A survey of crowdsourcing systems

MC Yuen, I King, KS Leung - … on privacy, security, risk and trust …, 2011 - ieeexplore.ieee.org
Crowd sourcing is evolving as a distributed problem-solving and business production model
in recent years. In crowd sourcing paradigm, tasks are distributed to networked people to …

Dynamic software updates: a VM-centric approach

S Subramanian, M Hicks, KS McKinley - Proceedings of the 30th ACM …, 2009 - dl.acm.org
Software evolves to fix bugs and add features. Stopping and restarting programs to apply
changes is inconvenient and often costly. Dynamic software updating (DSU) addresses this …

Finding low-utility data structures

G Xu, N Mitchell, M Arnold, A Rountev… - Proceedings of the 31st …, 2010 - dl.acm.org
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is
especially true in highly layered Java applications. Often at the heart of these missed …

Software bloat analysis: Finding, removing, and preventing performance problems in modern large-scale object-oriented applications

G Xu, N Mitchell, M Arnold, A Rountev… - Proceedings of the FSE …, 2010 - dl.acm.org
Generally believed to be a problem belonging to the compiler and architecture communities,
performance optimization has rarely gained attention in mainstream software engineering …

Detecting inefficiently-used containers to avoid bloat

G Xu, A Rountev - Proceedings of the 31st ACM SIGPLAN Conference …, 2010 - dl.acm.org
Runtime bloat degrades significantly the performance and scalability of software systems.
An important source of bloat is the inefficient use of containers. It is expensive to create …

Light-weight, inter-procedural and callback-aware resource leak detection for android apps

T Wu, J Liu, Z Xu, C Guo, Y Zhang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Android devices include many embedded resources such as Camera, Media Player and
Sensors. These resources require programmers to explicitly request and release them …

Memory leak detection in Java: Taxonomy and classification of approaches

V Šor, SN Srirama - Journal of Systems and Software, 2014 - Elsevier
Memory leaks are usually not associated with runtime environments with automatic garbage
collection; however, memory leaks do happen in such environments and present a …

LeakChaser: Helping programmers narrow down causes of memory leaks

G Xu, MD Bond, F Qin, A Rountev - Proceedings of the 32nd ACM …, 2011 - dl.acm.org
In large programs written in managed languages such as Java and C#, holding
unnecessary references often results in memory leaks and bloat, degrading significantly …

Interruptible tasks: Treating memory pressure as interrupts for highly scalable data-parallel programs

L Fang, K Nguyen, G Xu, B Demsky, S Lu - Proceedings of the 25th …, 2015 - dl.acm.org
Real-world data-parallel programs commonly suffer from great memory pressure, especially
when they are executed to process large datasets. Memory problems lead to excessive GC …

Memory and resource leak defects and their repairs in Java projects

M Ghanavati, D Costa, J Seboek, D Lo… - Empirical Software …, 2020 - Springer
Despite huge software engineering efforts and programming language support, resource
and memory leaks are still a troublesome issue, even in memory-managed languages such …