2014
DOI: 10.1016/j.jss.2014.06.005
|View full text |Cite
|
Sign up to set email alerts
|

Memory leak detection in Java: Taxonomy and classification of approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Interactive memory analysis tools collect, process, transform, and visualize information about the memory footprint of software systems. Snapshot-based tools analyze a single point in time while trace-based tools allow users to explore a period of time [105]. For example, existing tools typically present the heap state of an application as a type histogram displaying the number of objects and bytes allocated for each type.…”
Section: Introductionmentioning
confidence: 99%
“…Interactive memory analysis tools collect, process, transform, and visualize information about the memory footprint of software systems. Snapshot-based tools analyze a single point in time while trace-based tools allow users to explore a period of time [105]. For example, existing tools typically present the heap state of an application as a type histogram displaying the number of objects and bytes allocated for each type.…”
Section: Introductionmentioning
confidence: 99%
“…One insight for developing such general JavaScript memory leak detection techniques is to extend the existing techniques for Java-like languages [7] to JavaScript. Java suffers from memory leak problems similar to JavaScript's.…”
Section: Introductionmentioning
confidence: 99%
“…Another kind of technique detects memory leaks according to the structural information within the heap, such as the ownership relation [12], the data structure similarity and reoccurrence [13], etc. Besides, some other approaches also find leaks using the object lifetime information, such as the age of objects [7] and the staleness of objects (how long the object have not be used) [14].…”
Section: Introductionmentioning
confidence: 99%
“…According to Oracle, Inc. [1], over 3 billion mobile devices, 125 million televisions, and 97% of enterprise desktops are Java enabled, with more than 5 billion Java Cards currently in use. Java is a leading tool for embedded, web-based, and distributed software due to its rich feature set, which notably includes: its object-oriented paradigm; platform independence (portability); automatic garbage collection (decreasing code complexity and minimizing memory leaks); type safety; built-in networking and multithreading; extensive runtime, error checking, and application profiling to support development; and the Just-in-Time (JIT) compiler of the Java Virtual Machine (JVM), which approaches the speed of natively compiled code [2]- [15]. The developer community is continually expanding -with current estimates at 9 million -and an increasing number of universities offer Java in lieu of, for example, C/C++ [1], [12], [16]- [19].…”
Section: Introductionmentioning
confidence: 99%