2011 27th IEEE International Conference on Software Maintenance (ICSM) 2011
DOI: 10.1109/icsm.2011.6080775
|View full text |Cite
|
Sign up to set email alerts
|

Identifying performance deviations in thread pools

Abstract: Large-scale software systems handle increasingly larger workloads by implementing highly concurrent and dis tributed design patterns. The thread pool pattern uses pools of pre-existing and reusable threads to limit thread lifecycle over head (thread creation and destruction) and resource thrashing (thread proliferation). However, these advantages are weighed against performance issues caused by concurrency risks, like synchronization errors or deadlock, and thread pool-speclfic risks, like poorly tuned pool si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
16
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 25 publications
1
16
0
Order By: Relevance
“…Memory Stress: According to BlackBerry and Mozilla, the most common anomaly occurring in the field is related to Transient memory issues [30][31]. Transient memory issues (memory spikes) are large increases in memory usage over a relatively short period of time.…”
Section: ) Anomaliesmentioning
confidence: 99%
See 2 more Smart Citations
“…Memory Stress: According to BlackBerry and Mozilla, the most common anomaly occurring in the field is related to Transient memory issues [30][31]. Transient memory issues (memory spikes) are large increases in memory usage over a relatively short period of time.…”
Section: ) Anomaliesmentioning
confidence: 99%
“…Syers et al [30,31] proposed an approach to identify performance anomalies and deviation in thread pool using performance counters. Their approach is limited to the detection memory related performance anomalies in enterprise systems (e.g., memory leaks, memory spikes and memory blots).…”
Section: B Post-deployment Anomaly Detection In Large-scale Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Syer et al [35] use covariance matrices to detect deviations in thread pools that indicate possible performance problems. The focus of their approach is on thread pools while ours is not limited to a particular architectural pattern.…”
Section: Related Workmentioning
confidence: 99%
“…Syer et al [15] use covariance matrices to detect deviations in thread pools that indicate possible performance problems. The focus of their approach is on thread pools while ours is not limited to a particular architectural pattern.…”
Section: Lessons Learnedmentioning
confidence: 99%