2009
DOI: 10.1007/978-3-642-03829-7_9
|View full text |Cite
|
Sign up to set email alerts
|

Resource Usage Analysis and Its Application to Resource Certification

Abstract: Abstract. Resource usage is one of the most important characteristics of programs. Automatically generated information about resource usage can be used in multiple ways, both during program development and deployment. In this paper we discuss and present examples on how such information is obtained in COSTA, a state of the art static analysis system. COSTA obtains safe symbolic upper bounds on the resource usage of a large class of general-purpose programs written in a mainstream programming language such as J… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
2
2
2

Relationship

3
3

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 46 publications
0
13
0
Order By: Relevance
“…Resource usage certification [24,14,18,7,8] has been proposed as a way to provide resource guarantees in the context of mobile code. Mobile code includes, for example running applets and/or plug-ins downloaded from the net in a web browser or a mobile phone.…”
Section: Resource Usage Certificationmentioning
confidence: 99%
“…Resource usage certification [24,14,18,7,8] has been proposed as a way to provide resource guarantees in the context of mobile code. Mobile code includes, for example running applets and/or plug-ins downloaded from the net in a web browser or a mobile phone.…”
Section: Resource Usage Certificationmentioning
confidence: 99%
“…The more recent work [15] can determine upper-bound functions on the use of quantitative resources for strict, higher-order, polymorphic, recursive functional programs dealing with possibly-aliased data. As a closely related work, [16] demonstrates how to use a static analysis system COSTA to obtain safe symbolic upper bounds on the resource (heap) usage of a large class of general-purpose programs written in mainstream programming languages, such as Java (bytecode). However, it does not study stack bound.…”
Section: Related Workmentioning
confidence: 99%
“…the entry hasNext(l 1 ), it infers that at program point (1, 1) the variable this is constant and always refers to l 1 . Applying it to 4 , it infers that: at program points (4, 1), (4, 3) and (4, 4) the variable this is constant and always refers to l 1 ; at (4, 2) variable obj is constant and always refers to l 1 .state; and at (4, 3), variable s 0 is constant and always refers to l 1 .state.rest.…”
Section: Examplementioning
confidence: 99%
“…The key features of this language which facilitate the formalization of the analysis are: (1) recursion is the only iterative mechanism, (2) guards are the only form of conditional, (3) there is no operand stack, (4) objects can be regarded as records, and the behavior induced by dynamic dispatch in the original bytecode program is compiled into dispatch rules guarded by a type check and (5) rules may have multiple output parameters which is useful for our transformation. The translation from (Java) bytecode to the rule-based form is performed in two steps [4]. First, a control flow graph is built.…”
Section: A Simple Imperative Bytecodementioning
confidence: 99%
See 1 more Smart Citation