-
2
-
-
0037586482
-
Alias annotations for program understanding
-
J. Aldrich, V. Kostadinov, and C. Chambers. 2002. Alias annotations for program understanding. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA02). 311-330.
-
(2002)
Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA02)
, pp. 311-330
-
-
Aldrich, J.1
Kostadinov, V.2
Chambers, C.3
-
4
-
-
20744446298
-
A survey of adaptive optimization in virtual machines
-
DOI 10.1109/JPROC.2004.840305, Program Generation, Optimization and Platform Adaptation
-
M. Arnold, S. Fink, D. Grove, M. Hind, and P. F. Sweeney. 2005. A survey of adaptive optimization in virtual machines. Proc. IEEE 92, 2, 449-466. (Pubitemid 40851235)
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.2
, pp. 449-466
-
-
Arnold, M.1
Fink, S.J.2
Grove, D.3
Hind, M.4
Sweeney, P.F.5
-
5
-
-
67650073133
-
QVM: An efficient runtime for detecting defects in deployed systems
-
M. Arnold, M. Vechev, and E. Yahav. 2008. QVM: An efficient runtime for detecting defects in deployed systems. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA08). 143-162.
-
(2008)
Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA08)
, pp. 143-162
-
-
Arnold, M.1
Vechev, M.2
Yahav, E.3
-
7
-
-
34248160938
-
The dacapo benchmarks: Java benchmarking development and analysis
-
S. M. Blackburn, R. Garner, C. Hoffman, A. M. Khan, K. S. McKinley, R. Bentzur, A. Diwan, D. Feinberg, D. Frampton, S. Z. Guyer, M. Hirzel, A. Hosking, M. Jump, H. Lee, J. E. B. Moss, A. Phansalkar, D. Stefanovic, T. Vandrunen, D. Von Dincklage, and B. Wiedermann. 2006. The dacapo benchmarks: Java benchmarking development and analysis. In Proceedings of the ACMSIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA06). 169-190.
-
(2006)
Proceedings of the ACMSIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA06)
, pp. 169-190
-
-
Blackburn, S.M.1
Garner, R.2
Hoffman, C.3
Khan, A.M.4
McKinley, K.S.5
Bentzur, R.6
Diwan, A.7
Feinberg, D.8
Frampton, D.9
Guyer, S.Z.10
Hirzel, M.11
Hosking, A.12
Jump, M.13
Lee, H.14
Moss, J.E.B.15
Phansalkar, A.16
Stefanovic, D.17
Vandrunen, T.18
Von Dincklage, D.19
Wiedermann, B.20
more..
-
11
-
-
67650046406
-
Tracking bad apples: Reporting the origin of null and undefined value errors
-
M. D. Bond, N. Nethercote, S.W. Kent, S. Z. Guyer, and K. S.McKinley. 2007. Tracking bad apples: Reporting the origin of null and undefined value errors. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA07). 405-422.
-
(2007)
Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA07)
, pp. 405-422
-
-
Bond, M.D.1
Nethercote, N.2
Kent, S.W.3
Guyer, S.Z.4
McKinley, K.S.5
-
18
-
-
0037586483
-
Ownership, encapsulation and the disjointness of type and effect
-
D. Clarke and S. Drossopoulou. 2002. Ownership, encapsulation and the disjointness of type and effect. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA02). 292-310.
-
(2002)
Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA02)
, pp. 292-310
-
-
Clarke, D.1
Drossopoulou, S.2
-
19
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
DOI 10.1145/1273463.1273490, Proceedings of the 2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07
-
J. Clause, W. Li, and A. Orso. 2007. Dytan: A generic dynamic taint analysis framework. In Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA07). 196-206. (Pubitemid 47317593)
-
(2007)
2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
20
-
-
1442337585
-
Dynamic metrics for java
-
B. Dufour, K. Driesen, L. Hendren, and C. Verbrugge. 2003. Dynamic metrics for java. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA03). 149-168.
-
(2003)
Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA03)
, pp. 149-168
-
-
Dufour, B.1
Driesen, K.2
Hendren, L.3
Verbrugge, C.4
-
21
-
-
34548247645
-
Blended analysis for performance understanding of framework-based applications
-
DOI 10.1145/1273463.1273480, Proceedings of the 2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07
-
B. Dufour, B. G. Ryder, and G. Sevitsky. 2007. Blended analysis for performance understanding of frameworkbased applications. In Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA07). 118-128. (Pubitemid 47317586)
-
(2007)
2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07
, pp. 118-128
-
-
Dufour, B.1
Ryder, B.G.2
Sevitsky, G.3
-
23
-
-
84901609430
-
-
JProfiler
-
Ej-Technologies Gmbh. 2011. JProfiler. http://www.ej-technologies.com.
