Affiliation:
1. School of Computer, National University of Defense Technology
2. Department of Computer Engineering, Naval University of Engineering
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference34 articles.
1. [1] R.K. Dybvig, C. Bruggeman, and D. Eby, “Guardians in a generation-based garbage collector,” Proc. ACM SIGPLAN 1993 conference on Programming language design and implementation, pp.207-216, Albuquerque, New Mexico, United States, 1993.
2. [2] E. Torlak and S. Chandra, “Effective interprocedural resource leak detection,” Proc. 32nd ACM/IEEE International Conference on Software Engineering, pp.535-544, Cape Town, South Africa, 2010.
3. [3] W. Weimer and G.C. Necula, “Exceptional situations and program reliability,” ACM Trans. Program. Lang. Syst, vol.30, no.2, pp.1-51, 2008.
4. [4] H. Fujio, H. Okamura, and T. Dohi, “Fine-grained shock models to rejuvenate software systems,” IEICE Trans. Inf. & Syst., vol.E86-D, no.10, pp.2165-2171, Oct. 2003.
5. [5] D.A. Park and S.V. Rice, “A framework for unified resource management in Java,” Proc. 4th International Symposium on Principles and Practice of Programming in Java, pp.113-122, Mannheim, Germany, 2006.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Lightweight and modular resource leak verification;Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2021-08-18
2. A Detection and Measurement Approach for Memory Leaked Objects in Java Programs;IEICE Transactions on Information and Systems;2015
3. Automatic recovery from resource exhaustion exceptions by collecting leaked resources;Journal of Zhejiang University SCIENCE C;2014-08