The causes of bloat, the limits of health

N Mitchell, G Sevitsky - Proceedings of the 22nd annual ACM SIGPLAN …, 2007 - dl.acm.org
Applications often have large runtime memory requirements. In some cases, large memory
footprint helps accomplish an important functional, performance, or engineering …

Memory leak detection in Java: Taxonomy and classification of approaches

V Šor, SN Srirama - Journal of Systems and Software, 2014 - Elsevier
Memory leaks are usually not associated with runtime environments with automatic garbage
collection; however, memory leaks do happen in such environments and present a …

Heapviz: interactive heap visualization for program understanding and debugging

EE Aftandilian, S Kelley, C Gramazio, N Ricci… - Proceedings of the 5th …, 2010 - dl.acm.org
Understanding the data structures in a program is crucial to understanding how the program
works, or why it doesn't work. Inspecting the code that implements the data structures …

Object ownership profiling: a technique for finding and fixing memory leaks

D Rayside, L Mendel - Proceedings of the 22nd IEEE/ACM International …, 2007 - dl.acm.org
We introduce object ownership profiling, a technique forfinding and fixing memory leaks in
object-oriented programs. Object ownership profiling is the first memory profiling technique …

The runtime structure of object ownership

N Mitchell - European Conference on Object-Oriented …, 2006 - Springer
Object-oriented programs often require large heaps to run properly or meet performance
goals. They use high-overhead collections, bulky data models, and large caches …

Analyzing data structure growth over time to facilitate memory leak detection

M Weninger, E Gander, H Mössenböck - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Memory leaks are a major threat in modern software systems. They occur if objects are
unintentionally kept alive longer than necessary and are often indicated by continuously …

Utilizing object reference graphs and garbage collection roots to detect memory leaks in offline memory monitoring

M Weninger, E Gander, H Mössenböck - Proceedings of the 15th …, 2018 - dl.acm.org
Complex software systems often suffer from performance problems caused by memory
anomalies such as memory leaks. While the proliferation of objects is rather easy to detect …

Dynamic object flow analysis

A Lienhard - 2008 - boristheses.unibe.ch
The behavior of an object-oriented software system is notoriously hard to understand from
the source code alone. The main reason is the large gap between the program's static …

Increasing the throughput of pipe-and-filter architectures by integrating the task farm parallelization pattern

C Wulf, CC Wiechmann… - 2016 19th International …, 2016 - ieeexplore.ieee.org
The Pipe-and-Filter style represents a well-known family of component-based architectures.
By executing each filter on a dedicated processing unit, it is also possible to leverage …

Detection of suspicious time windows in memory monitoring

M Weninger, E Gander, H Mössenböck - Proceedings of the 16th ACM …, 2019 - dl.acm.org
Modern memory monitoring tools do not only offer analyses at a single point in time, but also
offer features to analyze the memory evolution over time. These features provide more …