Performance anomaly detection and bottleneck identification

O Ibidunmoye, F Hernández-Rodriguez… - ACM Computing Surveys …, 2015 - dl.acm.org
In order to meet stringent performance requirements, system administrators must effectively
detect undesirable performance behaviours, identify potential root causes, and take …

Soot: A Java bytecode optimization framework

R Vallée-Rai, P Co, E Gagnon, L Hendren… - CASCON First Decade …, 2010 - dl.acm.org
This paper presents Soot, a framework for optimizing Java* bytecode. The framework is
implemented in Java and supports three intermediate representations for representing Java …

Optimizing Java bytecode using the Soot framework: Is it feasible?

R Vallée-Rai, E Gagnon, L Hendren, P Lam… - … CC 2000 Held as Part of …, 2000 - Springer
This paper presents Soot, a framework for optimizing Java™ bytecode. The framework is
implemented in Java and supports three intermediate representations for representing Java …

Cache-conscious structure definition

TM Chilimbi, B Davidson, JR Larus - Proceedings of the ACM SIGPLAN …, 1999 - dl.acm.org
A program's cache performance can be improved by changing the organization and layout
of its data---even complex, pointer-based data structures. Previous techniques improved the …

Byte code engineering

M Dahm - JIT'99: Java-Informations-Tage 1999, 1999 - Springer
The term “Java” is used to denote two different concepts: the language itself and the related
execution environment, the Java Virtual Machine (JVM), which executes byte code …

System and methods for adaptive threshold determination for performance metrics

J McGee, JM Earley, JW Matthews - US Patent 7,076,695, 2006 - Google Patents
2015-05-01 Assigned to MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL
AGENT reassignment MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL …

Flexible policy-directed code safety

D Evans, A Twyman - … of the 1999 IEEE Symposium on Security …, 1999 - ieeexplore.ieee.org
The article introduces a new approach to code safety. We present Naccio, a system
architecture that allows a large class of safety policies to be expressed in a general and …

A requirements monitoring framework for enterprise systems

WN Robinson - Requirements engineering, 2006 - Springer
Requirements compliant software is becoming a necessity. Fewer and fewer organizations
will run their critical transactions on software that has no visible relationship to its …

JRes: A resource accounting interface for Java

G Czajkowski, T Von Eicken - ACM SIGPLAN Notices, 1998 - dl.acm.org
With the spread of the Internet the computing model on server systems is undergoing
several important changes. Recent research ideas concerning dynamic operating system …

Summarizing the content of large traces to facilitate the understanding of the behaviour of a software system

A Hamou-Lhadj, T Lethbridge - 14th IEEE International …, 2006 - ieeexplore.ieee.org
In this paper, we present a semi-automatic approach for summarizing the content of large
execution traces. Similar to text summarization, where abstracts can be extracted from large …