V Šor, SN Srirama - Journal of Systems and Software, 2014 - Elsevier
Memory leaks are usually not associated with runtime environments with automatic garbage collection; however, memory leaks do happen in such environments and present a …
Understanding the data structures in a program is crucial to understanding how the program works, or why it doesn't work. Inspecting the code that implements the data structures …
D Rayside, L Mendel - Proceedings of the 22nd IEEE/ACM International …, 2007 - dl.acm.org
We introduce object ownership profiling, a technique forfinding and fixing memory leaks in object-oriented programs. Object ownership profiling is the first memory profiling technique …
N Mitchell - European Conference on Object-Oriented …, 2006 - Springer
Object-oriented programs often require large heaps to run properly or meet performance goals. They use high-overhead collections, bulky data models, and large caches …
Memory leaks are a major threat in modern software systems. They occur if objects are unintentionally kept alive longer than necessary and are often indicated by continuously …
Complex software systems often suffer from performance problems caused by memory anomalies such as memory leaks. While the proliferation of objects is rather easy to detect …
The behavior of an object-oriented software system is notoriously hard to understand from the source code alone. The main reason is the large gap between the program's static …
C Wulf, CC Wiechmann… - 2016 19th International …, 2016 - ieeexplore.ieee.org
The Pipe-and-Filter style represents a well-known family of component-based architectures. By executing each filter on a dedicated processing unit, it is also possible to leverage …
Modern memory monitoring tools do not only offer analyses at a single point in time, but also offer features to analyze the memory evolution over time. These features provide more …