Understanding and detecting real-world performance bugs

G **, L Song, X Shi, J Scherpelz, S Lu - ACM SIGPLAN Notices, 2012 - dl.acm.org
Developers frequently use inefficient code sequences that could be fixed by simple patches.
These inefficient code sequences can cause significant performance degradation and …

Effective program debloating via reinforcement learning

K Heo, W Lee, P Pashakhanloo, M Naik - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Prevalent software engineering practices such as code reuse and the" one-size-fits-all"
methodology have contributed to significant and widespread increases in the size and …

Toddler: Detecting performance problems via similar memory-access patterns

A Nistor, L Song, D Marinov, S Lu - 2013 35th International …, 2013 - ieeexplore.ieee.org
Performance bugs are programming errors that create significant performance degradation.
While developers often use automated oracles for detecting functional bugs, detecting …

Yak: A {High-Performance}{Big-Data-Friendly} Garbage Collector

K Nguyen, L Fang, G Xu, B Demsky, S Lu… - … USENIX Symposium on …, 2016 - usenix.org
Most “Big Data” systems are written in managed languages, such as Java, C#, or Scala.
These systems suffer from severe memory problems due to the massive volume of objects …

Discovering, reporting, and fixing performance bugs

A Nistor, T Jiang, L Tan - 2013 10th working conference on …, 2013 - ieeexplore.ieee.org
Software performance is critical for how users perceive the quality of software products.
Performance bugs-programming errors that cause significant performance degradation-lead …

Precise memory leak detection for Java software using container profiling

G Xu, A Rountev - ACM Transactions on Software Engineering and …, 2013 - dl.acm.org
A memory leak in a Java program occurs when object references that are no longer needed
are unnecessarily maintained. Such leaks are difficult to detect because static analysis …

Static detection of asymptotic performance bugs in collection traversals

O Olivo, I Dillig, C Lin - Proceedings of the 36th ACM SIGPLAN …, 2015 - dl.acm.org
This paper identifies and formalizes a prevalent class of asymptotic performance bugs called
redundant traversal bugs and presents a novel static analysis for automatically detecting …

Facade: A compiler and runtime for (almost) object-bounded big data applications

K Nguyen, K Wang, Y Bu, L Fang, J Hu… - ACM SIGARCH Computer …, 2015 - dl.acm.org
The past decade has witnessed the increasing demands on data-driven business
intelligence that led to the proliferation of data-intensive applications. A managed object …

Jshrink: In-depth investigation into debloating modern java applications

BR Bruce, T Zhang, J Arora, GH Xu, M Kim - Proceedings of the 28th …, 2020 - dl.acm.org
Modern software is bloated. Demand for new functionality has led developers to include
more and more features, many of which become unneeded or unused as software evolves …

Algorithmic profiling

D Zaparanuks, M Hauswirth - Proceedings of the 33rd ACM SIGPLAN …, 2012 - dl.acm.org
Traditional profilers identify where a program spends most of its resources. They do not
provide information about why the program spends those resources or about how resource …