-
(2011)
Ej-Technologies Gmbh
-
-
-
24
-
-
33846310068
-
Dynamic taint propagation for Java
-
DOI 10.1109/CSAC.2005.21, 1565257, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
V. Haldar, D. Chandra, and M. Franz. 2005. Dynamic taint propagation for java. In Proceedings of the Annual Computer Security Applications Conference (ACSAC05). 303-311. (Pubitemid 46116486)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 303-311
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
25
-
-
84864219793
-
Performance debugging in the large via mining millions of stack traces
-
S. Han, Y. Dang, S. Ge, D. Zhang, and T. Xie. 2012. Performance debugging in the large via mining millions of stack traces. In Proceedings of the International Conference on Software Engineering (ICSE12). 145-155.
-
(2012)
Proceedings of the International Conference on Software Engineering (ICSE12)
, pp. 145-155
-
-
Han, S.1
Dang, Y.2
Ge, S.3
Zhang, D.4
Xie, T.5
-
27
-
-
84901620663
-
-
The j9 java virtual machine
-
J9 Java Virtual Machine. 2011. The j9 java virtual machine. http://wiki.eclipse.org/J9.
-
(2011)
J9 Java Virtual Machine
-
-
-
29
-
-
84901609431
-
-
Java development blog. cld.blog-city.com
-
Java Development Blog. 2009. Java development blog. cld.blog-city.com.
-
(2009)
Java Development Blog
-
-
-
30
-
-
84901625088
-
-
Java Heap Analyzer Tool
-
Java Heap Analyzer Tool. 2014. Java heap analyzer tool (hat). http://hat.dev.java.net.
-
(2014)
Java Heap Analyzer Tool (Hat)
-
-
-
31
-
-
0025510535
-
Dynamic slicing of computer programs
-
B. Korel and J. Laski. 1990. Dynamic slicing of computer programs. J. Syst. Softw. 13, 3, 187-195.
-
(1990)
J. Syst. Softw
, vol.13
, Issue.3
, pp. 187-195
-
-
Korel, B.1
Laski, J.2
-
36
-
-
70350244718
-
Measuring the strength of information flows in programs
-
W. Masri and A. Podgurski. 2009. Measuring the strength of information flows in programs. ACM Trans. Softw. Engin. Methodol. 19, 2, 1-33.
-
(2009)
ACM Trans. Softw. Engin. Methodol
, vol.19
, Issue.2
, pp. 1-33
-
-
Masri, W.1
Podgurski, A.2
-
37
-
-
13844296853
-
Parameterized object sensitivity for points-to analysis for java
-
DOI 10.1145/1044834.1044835
-
A. Milanova, A. Rountev, and B. G. Ryder. 2005. Parameterized object sensitivity for points-to analysis for java. ACM Trans. Softw. Engin. Methodol. 14, 1, 1-41. (Pubitemid 40245820)
-
(2005)
ACM Transactions on Software Engineering and Methodology
, vol.14
, Issue.1
, pp. 1-41
-
-
Milanova, A.1
Rountev, A.2
Ryder, B.G.3
-
39
-
-
75149134776
-
Four trends leading to java runtime bloat
-
N. Mitchell, E. Schonberg, and G. Sevitsky. 2010. Four trends leading to java runtime bloat. IEEE Softw. 27, 1, 56-63.
-
(2010)
IEEE Softw
, vol.27
, Issue.1
, pp. 56-63
-
-
Mitchell, N.1
Schonberg, E.2
Sevitsky, G.3
-
40
-
-
67650033105
-
The causes of bloat, the limits of health
-
N. Mitchell and G. Sevitsky. 2007. The causes of bloat, the limits of health. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA07). 245-260.
-
(2007)
Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA07)
, pp. 245-260
-
-
Mitchell, N.1
Sevitsky, G.2
-
42
-
-
39149090024
-
A Virtual Machine Based Information Flow Control System for Policy Enforcement
-
DOI 10.1016/j.entcs.2007.10.010, PII S1571066108000455
-
S. K. Nair, P. N. Simpson, B. Crispo, and A. S. Tanenbaum. 2008. A virtual machine based information flow control system for policy enforcement. Electron. Notes Theor. Comput. Sci. 197, 1, 3-16. (Pubitemid 351253789)
-
(2008)
Electronic Notes in Theoretical Computer Science
, vol.197
, Issue.1
, pp. 3-16
-
-
Nair, S.K.1
Simpson, P.N.D.2
Crispo, B.3
Tanenbaum, A.S.4
-
47
-
-
40349087553
-
Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. 2006. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In Proceedings of the International Symposium on Microarchitecture (MICRO06). 135-148.
