Sciweavers

297 search results - page 1 / 60
» Heap Reference Analysis Using Access Graphs
Sort
View
CORR
2006
Springer
97views Education» more  CORR 2006»
13 years 5 months ago
Heap Reference Analysis Using Access Graphs
Uday P. Khedker, Amitabha Sanyal, Amey Karkare
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
13 years 8 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
OOPSLA
1999
Springer
13 years 9 months ago
Compositional Pointer and Escape Analysis for Java Programs
This paper presents a combined pointer and escape analysis algorithm for Java programs. The algorithm is based on the abstraction of points-to escape graphs, which characterize ho...
John Whaley, Martin C. Rinard
CLUSTER
2003
IEEE
13 years 10 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen
CC
2007
Springer
109views System Software» more  CC 2007»
13 years 11 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han