期刊文献+

一种解决内存泄漏问题的自愈机制 被引量:1

A Self-Healing Mechanism for Memory Leak
下载PDF
导出
摘要 针对Java程序中的内存泄漏问题进行研究,从虚拟机角度对该问题进行了建模,并对模型进行了可诊断性分析。在此基础上,提出一种从应用级角度解决内存泄漏问题的自愈机制,给出自愈机制的体系结构和一种自愈策略,并进行了实现。实验结果表明,所提出的自愈机制针对Java程序中不同的内存泄漏问题有效可行,该机制的最大优点在于不需要修改程序源代码,且不影响程序功能的正常运行,这对于解决复杂系统集成以及采用第三方软件等情况下的内存泄漏问题具有实用意义,同时,该自愈机制对当前Java垃圾收集器也具有一定借鉴作用。 The introduction of the full paper discusses relevant problems and then proposes the in the title. Sections 1 through 4 explain our self-healing mechanism. Their core consists of: ( 1 research mentioned ) garbage collectors automatically free memory previously allocated by applications; generally, they discard unreachable objects from reloading them if they are required; (4) the objects which are true loitering objects will never be reloaded to memocode of the programs which may bring loitering objects because of defects and it does not interfere with the running of the programs. Our self-healing mechanism, we believe, is very useful for complex software or third-party software integration where loitering objects and other memory leaks are likely here to stay.
机构地区 西北工业大学
出处 《西北工业大学学报》 EI CAS CSCD 北大核心 2011年第4期646-651,共6页 Journal of Northwestern Polytechnical University
基金 航空科学基金(2010ZD53047)资助
关键词 内存泄漏 有限状态自动机 垃圾收集 自愈 策略 software engineering, mechanisms, models, experiments, memory leak, finite state machine, garbage collection, self-healing
  • 相关文献

参考文献5

  • 1Chen Kung, Chen Jubing. Aspect-Based Instrumentation for Locating Memory Leaks in Java Programs. 31st Annual International Computer Software and Applications Conference, 2007, 2:23 - 28.
  • 2Xu Guoqing, Atanas Rountev. Precise Memory Leak Detection for Java Software Using Container Profiling. Proceedings of the 30th International Conference on Software Engineering (ICSE'08), 2008, 151 - 160.
  • 3Ananian C S, Rinard M. Data Size Optimizations for Java Programs. Proceedings of the 2003 ACM SIGPLAN Conference on Language, Compiler, and Tool for Embedded Systems, New York, USA, 2003, 59 - 68.
  • 4陆伟,朱怡安,张龙妹.基于离散事件模型的计算系统自愈性[J].西北工业大学学报,2010,28(6):962-967. 被引量:1
  • 5Sampath M, Sengupta R, Lafortune S, Sinnamohideen K, Teneketzis D C. Failure Diagnosis Using Discrete-Event Models. IEEE Trans on Control Systems Technology, 1996, 4:105 - 124.

二级参考文献9

  • 1Dai Yuanshun.Autonomic Computing and Reliability Improvement.The 8th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing,2005,204~246.
  • 2Sharee S L,Ayodeji B S,Olatunji O B S.Autonomic Computing:Towards a Self-Healing System.Proceedings of the Spring 2007 American Society for Engineering Edu cation Illinois-Indiana Section Conference.
  • 3Ghosh D,Sharman R,Rao H R,et al.Self-Healing Systems-Survey and Synthesis.Decision Support Systems,2007,42(4):2164~2185.
  • 4Kephart J,Chess D.The Vision of Autonomic Computing.IEEE Trans on Computers,2003,36(1):41~50.
  • 5Kephart J O.Research Challenges of Autonomic Computing.Proceedings of 27th International Conference on Software Engineering,2005,15~22.
  • 6Nami M R,Bertles K.A Survey of Autonomic Computing Systems.The Third International Conference on Autonomic and Autonomous Systems,ICAS′07,2007.
  • 7Gorla A.Towards Design for Self-Healing.Fourth International Workshop on Software Quality Assurance.New York:ACM,2007,86~89.
  • 8Sampath M,Sengupta R,Lafortune S,Sinnamohideen K,Teneketzis D.Diagnosability of Discrete Event Systems.IEEE Trans on Automat Contr,1995,40(9):1555~1575.
  • 9Lafortune S,Chen E.A Relational Algebraic Approach to the Representation and Analysis of Discrete-Event Systems.Proc of 1991 Amer Contr Cont Boston,2893~2898.

同被引文献12

  • 1张威,卢庆龄,李梅,宫云战.基于指针分析的内存泄露故障测试方法研究[J].计算机应用研究,2006,23(10):22-24. 被引量:7
  • 2Francis M David, Roy H Campbell. Building a self-healing operating system [ C ]//The Third IEEE International Sym- posium on Dependable, Autonomic and Secure Computing. 2007:3-10.
  • 3Michael M Swift, Brian N Bershad, Henry M Levy. Impro- ving the reliability of commodity operating systems [ J ]. ACM SIGOPS Operating Systems Review, 2003,37 ( 5 ) : 207-222.
  • 4Avizienis Algirdas, Laprie J C, Randell Brian, et al. Bas- ic concepts and taxonomy of dependable and secure compu- ting[ J ]. IEEE Transactions on Dependable and Secure Computing, 2004,1 ( 1 ) : 11-33.
  • 5Jacques A Pienaar, Robert Hundt. JSWhiz: Static analysis for JavaScript memory leaks [ C : // Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization. 2013 : 1-11.
  • 6Woosup Lira, Seongsoo Park, Hwansoo Hart. Memory leak detection with context awareness [ C ]// Proceedings of the 2012 ACM Research in Applied Computation Symposium. 2012:276-281.
  • 7Liang Jui-shan, Kao Hung-wei, Tsao Han-ching, et al. Two-phase online memory leak detection[ C ]// APNOMS. 2012:1-4.
  • 8Gene Novark, Emery D Berger, Benjamin G Zorn. Effi- ciently and precisely locating memory leaks and bloat [ J ]. ACM SIGPLAN Notices, 2009,44 (6) :397407.
  • 9Zhu Yian, Li Yue, Xue Jingling, et al. What is system hang and how to handle it[ C]//2012 IEEE 23rd Interna- tional Symposium on Software Reliability Engineering. 2012 : 141-150.
  • 10汪小林,王振林,孙逸峰,刘毅,张彬彬,罗英伟.利用虚拟化平台进行内存泄露探测[J].计算机学报,2010,33(3):463-472. 被引量:15

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部