-
(2006)
Proceedings of the International Symposium on Microarchitecture (MICRO06)
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.4
Zhou, Y.5
Wu, Y.6
-
48
-
-
70450240486
-
-
Quest Software
-
Quest Software. 2011. JProbe memory debugging. http://www.quest.com/ jprobe.
-
(2011)
JProbe Memory Debugging
-
-
-
52
-
-
63549145872
-
JOLT: Lightweight dynamic analysis and removal of object churn
-
A. Shankar, M. Arnold, and R. Bodik. 2008. JOLT: Lightweight dynamic analysis and removal of object churn. In Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA08). 127-142.
-
(2008)
Proceedings of the ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA08)
, pp. 127-142
-
-
Shankar, A.1
Arnold, M.2
Bodik, R.3
-
56
-
-
84901625087
-
-
Sun Java Forum. 2014. http://forums.java.net/jive/thread.jspa?messageID= 180784.
-
(2014)
Sun Java Forum
-
-
-
57
-
-
0000990322
-
A survey of program slicing techniques
-
F. Tip. 1995. A survey of program slicing techniques. J. Program. Lang. 3, 121-189.
-
(1995)
J. Program. Lang
, vol.3
, pp. 121-189
-
-
Tip, F.1
-
65
-
-
77954709852
-
Finding low-utility data structures
-
G. Xu, M. Arnold, N. Mitchell, A. Rountev, E. Schonberg, and G. Sevitsky. 2010a. Finding low-utility data structures. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI10). 174-186.
-
(2010)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI10)
, pp. 174-186
-
-
Xu, G.1
Arnold, M.2
Mitchell, N.3
Rountev, A.4
Schonberg, E.5
Sevitsky, G.6
-
66
-
-
67650812036
-
Go with the flow: Profiling copies to find runtime bloat
-
G. Xu, M. Arnold, N. Mitchell, A. Rountev, and G. Sevitsky. 2009. Go with the flow: Profiling copies to find runtime bloat. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI09). 419-430.
-
(2009)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI09)
, pp. 419-430
-
-
Xu, G.1
Arnold, M.2
Mitchell, N.3
Rountev, A.4
Sevitsky, G.5
-
67
-
-
79951599209
-
Software bloat analysis: Finding, removing, and preventing performance problems in modern large-scale object-oriented applications
-
G. Xu, N.Mitchell, M. Arnold, A. Rountev, and G. Sevitsky. 2010b. Software bloat analysis: Finding, removing, and preventing performance problems in modern large-scale object-oriented applications. In Proceedings of the FSE/SDP Working Conference on the Future of Software Engineering Research (FoSER10). 421-426.
-
(2010)
Proceedings of the FSE/SDP Working Conference on the Future of Software Engineering Research (FoSER10)
, pp. 421-426
-
-
Xu, G.1
Mitchell, N.2
Arnold, M.3
Rountev, A.4
Sevitsky, G.5
-
69
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. 2006. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of the 15th USENIX Security Symposium. 121-136.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
71
-
-
0038364440
-
Frequent value locality and its applications
-
J. Yang and R. Gupta. 2002. Frequent value locality and its applications. ACM Trans. Program. Lang. Syst. 1, 1, 79-105.
-
(2002)
ACM Trans. Program. Lang. Syst
, vol.1
, Issue.1
, pp. 79-105
-
-
Yang, J.1
Gupta, R.2
-
74
-
-
34547235695
-
Locating faulty code by multiple points slicing
-
DOI 10.1002/spe.795
-
X. Zhang, N. Gupta, and R. Gupta. 2007. Locating faulty code by multiple points slicing. Softw. Pract. Exper. 37, 935-961. (Pubitemid 47116115)
-
(2007)
Software - Practice and Experience
, vol.37
, Issue.9
, pp. 935-961
-
-
Zhang, X.1
Gupta, N.2
Gupta, R.3
-
78
-
-
34547309741
-
Dynamic slicing long running programs through execution fast forwarding
-
DOI 10.1145/1181775.1181786, 1181786, Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering
-
X. Zhang, S. Tallam, and R. Gupta. 2006b. Dynamic slicing long running programs through execution fast forwarding. In Proceedings of the ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE06). 81-91. (Pubitemid 47129387)
-
(2006)
Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering
, pp. 81-91
-
-
Zhang, X.1
Tallam, S.2
Gupta, R.3
|