Statistically rigorous java performance evaluation
A Georges, D Buytaert, L Eeckhout - ACM SIGPLAN Notices, 2007 - dl.acm.org
Java performance is far from being trivial to benchmark because it is affected by various
factors such as the Java application, its input, the virtual machine, the garbage collector, the …
factors such as the Java application, its input, the virtual machine, the garbage collector, the …
A hardware accelerator for tracing garbage collection
M Maas, K Asanović… - 2018 ACM/IEEE 45th …, 2018 - ieeexplore.ieee.org
A large number of workloads are written in garbage-collected languages. These
applications spend up to 10-35% of their CPU cycles on GC, and these numbers increase …
applications spend up to 10-35% of their CPU cycles on GC, and these numbers increase …
Dos and don'ts of conducting performance measurements in java
The tutorial aims at practitioners-researchers or developers-who need to execute small
scale performance experiments in Java. The goal is to provide the attendees with a compact …
scale performance experiments in Java. The goal is to provide the attendees with a compact …
Java performance evaluation through rigorous replay compilation
A Georges, L Eeckhout, D Buytaert - ACM Sigplan Notices, 2008 - dl.acm.org
A managed runtime environment, such as the Java virtual machine, is non-trivial to
benchmark. Java performance is affected in various complex ways by the application and its …
benchmark. Java performance is affected in various complex ways by the application and its …
Obfuscating Java: The most pain for the least gain
M Batchelder, L Hendren - International Conference on Compiler …, 2007 - Springer
Bytecode, Java's binary form, is relatively high-level and therefore susceptible to
decompilation attacks. An obfuscator transforms code such that it becomes more complex …
decompilation attacks. An obfuscator transforms code such that it becomes more complex …
Approaches to interpreter composition
In this paper, we compose six different Python and Prolog VMs into 4 pairwise compositions:
one using C interpreters, one running on the JVM, one using meta-tracing interpreters, and …
one using C interpreters, one running on the JVM, one using meta-tracing interpreters, and …
Phase-based adaptive recompilation in a JVM
D Gu, C Verbrugge - Proceedings of the 6th annual IEEE/ACM …, 2008 - dl.acm.org
Modern JIT compilers often employ multi-level recompilation strategies as a means of
ensuring the most used code is also the most highly optimized, balancing optimization costs …
ensuring the most used code is also the most highly optimized, balancing optimization costs …
Performance assessment of the integration between industrial agents and low-level automation functions
The increasing need for more adaptive production environments is a big motivator for the
adoption of agentbased technologies in industrial systems, as they provide better …
adoption of agentbased technologies in industrial systems, as they provide better …
Hardening java's access control by abolishing implicit privilege elevation
While the Java runtime is installed on billions of devices and servers worldwide, it remains a
primary attack vector for online criminals. As recent studies show, the majority of all exploited …
primary attack vector for online criminals. As recent studies show, the majority of all exploited …
A comprehensive evaluation of object scanning techniques
RJ Garner, SM Blackburn, D Frampton - ACM SIGPLAN Notices, 2011 - dl.acm.org
At the heart of all garbage collectors lies the process of identifying and processing reference
fields within an object. Despite its key role, and evidence of many different implementation …
fields within an object. Despite its key role, and evidence of many different implementation …