2003
DOI: 10.1007/3-540-35767-x_12
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Evaluation of Parallel Garbage Collector Implementations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
35
0

Year Published

2004
2004
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(37 citation statements)
references
References 8 publications
2
35
0
Order By: Relevance
“…We refer to any point at which the bestperforming GC system changes as a switch point. These results support the findings of others [4,16,42], that no single collection system enables the best performance across benchmarks; moreover no single system performs best across heap sizes for a single benchmark/input pair.…”
Section: Application-specific Gcsupporting
confidence: 89%
See 2 more Smart Citations
“…We refer to any point at which the bestperforming GC system changes as a switch point. These results support the findings of others [4,16,42], that no single collection system enables the best performance across benchmarks; moreover no single system performs best across heap sizes for a single benchmark/input pair.…”
Section: Application-specific Gcsupporting
confidence: 89%
“…However, many researchers have shown that there is no single combination of a collector and an allocator that enables the best performance for all applications, on all hardware, and given all resource constraints [4,16,42]. Figure 1 confirms these findings.…”
Section: Application-specific Gcmentioning
confidence: 54%
See 1 more Smart Citation
“…With the exception of 'chart' we provide re- 2 For example under the copy-in, process, copy-out-memory strategy. By NUMA we mean here platforms in which cores primarily access memory directly via DMA while communicating via message passing or small caches.…”
Section: Discussionmentioning
confidence: 99%
“…Attanasio et al (2) propose a copying collector for Java server application running on large symmetric multiprocessor platforms that reportedly scales as well as that of Flood et al Load balancing is implemented by maintaining a global list of work buffers containing multiple pointers to objects, from which work is stolen.…”
Section: Related Workmentioning
confidence: 99%