Soot: A Java bytecode optimization framework

R Vallée-Rai, P Co, E Gagnon, L Hendren… - CASCON First Decade …, 2010 - dl.acm.org
This paper presents Soot, a framework for optimizing Java* bytecode. The framework is
implemented in Java and supports three intermediate representations for representing Java …

Techniques for obtaining high performance in Java programs

IH Kazi, HH Chen, B Stanley, DJ Lilja - ACM Computing Surveys (CSUR), 2000 - dl.acm.org
This survey describes research directions in techniques to improve the performance of
programs written in the Java programming language. The standard technique for Java …

[PDF][PDF] Tempo: Specializing systems applications and beyond

C Consel, L Hornof, R Marlet, G Muller… - ACM Computing …, 1998 - dl.acm.org
Permission to make digital/hard copy of part or all of this work for personal or classroom use
is granted without fee provided that the copies are not made or distributed for profit or …

Mondrian memory protection

E Witchel, J Cates, K Asanović - … of the 10th international conference on …, 2002 - dl.acm.org
Mondrian memory protection (MMP) is a fine-grained protection scheme that allows multiple
protection domains to flexibly share memory and export protected services. In contrast to …

Practical virtual method call resolution for Java

V Sundaresan, L Hendren, C Razafimahefa… - ACM SIGPLAN …, 2000 - dl.acm.org
This paper addresses the problem of resolving virtual method and interface calls in Java
bytecode. The main focus is on a new practical technique that can be used to analyze large …

Optimizing Java bytecode using the Soot framework: Is it feasible?

R Vallée-Rai, E Gagnon, L Hendren, P Lam… - … CC 2000 Held as Part of …, 2000 - Springer
This paper presents Soot, a framework for optimizing Java™ bytecode. The framework is
implemented in Java and supports three intermediate representations for representing Java …

Mobile Agents and the Future of the Internet

D Kotz, RS Gray - ACM Operating Systems Review, 1999 - digitalcommons.dartmouth.edu
Use of the Internet has exploded in recent years with the appearance of the World-Wide
Web. In this paper, we show how current technological trends may lead to a system based …

Using production grammars in software testing

EG Sirer, BN Bershad - ACM SIGPLAN Notices, 1999 - dl.acm.org
Extensible typesafe systems, such as Java, rely critically on a large and complex software
base for their overall protection and integrity, and are therefore difficult to test and verify …

Removing unnecessary synchronization in Java

J Bogda, U Hölzle - Proceedings of the 14th ACM SIGPLAN conference …, 1999 - dl.acm.org
Java programs perform many synchronization operations on data structures. Some of these
synchronization are unnecessary; in particular, if an object is reachable only by a single …

Escape analysis for JavaTM Theory and practice

B Blanchet - ACM Transactions on Programming Languages and …, 2003 - dl.acm.org
Escape analysis is a static analysis that determines whether the lifetime of data may exceed
its static scope. This paper first presents the design and correctness proof of an escape …