol.27 , Issue.56-63 , pp. 2010
    • Mitchell, N.1    Schonberg, E.2    Sevitsky, G.3
  • 12
    • 35248848478 scopus 로고    scopus 로고
    • Leakbot: An automated and lightweight tool for diag-nosing memory leaks in large Java applications
    • In: Cardelli, L. (ed.) ECOOP 2003 Springer, Heidelberg
    • Mitchell, N., Sevitsky, G.: Leakbot: An automated and lightweight tool for diag-nosing memory leaks in large Java applications. In: Cardelli, L. (ed.) ECOOP 2003. LNCS, vol. 2743, Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2743
    • Mitchell, N.1    Sevitsky, G.2
  • 17
    • 67650714764 scopus 로고    scopus 로고
    • Precise memory leak detection for java software using con-tainer profiling
    • ACM, New York
    • Xu, G., Rountev, A.: Precise memory leak detection for java software using con-tainer profiling. In: International Conference on Software Engineering, pp. 151-160. ACM, New York (2008)
    • (2008) International Conference on Software Engineering , pp. 151-160
    • Xu, G.1    Rountev, A.2
  • 18
    • 79961137407 scopus 로고    scopus 로고
    • Yourkit LLC: Yourkit profiler
    • Yourkit LLC: Yourkit profiler, http://www.yourkit.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.