-
1
-
-
20744446298
-
A survey of adaptive optimization in virtual machines
-
M. Arnold, S. Fink, D. Grove, M. Hind, and P. F. Sweeney. A survey of adaptive optimization in virtual machines. Proc. IEEE, 92(2):449-466, 2005.
-
(2005)
Proc. IEEE
, vol.92
, Issue.2
, pp. 449-466
-
-
Arnold, M.1
Fink, S.2
Grove, D.3
Hind, M.4
Sweeney, P.F.5
-
2
-
-
42149110244
-
Tracking bad apples: Reporting the origin of null and undefined value errors
-
M. D. Bond, N. Nethercote, S. W. Kent, S. Z. Guyer, and K. S. McKinley. Tracking bad apples: reporting the origin of null and undefined value errors. In ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications, pages 405-422, 2007.
-
(2007)
ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications
, pp. 405-422
-
-
Bond, M.D.1
Nethercote, N.2
Kent, S.W.3
Guyer, S.Z.4
McKinley, K.S.5
-
3
-
-
48649085342
-
Fine-grained information flow analysis and enforcement in a Java virtual machine
-
D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a Java virtual machine. In Annual Computer Security Applications Conf., pages 463-475, 2007.
-
(2007)
Annual Computer Security Applications Conf.
, pp. 463-475
-
-
Chandra, D.1
Franz, M.2
-
4
-
-
77954021248
-
Effective memory protection using dynamic tainting
-
J. Clause, I. Doudalis, A. Orso, and M. Prvulovic. Effective memory protection using dynamic tainting. In Int. Conf. Automated Software Engineering, pages 283-292, 2007.
-
(2007)
Int. Conf. Automated Software Engineering
, pp. 283-292
-
-
Clause, J.1
Doudalis, I.2
Orso, A.3
Prvulovic, M.4
-
7
-
-
84864182919
-
-
DaCapo Benchmarks, www.dacapo-bench.org.
-
-
-
-
9
-
-
1442337585
-
Dynamic metrics for Java
-
B. Dufour, K. Driesen, L. Hendren, and C. Verbrugge. Dynamic metrics for Java. In ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications, pages 149-168, 2003.
-
(2003)
ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications
, pp. 149-168
-
-
Dufour, B.1
Driesen, K.2
Hendren, L.3
Verbrugge, C.4
-
12
-
-
84864186340
-
-
ej technologies. JProfiler. www.ej-technologies.com.
-
JProfiler
-
-
-
16
-
-
84864186911
-
-
Jikes RVM, jikesrvm.org
-
Jikes RVM, jikesrvm.org.
-
-
-
-
17
-
-
77950552734
-
Sharing analysis of arrays, collections, and recursive structures
-
M. Marron, M. Mendez-Lojo, M. Hermenegildo, D. Stefanovic, and D. Kapur. Sharing analysis of arrays, collections, and recursive structures. In ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, 2008.
-
ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, 2008
-
-
Marron, M.1
Mendez-Lojo, M.2
Hermenegildo, M.3
Stefanovic, D.4
Kapur, D.5
-
19
-
-
13844296853
-
Parameterized object sensitivity for points-to analysis for Java
-
A. Milanova, A. Rountev, and B. G. Ryder. Parameterized object sensitivity for points-to analysis for Java. ACM Trans. Software Engineering and Methodology, 14(1):1-41, 2005.
-
(2005)
ACM Trans. Software Engineering and Methodology
, vol.14
, Issue.1
, pp. 1-41
-
-
Milanova, A.1
Rountev, A.2
Ryder, B.G.3
-
20
-
-
75149134776
-
Four trends leading to Java runtime bloat
-
N. Mitchell, E. Schonberg, and G. Sevitsky. Four trends leading to Java runtime bloat. IEEE Software, 27(1):56-63, 2010.
-
(2010)
IEEE Software
, vol.27
, Issue.1
, pp. 56-63
-
-
Mitchell, N.1
Schonberg, E.2
Sevitsky, G.3
-
21
-
-
67650033105
-
The causes of bloat, the limits of health
-
N. Mitchell and G. Sevitsky. The causes of bloat, the limits of health. ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications, pages 245-260, 2007.
-
(2007)
ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications
, pp. 245-260
-
-
Mitchell, N.1
Sevitsky, G.2
-
23
-
-
39149090024
-
A virtual machine based information flow control system for policy enforcement
-
S. K. Nair, P. N. Simpson, B. Crispo, and A. S. Tanenbaum. A virtual machine based information flow control system for policy enforcement. Electronic Notes in Theoretical Computer Science, 197(1):3-16, 2008.
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, Issue.1
, pp. 3-16
-
-
Nair, S.K.1
Simpson, P.N.2
Crispo, B.3
Tanenbaum, A.S.4
-
25
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed Systems Security Symp., 2005.
-
Network and Distributed Systems Security Symp., 2005
-
-
Newsome, J.1
Song, D.2
-
26
-
-
40349087553
-
Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In Int. Symp. Microarchitecture, pages 135-148, 2006.
-
(2006)
Int. Symp. Microarchitecture
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.4
Zhou, Y.5
Wu, Y.6
-
28
-
-
78650119383
-
Understanding parallelism-inhibiting dependences in sequential Java programs
-
A. Rountev, K. Van Valkenburgh, D. Yan, and P. Sadayappan. Understanding parallelism-inhibiting dependences in sequential Java programs. In Int. Conf. Software Maintainance, page 9, 2010.
-
(2010)
Int. Conf. Software Maintainance
, pp. 9
-
-
Rountev, A.1
Van Valkenburgh, K.2
Yan, D.3
Sadayappan, P.4
-
29
-
-
63549145872
-
JOLT: Lightweight dynamic analysis and removal of object churn
-
A. Shankar, M. Arnold, and R. Bodik. JOLT: Lightweight dynamic analysis and removal of object churn. In ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications, pages 127-142, 2008.
-
(2008)
ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications
, pp. 127-142
-
-
Shankar, A.1
Arnold, M.2
Bodik, R.3
-
31
-
-
77954709852
-
Finding low-utility data structures
-
G. Xu, M. Arnold, N. Mitchell, A. Rountev, E. Schonberg, and G. Sevitsky. Finding low-utility data structures. In ACM SIGPLAN Conf. Programming Language Design and Implementation, pages 174-186, 2010.
-
(2010)
ACM SIGPLAN Conf. Programming Language Design and Implementation
, pp. 174-186
-
-
Xu, G.1
Arnold, M.2
Mitchell, N.3
Rountev, A.4
Schonberg, E.5
Sevitsky, G.6
-
32
-
-
70450255124
-
Go with the flow: Profiling copies to find runtime bloat
-
G. Xu, M. Arnold, N. Mitchell, A. Rountev, and G. Sevitsky. Go with the flow: Profiling copies to find runtime bloat. In ACM SIGPLAN Conf. Programming Language Design and Implementation, pages 419-430, 2009.
-
(2009)
ACM SIGPLAN Conf. Programming Language Design and Implementation
, pp. 419-430
-
-
Xu, G.1
Arnold, M.2
Mitchell, N.3
Rountev, A.4
Sevitsky, G.5
-
33
-
-
67650714764
-
Precise memory leak detection for Java software using container profiling
-
G. Xu and A. Rountev. Precise memory leak detection for Java software using container profiling. In Int. Conf. Software Engineering, pages 151-160, 2008.
-
(2008)
Int. Conf. Software Engineering
, pp. 151-160
-
-
Xu, G.1
Rountev, A.2
-
34
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security, pages 121-136, 2006.
-
(2006)
USENIX Security
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|