메뉴 건너뛰기




Volumn , Issue , 2012, Pages 134-144

Uncovering performance problems in Java applications with reference propagation profiling

Author keywords

[No Author keywords available]

Indexed keywords

CODE OPTIMIZATION; DIAGNOSTIC TOOLS; JAVA APPLICATIONS; JAVA PROGRAM; MEMORY USAGE; OBJECT CREATION; OBJECT REFERENCE; PERFORMANCE PROBLEMS; PROPAGATION GRAPH; RUN-TIME EXECUTION; RUNTIMES;

EID: 84864193967     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2012.6227199     Document Type: Conference Paper
Times cited : (50)

References (34)
  • 1
    • 20744446298 scopus 로고    scopus 로고
    • A survey of adaptive optimization in virtual machines
    • M. Arnold, S. Fink, D. Grove, M. Hind, and P. F. Sweeney. A survey of adaptive optimization in virtual machines. Proc. IEEE, 92(2):449-466, 2005.
    • (2005) Proc. IEEE , vol.92 , Issue.2 , pp. 449-466
    • Arnold, M.1    Fink, S.2    Grove, D.3    Hind, M.4    Sweeney, P.F.5
  • 3
    • 48649085342 scopus 로고    scopus 로고
    • Fine-grained information flow analysis and enforcement in a Java virtual machine
    • D. Chandra and M. Franz. Fine-grained information flow analysis and enforcement in a Java virtual machine. In Annual Computer Security Applications Conf., pages 463-475, 2007.
    • (2007) Annual Computer Security Applications Conf. , pp. 463-475
    • Chandra, D.1    Franz, M.2
  • 7
    • 84864182919 scopus 로고    scopus 로고
    • DaCapo Benchmarks, www.dacapo-bench.org.
  • 11
    • 67650812903 scopus 로고    scopus 로고
    • A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications
    • B. Dufour, B. G. Ryder, and G. Sevitsky. A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications. In ACM SIGSOFT Int. Symp. Foundations of Software Engineering, pages 59-70, 2008.
    • (2008) ACM SIGSOFT Int. Symp. Foundations of Software Engineering , pp. 59-70
    • Dufour, B.1    Ryder, B.G.2    Sevitsky, G.3
  • 12
    • 84864186340 scopus 로고    scopus 로고
    • ej technologies. JProfiler. www.ej-technologies.com.
    • JProfiler
  • 16
    • 84864186911 scopus 로고    scopus 로고
    • Jikes RVM, jikesrvm.org
    • Jikes RVM, jikesrvm.org.
  • 20
    • 75149134776 scopus 로고    scopus 로고
    • Four trends leading to Java runtime bloat
    • N. Mitchell, E. Schonberg, and G. Sevitsky. Four trends leading to Java runtime bloat. IEEE Software, 27(1):56-63, 2010.
    • (2010) IEEE Software , vol.27 , Issue.1 , pp. 56-63
    • Mitchell, N.1    Schonberg, E.2    Sevitsky, G.3
  • 25
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed Systems Security Symp., 2005.
    • Network and Distributed Systems Security Symp., 2005
    • Newsome, J.1    Song, D.2
  • 26
    • 40349087553 scopus 로고    scopus 로고
    • Lift: A low-overhead practical information flow tracking system for detecting security attacks
    • F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In Int. Symp. Microarchitecture, pages 135-148, 2006.
    • (2006) Int. Symp. Microarchitecture , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.4    Zhou, Y.5    Wu, Y.6
  • 33
    • 67650714764 scopus 로고    scopus 로고
    • Precise memory leak detection for Java software using container profiling
    • G. Xu and A. Rountev. Precise memory leak detection for Java software using container profiling. In Int. Conf. Software Engineering, pages 151-160, 2008.
    • (2008) Int. Conf. Software Engineering , pp. 151-160
    • Xu, G.1    Rountev, A.2
  • 34
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security, pages 121-136, 2006.
    • (2006) USENIX Security , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.